{"id":11366,"date":"2020-07-28T09:57:27","date_gmt":"2020-07-28T07:57:27","guid":{"rendered":"https:\/\/www.xiting.us\/?p=11366"},"modified":"2025-10-01T10:52:51","modified_gmt":"2025-10-01T08:52:51","slug":"sap-identity-authentication-service-overview","status":"publish","type":"post","link":"https:\/\/xiting.com\/en\/sap-identity-authentication-service-overview\/","title":{"rendered":"SAP Identity Authentication Service (IAS) | Overview and Integration Capabilities"},"content":{"rendered":"\n<p>Preventing unauthorized access is an important aspect of most enterprise applications, particularly with regard to hybrid SAP landscapes that utilize both on-premise and cloud tools.&nbsp;<\/p>\n\n\n\n<p>In these cases, a centralized authentication approach can streamline authorization management. After all, an organization may use multiple cloud services (SAP\u2019s cloud solutions are just a few of many), a fact which can result in numerous login requirements. Without putting proper single sign-on (SSO) techniques into place, this would cause a significant burden for everyone involved.&nbsp;<\/p>\n\n\n\n<p>One thing is clear: without proper identity access management (IAM) solutions in place, things could get messy very quickly.<\/p>\n\n\n\n<p>The purpose of IAM is to provide an array of security functions in the cloud environment that include authentication, authorization and provisioning (among others). It can thereby automate access rights management, and helps to make sure the correct people with the right privileges are accessing either the cloud or local resources.&nbsp;&nbsp;<\/p>\n\n\n\n<p>This blog will focus on the topic of secure authentication, and in particular on the SAP Cloud Platform Identity Authentication Service (IAS), providing an overview of its core services, features and integration capabilities.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-authentication-challenges-in-a-hybrid-sap-application-landscape\">AUTHENTICATION CHALLENGES IN A HYBRID SAP APPLICATION LANDSCAPE<\/h2>\n\n\n\n<p>Before we take a closer look at IAS, let\u2019s begin with some basics. Choosing the right authentication solution should be one of the top agenda items for organizations that want to provide secure access to cloud applications.&nbsp;<\/p>\n\n\n\n<p>User identities are the foundation of a stable and secure access control system. All access to data and resources is controlled through this system, so it\u2019s far from trivial. Rather, it should be seen as central to ensuring security in this permanently-exposed application landscape.&nbsp;<\/p>\n\n\n\n<p>This is best accomplished with an underlying platform, such as Azure from Microsoft or the SAP Cloud Platform (SCP). Both enable the centralization of user identities, facilitate a connection to existing user stores, and provide various options for integrating with on-premise resources such as access governance, identity management, and\/or provisioning functions.<\/p>\n\n\n\n<p>Most organizations operate a hybrid landscape, with lots of standard SAP applications as well as custom-developed software running both in the cloud and on-premise.&nbsp;<\/p>\n\n\n\n<p>In cases like these, you want to prevent your employees from having to constantly enter different User IDs and passwords to access various applications by providing simple but secure access via single sign-on.&nbsp;<\/p>\n\n\n\n<p>With frequent cloud use, technologies such as SAML, OpenID Connect\/OAuth, and SCIM become even more important when it comes to authenticating or managing identities.&nbsp;<\/p>\n\n\n\n<p>This offers added value from the perspective of IT security \u2014 especially concerning the possibilities for access management and access governance \u2014 because end-users cannot bypass the secure central authentication instance. Instead, they first need to get a valid SAML token to be able to access their cloud or on-premise applications.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-sap-cloud-platform-and-identity-authentication\">SAP CLOUD PLATFORM AND IDENTITY AUTHENTICATION<\/h2>\n\n\n\n<p>Some cloud applications don\u2019t even have standalone user management built-in, and no longer accept password-based authentication. Instead, these applications outsource their user-management and authentication processes to a central system for obtaining the security token required for access. This allows centralization, simplified user provisioning, and simplified administration.<\/p>\n\n\n\n<p>One example is the SAP Cloud Platform (SCP) itself, which does not provide a user database of its own. By default, every account is connected to the SAP ID Service (for initial access of admin staff performing tasks on the global and subaccount), which is known as the concept of the platform identity provider.&nbsp;<\/p>\n\n\n\n<p>For the integration, you can set up a trust relationship between your SCP subaccount and your SAP Identity Authentication tenant. As a result, when you deploy an application to SCP that has protected resources and requires SAML authentication, the user is redirected to the logon page of your SAP IAS to provide credentials.&nbsp;<\/p>\n\n\n\n<p>In this scenario, the SCP acts as a service provider, and SAP IAS service acts as the so-called application identity provider in this setup. The configurations made in the administration console do not affect the authentication for the cockpit, which is carried out via the standard SAP ID service.<\/p>\n\n\n\n<p>Within SCP, you can provide services and applications such as Java, HTML5, HANA XS, and many more. Organizations require appropriate permissions (roles) to restrict access to these services. As a consequence, the applications running on SCP must be able to understand various user attributes. It\u2019s important to define how the required user attributes, sent by the identity provider (so-called assertion attributes or claims), are mapped to the user attributes consumed by applications on SCP.&nbsp;<\/p>\n\n\n\n<p>Authentication is one piece of the puzzle. Once logged in, authorizations (or roles) determine what a user can do. So you need some degree of mapping that utilizes attributes both sides understand. As such, the authorization concept (a.k.a. SAML group to SCP role mapping) is very important and, in this case, can be an element of the SAML authentication process.&nbsp;<\/p>\n\n\n\n<p>Of course, cloud-exposed business applications are consumed not only by employees (end-users), but also by partners and customers that require access to specific applications. Thus, modern organizations increasingly face the challenge of managing secure access and authorizations in both cloud and on-premise systems \u2014 even in business-to-consumer (B2C) or business-to-business (B2B) scenarios.&nbsp;<\/p>\n\n\n\n<p>Furthermore, many organizations prefer using their already-established authentication systems and policies, which in turn are often cloud services as well (such as Microsoft Azure). They want to decide how to authenticate an identity at the IdP for a given application, as well as which conditions, risks, and\/or rules should be evaluated during the authentication process. And yes, as you may have guessed: even this is possible in conjunction with SAP Identity Authentication.<\/p>\n\n\n\n<p>Because of its incredible flexibility, and due to the fact that the SAP Cloud Platform Identity Authentication service is considered as the \u201cone integration point\u201d to all SAP cloud applications, there\u2019s good reason to take a closer look at this solution.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-overview-and-positioning-in-the-sap-cloud-portfolio\">OVERVIEW AND POSITIONING IN THE SAP CLOUD PORTFOLIO<\/h2>\n\n\n\n<p>SAP Cloud Platform Identity Authentication runs on top of the SAP Cloud Platform and can be seen as a cloud service for secure authentication. It was introduced in 2014 and, for quite a while, SAP positioned Identity Authentication as a strategic central service for authentication to SAP and non-SAP cloud applications supporting B2C, B2B, and B2E scenarios.&nbsp;It provides Web SSO based on SAML 2.0 and OpenID Connect.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh4.googleusercontent.com\/AOUN_ToMaSTmbXhCpOzNqFHcN1joFG2OeDOVr6tlV8ChmNHH7eA3fagroSHDYNjJbOeLrWXzbHmEoz7GmHofHSqMSz_53yG7wEAJ2ZZ0W2vjXSnjkVBF9lME8WS2Mb3wD4Xe2uce\" alt=\"Ein Bild, das Screenshot enth\u00e4lt.\n\nAutomatisch generierte Beschreibung\"\/><\/figure>\n\n\n\n<p>Even though SAP Cloud Platform Identity Authentication is offered as a stand-alone service supported for both the Neo and Cloud Foundry environments, it primarily operates in tight integration with SAP Cloud Platform.&nbsp;<\/p>\n\n\n\n<p>Additionally, it comes pre-integrated as part of many SAP cloud solutions, including SAP S\/4HANA Public Cloud, SAP SuccessFactors, SAP Cloud Portal, SAP Integrated Business Planning, SAP Hybris and SAP JAM (just to name a few). If you have one of these applications, you probably already have a tenant for IAS without knowing it.&nbsp;<\/p>\n\n\n\n<p>Plus, that list of pre-bundled SAP solutions will grow significantly in the upcoming months. This provides the advantage that SAP can provision ready-to-use applications that are pre-configured with IAS. Consequently, customers have one integration point for their SAP cloud applications, which also helps to reduce overall complexity and administrative efforts during the onboarding of future applications.&nbsp;&nbsp;<\/p>\n\n\n\n<p>SAP Cloud Platform Identity Authentication service is a multi-tenant system where tenants share the hardware and software and use dedicated database instances for persistence. Features such as high availability, disaster recovery, and failover are based on the capabilities of the underlying SCP infrastructure.&nbsp;<\/p>\n\n\n\n<p>SAP provides one Identity Authentication tenant per customer, regardless of the number of contracts signed in which Identity Authentication is included or bundled. You can request a second tenant (for testing purposes) which is provided upon request for no additional cost.<\/p>\n\n\n\n<p>Identity Authentication is the central interface that implements flexible authentication scenarios for employees, customers and partners, and bundles access to connected SAP or non-SAP cloud or on-premise applications across almost any device.&nbsp;<\/p>\n\n\n\n<p><strong>The solution offers the following key features:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Standardized methods for authentication.<\/li>\n\n\n\n<li>Flexible integration scenarios (e.g., with existing corporate or social IdPs).<\/li>\n\n\n\n<li>Common user experience.<\/li>\n\n\n\n<li>Centralized administration.<\/li>\n\n\n\n<li>Additional security features for protecting access to applications.<\/li>\n\n\n\n<li>Risk-based authentication rules and two-factor authentication.<\/li>\n\n\n\n<li>Delegated authentication to both on-premise user stores and existing identity providers (such as Azure and ADFS).<\/li>\n<\/ul>\n\n\n\n<p>Through all of the above, it simplifies the user experience by supporting secure single sign-on, on-premise integration, and convenient self-service and user provisioning capabilities.<\/p>\n\n\n\n<p>In combination with the SAP Cloud Platform Identity Provisioning, the two solutions provide capabilities for user authentication and provisioning, which is an important requirement for all modern integration or extension scenarios. Both solutions form the core of the central IAM cloud services.&nbsp;<\/p>\n\n\n\n<p>Contrary to the previous term \u2014 SAP Cloud Platform Identity and Access&nbsp; Management (IAM) services \u2014 the newest umbrella term for these services is <strong>SAP Cloud Identity Services<\/strong>. More components are being planned in the future. You can learn more about SAP\u2019s future plans in <a href=\"https:\/\/blogs.sap.com\/2020\/06\/24\/evolving-identity-authentication-and-identity-provisioning-into-sap-cloud-identity-services\/\">this blog post<\/a> from SAP.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh4.googleusercontent.com\/Xp-W5Zsup1M7kn8bipkVm2shGT8NINnY7Iv9ozg1HvjHk0H7CKVeLd0Z0aIQkFNu8F0if_aJcD62crDIa6AmbwZgMQZzf6NFA6pcc_7kOA2F25kAtw7DRvy77lE1InHDLEX7QiY3\" alt=\"Ein Bild, das Screenshot enth\u00e4lt.\n\nAutomatisch generierte Beschreibung\"\/><\/figure>\n\n\n\n<p>One thing that\u2019s important to understand is that SAP Identity Authentication does not persist any application context information, or evaluate exact user behavior within specific applications. Its job is to provide security tokens to authenticated principals for given target applications.&nbsp;<\/p>\n\n\n\n<p>If you want the ability to take a deeper look into the rabbit hole \u2014 and require in-depth analysis options, access request processes, segregation of duty checks, and firefighter functionality across the hybrid landscape \u2014 check out this <a href=\"https:\/\/www.xiting.us\/sap-cloud-iag\/\">blog post<\/a>&nbsp;from <a href=\"https:\/\/www.xiting.us\/author\/admin\/\">Alessandro Banzer<\/a> about the <a href=\"https:\/\/www.sap.com\/products\/cloud-iam.html\">SAP Cloud IAG<\/a>.&nbsp;<\/p>\n\n\n\n<p>SAP Cloud Internet Access Governance (SAP Cloud IAG) plays an important role in achieving access governance.&nbsp;<\/p>\n\n\n\n<p>Considered together, these three services integrate to provide a holistic solution to common identity and access management challenges SAP organizations are faced with.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-feature-overview\">FEATURE OVERVIEW<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Secure authentication for cloud and on-premise service provider applications<br>(includes Non-SAP and third-party software as well).<\/li>\n\n\n\n<li>Delegated authentication through integration with on-premise user stores and corporate identity providers including SAML 2.0 identity federation.<\/li>\n\n\n\n<li>Flexible authentication options and password policies.<\/li>\n\n\n\n<li>Single sign-on functionality from anywhere to any device.<\/li>\n\n\n\n<li>Social login through Twitter, LinkedIn, Facebook and Google.<\/li>\n\n\n\n<li>Two-factor authentication based on one-time passwords.<\/li>\n\n\n\n<li>Risk-based authentication based on various conditions such as application, user groups, IP-ranges and domains.<\/li>\n\n\n\n<li>Customizable look-and-feel features, such as company branding or authentication overlays.<\/li>\n\n\n\n<li>Invitation workflows (e-mail) including self-services with customizable self-registration forms and password reset.<\/li>\n\n\n\n<li>Support for managed identity lifecycle via IDM solutions.<\/li>\n\n\n\n<li>SCIM REST APIs to manage users and groups, invite users, and customize end-user UI texts in any language.<\/li>\n\n\n\n<li>Setup of custom privacy policies and terms of use on an application-by-application basis.<\/li>\n\n\n\n<li>Usage reporting and monitoring capabilities.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-options-for-user-management\">OPTIONS FOR USER MANAGEMENT<\/h2>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh4.googleusercontent.com\/YX-cCUqBmGHBb9BJM2txv_ltwlY92qFv-y5qee8AHqj6NsaDJRgD2vKTMT0SqtSsE-jvWYO1W82hVrEeq8NDCTYwPshVWhM8Tv9yxaW18S9znCgGy-i1VtFtCrTcHtnLBku0UBD9\" alt=\"Ein Bild, das Text enth\u00e4lt.\n\nAutomatisch generierte Beschreibung\"\/><\/figure>\n\n\n\n<p>In the first step, it\u2019s important to consider how user management should be conducted. Since IAS acts as the central IdP for all connected applications, the users have to authenticate at the IAS first. In order to do that, they need to have a user (a.k.a. profile) there.&nbsp;<\/p>\n\n\n\n<p>In general, an organization using SAP Identity Authentication has the following options:<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-1-use-the-local-user-store-in-ias-default\">1. USE THE LOCAL USER STORE IN IAS (DEFAULT)<\/h3>\n\n\n\n<p>First is the manual user creation process within the Identity Authentication web admin console. There, the administrators can also bulk import new users&nbsp;or update data for existing users via CSV upload. You can also invite users for self-service profile creation.&nbsp;<\/p>\n\n\n\n<p>Indeed, the most exciting feature is automation through SCIM. The management of user-profiles (Create, Update, Delete) as well as groups in the IAS user store, can be fully automated with practically any SCIM-compatible system, including Azure or third-party IAM or IDP-solutions\/connectors.&nbsp;<\/p>\n\n\n\n<p>If you connect your existing SAP IDM 8.0 via the Identity Provisioning Service (IPS) with IAS, you can even create users based on provisioning requests by assigning business-roles containing access to cloud applications.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-2-connect-to-an-existing-user-repository\">2. CONNECT TO AN EXISTING USER REPOSITORY<\/h3>\n\n\n\n<p>If you have an existing on-premise user store, you can configure Identity Authentication to use the corporate user store in addition to its own cloud user store. In this case, you connect an existing on-premise user store, which can be either an LDAP (Active Directory) or SAP system (like HCM). When you do, IAS checks the credentials against this user store in order to authenticate the user. This is done by tunneling IAS via the SCP connectivity service and the SAP Cloud Connector to your on-premise system.<\/p>\n\n\n\n<p>After the first successful authentication, a partial user record (including user details taken from the corporate user store) is created in the IAS user store. This allows for additional features like enabling two-factor authentication or defining user groups which can be considered within custom IAS risk-based authentication rules.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-3-integrate-with-an-existing-identity-provider\">3. INTEGRATE WITH AN EXISTING IDENTITY PROVIDER<\/h3>\n\n\n\n<p>The third option is to integrate with another SAML IdP. Often, customers already operate a corporate IdP, which can be any third-party SAML 2.0 IdP. In such a case, you can implement IAS in proxy mode, forwarding the authentication requests to the desired authenticating IdP.&nbsp;<\/p>\n\n\n\n<p>When operating IAS in this mode, only one trust exchange between IAS and your corporate IdP is required. Trusts to all further applications are configured by IAS admins without involving further corporate IT resources.&nbsp;<\/p>\n\n\n\n<p>As a result, you only need to perform the configuration for the corporate authentication mechanisms to your corporate IdP once. After that, all future applications can make use of it. In this setup, you don\u2019t need to create a profile in the IAS user store at all, because your IdP forwards the SAML token (including the desired claims) to IAS, which in turn uses them to issue the actual SAML token for the target application.&nbsp;<\/p>\n\n\n\n<p>You can see IAS as an authentication hub, transforming and forwarding authentication tokens to different target applications.&nbsp;<\/p>\n\n\n\n<p>Recent experiences in customer projects have shown that it makes perfect sense to have a local user in the IAS. Due to the fact that IAS is able to enrich SAML assertion attributes coming from the corporate IdP, this gives you much greater flexibility when it comes to supporting different applications with their Name ID format requirements (such as Ariba) or for providing custom SAML claims to the applications if they are not delivered by the corporate IdP at all. Of course, a combination of all three mentioned options is possible.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-authentication-and-sap-single-sign-on-sso\">AUTHENTICATION AND SAP Single Sign-On (SSO)<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-1-user-to-ias\">1. USER TO IAS<\/h3>\n\n\n\n<p>Once you have your users in IAS, you can select from a variety of different authentication mechanisms including Single Sign-On (SSO). Of course, users can still log on with their username and password, but that is just one possible authentication method.<\/p>\n\n\n\n<p>Let\u2019s have a look at what is currently possible:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>HTTP form-based authentication: <\/strong>Basic authentication with username and password.<\/li>\n\n\n\n<li><strong>Certificate-based authentication: <\/strong>Use your existing X.509 certificates and PKI for user authentication.<\/li>\n\n\n\n<li><strong>Simple and Protected GSS-API Negotiation Mechanism (SPNEGO): <\/strong>Allows users to log on without a username and password when they are in the corporate network (which integrates your Active Directory domain to IAS).<\/li>\n\n\n\n<li><strong>Multi-factor authentication: <\/strong>You can use one-time passcodes from the SAP authenticator app or SMS as a second factor. The latter requires an account in SAP Authentication 365.<\/li>\n\n\n\n<li><strong>A custom RADIUS server: <\/strong>July 2020 beta feature \u2013 only available upon request.<\/li>\n\n\n\n<li><strong>Delegated authentication: <\/strong>Means forwarding all authentication requests to a corporate Identity Provider by using the SP-component of IAS acting as the IdP-Proxy.<\/li>\n\n\n\n<li><strong>Social authentication: <\/strong>Reuse your account at Twitter, Facebook, LinkedIn or Google \u2013 often used for external in B2B or B2C scenarios.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-2-user-to-application\">2. USER TO APPLICATION<\/h3>\n\n\n\n<p>In a second step, if the user is successfully authenticated at the IAS based on custom policies and rules, they receive the required security token for accessing the target cloud or on-premise application, which can be one of the two:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>SAML 2.0 assertion<\/strong><\/li>\n\n\n\n<li><strong>OpenID Connect (OIDC) JSON Web Token<\/strong><\/li>\n<\/ul>\n\n\n\n<p>In addition to SAML 2.0, you can use SAP Cloud Platform Identity Authentication service to authenticate users in OpenID Connect (OIDC) protected applications. OIDC is a simple identity layer on top of the OAuth 2.0 protocol. Clients can verify the identity of the end-user based on the authentication performed by an authorization server, as well as to obtain basic profile information about the end-user in an interoperable and REST-like manner. The OIDC implementation of IAS supports the authorization code flow, the resource owner password credentials flow, and the implicit flow.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-frequently-asked-questions\">FREQUENTLY ASKED QUESTIONS<\/h2>\n\n\n\n<div class=\"schema-faq wp-block-yoast-faq-block\"><div class=\"schema-faq-section\" id=\"faq-question-1595922754578\"><strong class=\"schema-faq-question\"><strong>What are the SAP Cloud Identity Services?<\/strong><\/strong> <p class=\"schema-faq-answer\">The SAP Cloud Identity Services provide basic capabilities for user authentication and provisioning, which is a core requirement for all integration and\/or extension scenarios of the Intelligent Enterprise. SAP Cloud Identity Services consist of two main components: Identity Authentication and Identity Provisioning, with more components being planned for future release.<br\/><br\/>You can find further information about the transition of SAP IAS and SAP IPS into the SAP Cloud Identity Services in <a href=\"https:\/\/blogs.sap.com\/2020\/06\/24\/evolving-identity-authentication-and-identity-provisioning-into-sap-cloud-identity-services\/\">this blog post from SAP<\/a>.<\/p> <\/div> <div class=\"schema-faq-section\" id=\"faq-question-1595922721215\"><strong class=\"schema-faq-question\"><strong>What is SAP Cloud Platform Identity Authentication?<\/strong><\/strong> <p class=\"schema-faq-answer\">Identity Authentication is a cloud service for authentication, single sign-on, and user management in SAP cloud and on-premise applications. It can act as an identity provider itself, or be used as a proxy to integrate with an existing single sign-on infrastructure. More information can be found <a href=\"https:\/\/community.sap.com\/topics\/cloud-platform-identity-authentication\">here<\/a>.<\/p> <\/div> <div class=\"schema-faq-section\" id=\"faq-question-1595922787033\"><strong class=\"schema-faq-question\"><strong>What is SAP Cloud Platform Identity Provisioning?<\/strong><\/strong> <p class=\"schema-faq-answer\">Identity Provisioning offers a comprehensive, low-cost approach to identity lifecycle management in the cloud. It helps you provision identities and their authorizations to various cloud and on-premise business applications. SAP IPS is based on the SCIM standard (System for Cross-Domain Identity Management), which means you no longer need to develop specific connectors for each target application.<\/p> <\/div> <div class=\"schema-faq-section\" id=\"faq-question-1595922807211\"><strong class=\"schema-faq-question\"><strong>Which applications can be used with SAP IAS?<\/strong><\/strong> <p class=\"schema-faq-answer\">You need to distinguish between the applications that are pre-bundled with SAP IAS and those that are not. For the pre-integrated applications, the default authentication and identity service is provided by SAP Cloud Platform Identity Authentication Service.\u00a0<br\/><br\/>In general, any SAML 2.0 compatible web application running in the cloud (SaaS app) could be integrated with the SAP Cloud Platform Identity Authentication Service, which is now part of the SAP Cloud Identity Services. Of course you can use SAP IAS to integrate with your on-premise web applications as well, such as SAP HANA, SAP BusinessObjects, SAP Fiori, and almost any ICF service running on your SAP systems.<br\/><br\/><strong>Tip: <\/strong>Currently, SAP does not provide a full list of compatible applications. But here are a few of the most notable: S\/4HANA Public Cloud (MTE), SAP Cloud Platform Portal, SAP SuccessFactors, SAP Integrated Business Planning, SAP Jam Collaboration and SAP Hybris. In addition, SAP Cloud Platform Identity Authentication can serve as a trusted identity provider for Google G Suite.<\/p> <\/div> <div class=\"schema-faq-section\" id=\"faq-question-1595922834089\"><strong class=\"schema-faq-question\"><strong>Are there more possible integration scenarios?<\/strong><\/strong> <p class=\"schema-faq-answer\">Yes, there are many others, including:<br\/>&#8211; Delegated authentication towards multiple identity providers<br\/>(IDP-initiated authentication).<br\/>&#8211; Conditional authentication (partner or subsidiary use-cases).<br\/>&#8211; Two-factor authentication options.<br\/>&#8211; Risk-based authentication (request two-factor authentication based on the user context).<br\/>&#8211; Integration of your Active Directory or ABAP HCM as an IAS user store.<br\/>&#8211; Many more \u2013 ask us for further information.<\/p> <\/div> <div class=\"schema-faq-section\" id=\"faq-question-1595922866546\"><strong class=\"schema-faq-question\"><strong>How many IAS tenants can we use?<\/strong><\/strong> <p class=\"schema-faq-answer\">he SAP Cloud Platform Identity Authentication Service is provided for most SAP Cloud Essential contracts and requires no separate license or subscription. SAP provides one IAS tenant per customer, regardless of the number of contracts signed in which Identity Authentication is included or bundled. A tenant granted as part of a bundle is not limited in scope, but allows you to use the full functionality that Identity Authentication offers. If a customer has a subscription for a productive instance of Identity Authentication, then the customer can request a second tenant (for testing purposes), which is provided upon request for no additional cost.<\/p> <\/div> <div class=\"schema-faq-section\" id=\"faq-question-1595922883716\"><strong class=\"schema-faq-question\"><strong>What exactly is a SAML authentication process?<\/strong><\/strong> <p class=\"schema-faq-answer\">If you open the application in your browser, the request is redirected to the IdP, which will take care of the user authentication. Once the user\u2019s identity is verified, the IdP sends the request back to the application \u2013 including the information about the user. The application can then perform the authorization check based on the verified information about who was sending the request, and decide if the user is allowed to perform the requested operation.\u00a0<\/p> <\/div> <div class=\"schema-faq-section\" id=\"faq-question-1595922899798\"><strong class=\"schema-faq-question\"><strong>What is the relation to SAP Cloud Identity Access Governance (IAG)?\u00a0<\/strong><\/strong> <p class=\"schema-faq-answer\">SAP Identity and Access Governance is a separate product. Technically, it re-uses Identity Authentication and Provisioning, but also provides premium features such as segregation of duties, re-certification, and business role management.<\/p> <\/div> <\/div>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-conclusion\">CONCLUSION<\/h2>\n\n\n\n<p>As you can see, the SAP Cloud Platform Identity Authentication service provides a range of interesting functions that a traditional on-premise IdP cannot offer. In our next blog post about SAP Identity Authentication, we will take a closer look at what\u2019s possible when operating IAS in \u201cproxy mode\u201d in conjunction with Azure Active Directory.&nbsp;<\/p>\n\n\n\n<p>Learn more about SAP Cloud Platform Identity Authentication:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/community.sap.com\/topics\/cloud-identity-services\">SAP Cloud Identity Services community page<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.sap.com\/products\/cloud-platform\/use-cases\/identity-authentication.html\">SAP Identity Authentication product page<\/a>\u00a0<\/li>\n\n\n\n<li><a href=\"https:\/\/help.sap.com\/viewer\/6d6d63354d1242d185ab4830fc04feb1\/Cloud\/en-US\/1b607aace12240cf84904a04e5713c58.html\">Further Integration scenarios<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/help.sap.com\/viewer\/product\/IDENTITY_AUTHENTICATION\/Cloud\/en-US\">SAP Help Portal<\/a><\/li>\n<\/ul>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Preventing unauthorized access is an important aspect of most enterprise applications, particularly with regard to hybrid SAP landscapes that utilize both on-premise and cloud tools.&nbsp; In these cases, a centralized authentication approach can streamline authorization management. After all, an organization may use multiple cloud services (SAP\u2019s cloud solutions are just a few of many), a [&hellip;]<\/p>\n","protected":false},"author":9,"featured_media":11116,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"content-type":"","footnotes":""},"categories":[4],"tags":[],"class_list":["post-11366","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>SAP Identity Authentication Service: Overview and Integration Capabilities<\/title>\n<meta name=\"description\" content=\"This blog will focus on the SAP Cloud Platform Identity Authentication Service (IAS) with an overview of its core services and integration capabilities.\" \/>\n<meta name=\"robots\" content=\"noindex, nofollow\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"SAP Identity Authentication Service (IAS) | Overview and Integration Capabilities\" \/>\n<meta property=\"og:description\" content=\"Preventing unauthorized access is an important aspect of most enterprise applications, particularly with regard to hybrid SAP landscapes that utilize both\" \/>\n<meta property=\"og:url\" content=\"https:\/\/xiting.com\/en\/sap-identity-authentication-service-overview\/\" \/>\n<meta property=\"og:site_name\" content=\"Xiting\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/XitingAG\" \/>\n<meta property=\"article:published_time\" content=\"2020-07-28T07:57:27+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-10-01T08:52:51+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/xiting.com\/wp-content\/uploads\/2020\/07\/cloud-computing.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"720\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Carsten Olt\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@jsterr@xiting.de\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Carsten Olt\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"16 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":[\"Article\",\"BlogPosting\"],\"@id\":\"https:\/\/xiting.com\/en\/sap-identity-authentication-service-overview\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/xiting.com\/en\/sap-identity-authentication-service-overview\/\"},\"author\":{\"name\":\"Carsten Olt\",\"@id\":\"https:\/\/xiting.com\/en\/#\/schema\/person\/3c32c7de1132d012e263720a9f3300a2\"},\"headline\":\"SAP Identity Authentication Service (IAS) | Overview and Integration Capabilities\",\"datePublished\":\"2020-07-28T07:57:27+00:00\",\"dateModified\":\"2025-10-01T08:52:51+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/xiting.com\/en\/sap-identity-authentication-service-overview\/\"},\"wordCount\":3484,\"publisher\":{\"@id\":\"https:\/\/xiting.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/xiting.com\/en\/sap-identity-authentication-service-overview\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/xiting.com\/wp-content\/uploads\/2020\/07\/cloud-computing.jpg\",\"inLanguage\":\"en-US\"},{\"@type\":[\"WebPage\",\"FAQPage\"],\"@id\":\"https:\/\/xiting.com\/en\/sap-identity-authentication-service-overview\/\",\"url\":\"https:\/\/xiting.com\/en\/sap-identity-authentication-service-overview\/\",\"name\":\"SAP Identity Authentication Service: Overview and Integration Capabilities\",\"isPartOf\":{\"@id\":\"https:\/\/xiting.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/xiting.com\/en\/sap-identity-authentication-service-overview\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/xiting.com\/en\/sap-identity-authentication-service-overview\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/xiting.com\/wp-content\/uploads\/2020\/07\/cloud-computing.jpg\",\"datePublished\":\"2020-07-28T07:57:27+00:00\",\"dateModified\":\"2025-10-01T08:52:51+00:00\",\"description\":\"This blog will focus on the SAP Cloud Platform Identity Authentication Service (IAS) with an overview of its core services and integration capabilities.\",\"breadcrumb\":{\"@id\":\"https:\/\/xiting.com\/en\/sap-identity-authentication-service-overview\/#breadcrumb\"},\"mainEntity\":[{\"@id\":\"https:\/\/xiting.com\/en\/sap-identity-authentication-service-overview\/#faq-question-1595922754578\"},{\"@id\":\"https:\/\/xiting.com\/en\/sap-identity-authentication-service-overview\/#faq-question-1595922721215\"},{\"@id\":\"https:\/\/xiting.com\/en\/sap-identity-authentication-service-overview\/#faq-question-1595922787033\"},{\"@id\":\"https:\/\/xiting.com\/en\/sap-identity-authentication-service-overview\/#faq-question-1595922807211\"},{\"@id\":\"https:\/\/xiting.com\/en\/sap-identity-authentication-service-overview\/#faq-question-1595922834089\"},{\"@id\":\"https:\/\/xiting.com\/en\/sap-identity-authentication-service-overview\/#faq-question-1595922866546\"},{\"@id\":\"https:\/\/xiting.com\/en\/sap-identity-authentication-service-overview\/#faq-question-1595922883716\"},{\"@id\":\"https:\/\/xiting.com\/en\/sap-identity-authentication-service-overview\/#faq-question-1595922899798\"}],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/xiting.com\/en\/sap-identity-authentication-service-overview\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/xiting.com\/en\/sap-identity-authentication-service-overview\/#primaryimage\",\"url\":\"https:\/\/xiting.com\/wp-content\/uploads\/2020\/07\/cloud-computing.jpg\",\"contentUrl\":\"https:\/\/xiting.com\/wp-content\/uploads\/2020\/07\/cloud-computing.jpg\",\"width\":1280,\"height\":720},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/xiting.com\/en\/sap-identity-authentication-service-overview\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/xiting.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"SAP Identity Authentication Service (IAS) | Overview and Integration Capabilities\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/xiting.com\/en\/#website\",\"url\":\"https:\/\/xiting.com\/en\/\",\"name\":\"Xiting\",\"description\":\"Your Expert for SAP Security\",\"publisher\":{\"@id\":\"https:\/\/xiting.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/xiting.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/xiting.com\/en\/#organization\",\"name\":\"Xiting\",\"url\":\"https:\/\/xiting.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/xiting.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/xiting.com\/wp-content\/uploads\/2019\/08\/xiting-logo.svg\",\"contentUrl\":\"https:\/\/xiting.com\/wp-content\/uploads\/2019\/08\/xiting-logo.svg\",\"width\":1,\"height\":1,\"caption\":\"Xiting\"},\"image\":{\"@id\":\"https:\/\/xiting.com\/en\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/XitingAG\",\"https:\/\/www.linkedin.com\/company\/1345129\/\",\"https:\/\/www.instagram.com\/xiting.global\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/xiting.com\/en\/#\/schema\/person\/3c32c7de1132d012e263720a9f3300a2\",\"name\":\"Carsten Olt\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/2c35c3b7ce5d81579234be25ef570938712ba95e2cb8e87f2a79b81be928499a?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/2c35c3b7ce5d81579234be25ef570938712ba95e2cb8e87f2a79b81be928499a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/2c35c3b7ce5d81579234be25ef570938712ba95e2cb8e87f2a79b81be928499a?s=96&d=mm&r=g\",\"caption\":\"Carsten Olt\"},\"description\":\"Carsten Olt has been working as a Managing SAP Security Consultant since 2016, responsible for Secure Authentication &amp; SSO and SAP Cloud Security Services at Xiting in Germany. As a member of the IAM team, he is also a team leader who conveys the company's goals and strategies to employees and has organizational responsibility. With a security-minded approach, Carsten has international project and IT security experience in many industries. He has been working in IT-Security since 2001, specializing in SAP security since 2010. He is a subject matter expert for SAP Single Sign-On 3.0 and a trainer for the WDESSO course. His current focus is on supporting customers in solving authentication and security challenges within hybrid SAP landscapes, as well as designing and implementing holistic authentication concepts. Carsten is an ISACA CISA and a former MCP and RHCE with an ISP background, and he looks at security from different angles. He also translates between SAP and IT security vocabulary. Carsten has in-depth experience in multi-vendor architectures and MSFT\/Azure components, dealing with all the requirements concerning SAML 2.0, OAuth, OpenID Connect, SCIM, X.509 CBA &amp; PKI, MFA, SAP SSO, and Secure Network Communications, Kerberos\/SPNEGO, data security and encryption, as well as digital signatures. Carsten is experienced in SAP on-premises components such as S\/4HANA, ABAP, and Java, as well as security solutions like SSO 3.0. Since 2019, he has focused on SAP-Cloudified environments, specifically the SAP Cloud Identity Services and SAP BTP, as well as SaaS integrations concerning IAM. He deals with hybrid SAP security in conjunction with Azure Active Directory, ADDS, ADFS, ADCS, Reverse Proxies\/WAF, SAP Web Dispatcher, SAP Cloud Connector, third-party products, and infrastructure components.\",\"sameAs\":[\"https:\/\/x.com\/jsterr@xiting.de\"],\"url\":\"https:\/\/xiting.com\/en\/author\/carsten-olt\/\"},{\"@type\":\"Question\",\"@id\":\"https:\/\/xiting.com\/en\/sap-identity-authentication-service-overview\/#faq-question-1595922754578\",\"position\":1,\"url\":\"https:\/\/xiting.com\/en\/sap-identity-authentication-service-overview\/#faq-question-1595922754578\",\"name\":\"What are the SAP Cloud Identity Services?\",\"answerCount\":1,\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"The SAP Cloud Identity Services provide basic capabilities for user authentication and provisioning, which is a core requirement for all integration and\/or extension scenarios of the Intelligent Enterprise. SAP Cloud Identity Services consist of two main components: Identity Authentication and Identity Provisioning, with more components being planned for future release.<br\/><br\/>You can find further information about the transition of SAP IAS and SAP IPS into the SAP Cloud Identity Services in <a href=\\\"https:\/\/blogs.sap.com\/2020\/06\/24\/evolving-identity-authentication-and-identity-provisioning-into-sap-cloud-identity-services\/\\\">this blog post from SAP<\/a>.\",\"inLanguage\":\"en-US\"},\"inLanguage\":\"en-US\"},{\"@type\":\"Question\",\"@id\":\"https:\/\/xiting.com\/en\/sap-identity-authentication-service-overview\/#faq-question-1595922721215\",\"position\":2,\"url\":\"https:\/\/xiting.com\/en\/sap-identity-authentication-service-overview\/#faq-question-1595922721215\",\"name\":\"What is SAP Cloud Platform Identity Authentication?\",\"answerCount\":1,\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"Identity Authentication is a cloud service for authentication, single sign-on, and user management in SAP cloud and on-premise applications. It can act as an identity provider itself, or be used as a proxy to integrate with an existing single sign-on infrastructure. More information can be found <a href=\\\"https:\/\/community.sap.com\/topics\/cloud-platform-identity-authentication\\\">here<\/a>.\",\"inLanguage\":\"en-US\"},\"inLanguage\":\"en-US\"},{\"@type\":\"Question\",\"@id\":\"https:\/\/xiting.com\/en\/sap-identity-authentication-service-overview\/#faq-question-1595922787033\",\"position\":3,\"url\":\"https:\/\/xiting.com\/en\/sap-identity-authentication-service-overview\/#faq-question-1595922787033\",\"name\":\"What is SAP Cloud Platform Identity Provisioning?\",\"answerCount\":1,\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"Identity Provisioning offers a comprehensive, low-cost approach to identity lifecycle management in the cloud. It helps you provision identities and their authorizations to various cloud and on-premise business applications. SAP IPS is based on the SCIM standard (System for Cross-Domain Identity Management), which means you no longer need to develop specific connectors for each target application.\",\"inLanguage\":\"en-US\"},\"inLanguage\":\"en-US\"},{\"@type\":\"Question\",\"@id\":\"https:\/\/xiting.com\/en\/sap-identity-authentication-service-overview\/#faq-question-1595922807211\",\"position\":4,\"url\":\"https:\/\/xiting.com\/en\/sap-identity-authentication-service-overview\/#faq-question-1595922807211\",\"name\":\"Which applications can be used with SAP IAS?\",\"answerCount\":1,\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"You need to distinguish between the applications that are pre-bundled with SAP IAS and those that are not. For the pre-integrated applications, the default authentication and identity service is provided by SAP Cloud Platform Identity Authentication Service.\u00a0<br\/><br\/>In general, any SAML 2.0 compatible web application running in the cloud (SaaS app) could be integrated with the SAP Cloud Platform Identity Authentication Service, which is now part of the SAP Cloud Identity Services. Of course you can use SAP IAS to integrate with your on-premise web applications as well, such as SAP HANA, SAP BusinessObjects, SAP Fiori, and almost any ICF service running on your SAP systems.<br\/><br\/><strong>Tip: <\/strong>Currently, SAP does not provide a full list of compatible applications. But here are a few of the most notable: S\/4HANA Public Cloud (MTE), SAP Cloud Platform Portal, SAP SuccessFactors, SAP Integrated Business Planning, SAP Jam Collaboration and SAP Hybris. In addition, SAP Cloud Platform Identity Authentication can serve as a trusted identity provider for Google G Suite.\",\"inLanguage\":\"en-US\"},\"inLanguage\":\"en-US\"},{\"@type\":\"Question\",\"@id\":\"https:\/\/xiting.com\/en\/sap-identity-authentication-service-overview\/#faq-question-1595922834089\",\"position\":5,\"url\":\"https:\/\/xiting.com\/en\/sap-identity-authentication-service-overview\/#faq-question-1595922834089\",\"name\":\"Are there more possible integration scenarios?\",\"answerCount\":1,\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"Yes, there are many others, including:<br\/>- Delegated authentication towards multiple identity providers<br\/>(IDP-initiated authentication).<br\/>- Conditional authentication (partner or subsidiary use-cases).<br\/>- Two-factor authentication options.<br\/>- Risk-based authentication (request two-factor authentication based on the user context).<br\/>- Integration of your Active Directory or ABAP HCM as an IAS user store.<br\/>- Many more \u2013 ask us for further information.\",\"inLanguage\":\"en-US\"},\"inLanguage\":\"en-US\"},{\"@type\":\"Question\",\"@id\":\"https:\/\/xiting.com\/en\/sap-identity-authentication-service-overview\/#faq-question-1595922866546\",\"position\":6,\"url\":\"https:\/\/xiting.com\/en\/sap-identity-authentication-service-overview\/#faq-question-1595922866546\",\"name\":\"How many IAS tenants can we use?\",\"answerCount\":1,\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"he SAP Cloud Platform Identity Authentication Service is provided for most SAP Cloud Essential contracts and requires no separate license or subscription. SAP provides one IAS tenant per customer, regardless of the number of contracts signed in which Identity Authentication is included or bundled. A tenant granted as part of a bundle is not limited in scope, but allows you to use the full functionality that Identity Authentication offers. If a customer has a subscription for a productive instance of Identity Authentication, then the customer can request a second tenant (for testing purposes), which is provided upon request for no additional cost.\",\"inLanguage\":\"en-US\"},\"inLanguage\":\"en-US\"},{\"@type\":\"Question\",\"@id\":\"https:\/\/xiting.com\/en\/sap-identity-authentication-service-overview\/#faq-question-1595922883716\",\"position\":7,\"url\":\"https:\/\/xiting.com\/en\/sap-identity-authentication-service-overview\/#faq-question-1595922883716\",\"name\":\"What exactly is a SAML authentication process?\",\"answerCount\":1,\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"If you open the application in your browser, the request is redirected to the IdP, which will take care of the user authentication. Once the user\u2019s identity is verified, the IdP sends the request back to the application \u2013 including the information about the user. The application can then perform the authorization check based on the verified information about who was sending the request, and decide if the user is allowed to perform the requested operation.\u00a0\",\"inLanguage\":\"en-US\"},\"inLanguage\":\"en-US\"},{\"@type\":\"Question\",\"@id\":\"https:\/\/xiting.com\/en\/sap-identity-authentication-service-overview\/#faq-question-1595922899798\",\"position\":8,\"url\":\"https:\/\/xiting.com\/en\/sap-identity-authentication-service-overview\/#faq-question-1595922899798\",\"name\":\"What is the relation to SAP Cloud Identity Access Governance (IAG)?\u00a0\",\"answerCount\":1,\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"SAP Identity and Access Governance is a separate product. Technically, it re-uses Identity Authentication and Provisioning, but also provides premium features such as segregation of duties, re-certification, and business role management.\",\"inLanguage\":\"en-US\"},\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"SAP Identity Authentication Service: Overview and Integration Capabilities","description":"This blog will focus on the SAP Cloud Platform Identity Authentication Service (IAS) with an overview of its core services and integration capabilities.","robots":{"index":"noindex","follow":"nofollow"},"og_locale":"en_US","og_type":"article","og_title":"SAP Identity Authentication Service (IAS) | Overview and Integration Capabilities","og_description":"Preventing unauthorized access is an important aspect of most enterprise applications, particularly with regard to hybrid SAP landscapes that utilize both","og_url":"https:\/\/xiting.com\/en\/sap-identity-authentication-service-overview\/","og_site_name":"Xiting","article_publisher":"https:\/\/www.facebook.com\/XitingAG","article_published_time":"2020-07-28T07:57:27+00:00","article_modified_time":"2025-10-01T08:52:51+00:00","og_image":[{"width":1280,"height":720,"url":"https:\/\/xiting.com\/wp-content\/uploads\/2020\/07\/cloud-computing.jpg","type":"image\/jpeg"}],"author":"Carsten Olt","twitter_card":"summary_large_image","twitter_creator":"@jsterr@xiting.de","twitter_misc":{"Written by":"Carsten Olt","Est. reading time":"16 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":["Article","BlogPosting"],"@id":"https:\/\/xiting.com\/en\/sap-identity-authentication-service-overview\/#article","isPartOf":{"@id":"https:\/\/xiting.com\/en\/sap-identity-authentication-service-overview\/"},"author":{"name":"Carsten Olt","@id":"https:\/\/xiting.com\/en\/#\/schema\/person\/3c32c7de1132d012e263720a9f3300a2"},"headline":"SAP Identity Authentication Service (IAS) | Overview and Integration Capabilities","datePublished":"2020-07-28T07:57:27+00:00","dateModified":"2025-10-01T08:52:51+00:00","mainEntityOfPage":{"@id":"https:\/\/xiting.com\/en\/sap-identity-authentication-service-overview\/"},"wordCount":3484,"publisher":{"@id":"https:\/\/xiting.com\/en\/#organization"},"image":{"@id":"https:\/\/xiting.com\/en\/sap-identity-authentication-service-overview\/#primaryimage"},"thumbnailUrl":"https:\/\/xiting.com\/wp-content\/uploads\/2020\/07\/cloud-computing.jpg","inLanguage":"en-US"},{"@type":["WebPage","FAQPage"],"@id":"https:\/\/xiting.com\/en\/sap-identity-authentication-service-overview\/","url":"https:\/\/xiting.com\/en\/sap-identity-authentication-service-overview\/","name":"SAP Identity Authentication Service: Overview and Integration Capabilities","isPartOf":{"@id":"https:\/\/xiting.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/xiting.com\/en\/sap-identity-authentication-service-overview\/#primaryimage"},"image":{"@id":"https:\/\/xiting.com\/en\/sap-identity-authentication-service-overview\/#primaryimage"},"thumbnailUrl":"https:\/\/xiting.com\/wp-content\/uploads\/2020\/07\/cloud-computing.jpg","datePublished":"2020-07-28T07:57:27+00:00","dateModified":"2025-10-01T08:52:51+00:00","description":"This blog will focus on the SAP Cloud Platform Identity Authentication Service (IAS) with an overview of its core services and integration capabilities.","breadcrumb":{"@id":"https:\/\/xiting.com\/en\/sap-identity-authentication-service-overview\/#breadcrumb"},"mainEntity":[{"@id":"https:\/\/xiting.com\/en\/sap-identity-authentication-service-overview\/#faq-question-1595922754578"},{"@id":"https:\/\/xiting.com\/en\/sap-identity-authentication-service-overview\/#faq-question-1595922721215"},{"@id":"https:\/\/xiting.com\/en\/sap-identity-authentication-service-overview\/#faq-question-1595922787033"},{"@id":"https:\/\/xiting.com\/en\/sap-identity-authentication-service-overview\/#faq-question-1595922807211"},{"@id":"https:\/\/xiting.com\/en\/sap-identity-authentication-service-overview\/#faq-question-1595922834089"},{"@id":"https:\/\/xiting.com\/en\/sap-identity-authentication-service-overview\/#faq-question-1595922866546"},{"@id":"https:\/\/xiting.com\/en\/sap-identity-authentication-service-overview\/#faq-question-1595922883716"},{"@id":"https:\/\/xiting.com\/en\/sap-identity-authentication-service-overview\/#faq-question-1595922899798"}],"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/xiting.com\/en\/sap-identity-authentication-service-overview\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/xiting.com\/en\/sap-identity-authentication-service-overview\/#primaryimage","url":"https:\/\/xiting.com\/wp-content\/uploads\/2020\/07\/cloud-computing.jpg","contentUrl":"https:\/\/xiting.com\/wp-content\/uploads\/2020\/07\/cloud-computing.jpg","width":1280,"height":720},{"@type":"BreadcrumbList","@id":"https:\/\/xiting.com\/en\/sap-identity-authentication-service-overview\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/xiting.com\/en\/"},{"@type":"ListItem","position":2,"name":"SAP Identity Authentication Service (IAS) | Overview and Integration Capabilities"}]},{"@type":"WebSite","@id":"https:\/\/xiting.com\/en\/#website","url":"https:\/\/xiting.com\/en\/","name":"Xiting","description":"Your Expert for SAP Security","publisher":{"@id":"https:\/\/xiting.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/xiting.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/xiting.com\/en\/#organization","name":"Xiting","url":"https:\/\/xiting.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/xiting.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/xiting.com\/wp-content\/uploads\/2019\/08\/xiting-logo.svg","contentUrl":"https:\/\/xiting.com\/wp-content\/uploads\/2019\/08\/xiting-logo.svg","width":1,"height":1,"caption":"Xiting"},"image":{"@id":"https:\/\/xiting.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/XitingAG","https:\/\/www.linkedin.com\/company\/1345129\/","https:\/\/www.instagram.com\/xiting.global\/"]},{"@type":"Person","@id":"https:\/\/xiting.com\/en\/#\/schema\/person\/3c32c7de1132d012e263720a9f3300a2","name":"Carsten Olt","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/2c35c3b7ce5d81579234be25ef570938712ba95e2cb8e87f2a79b81be928499a?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/2c35c3b7ce5d81579234be25ef570938712ba95e2cb8e87f2a79b81be928499a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/2c35c3b7ce5d81579234be25ef570938712ba95e2cb8e87f2a79b81be928499a?s=96&d=mm&r=g","caption":"Carsten Olt"},"description":"Carsten Olt has been working as a Managing SAP Security Consultant since 2016, responsible for Secure Authentication &amp; SSO and SAP Cloud Security Services at Xiting in Germany. As a member of the IAM team, he is also a team leader who conveys the company's goals and strategies to employees and has organizational responsibility. With a security-minded approach, Carsten has international project and IT security experience in many industries. He has been working in IT-Security since 2001, specializing in SAP security since 2010. He is a subject matter expert for SAP Single Sign-On 3.0 and a trainer for the WDESSO course. His current focus is on supporting customers in solving authentication and security challenges within hybrid SAP landscapes, as well as designing and implementing holistic authentication concepts. Carsten is an ISACA CISA and a former MCP and RHCE with an ISP background, and he looks at security from different angles. He also translates between SAP and IT security vocabulary. Carsten has in-depth experience in multi-vendor architectures and MSFT\/Azure components, dealing with all the requirements concerning SAML 2.0, OAuth, OpenID Connect, SCIM, X.509 CBA &amp; PKI, MFA, SAP SSO, and Secure Network Communications, Kerberos\/SPNEGO, data security and encryption, as well as digital signatures. Carsten is experienced in SAP on-premises components such as S\/4HANA, ABAP, and Java, as well as security solutions like SSO 3.0. Since 2019, he has focused on SAP-Cloudified environments, specifically the SAP Cloud Identity Services and SAP BTP, as well as SaaS integrations concerning IAM. He deals with hybrid SAP security in conjunction with Azure Active Directory, ADDS, ADFS, ADCS, Reverse Proxies\/WAF, SAP Web Dispatcher, SAP Cloud Connector, third-party products, and infrastructure components.","sameAs":["https:\/\/x.com\/jsterr@xiting.de"],"url":"https:\/\/xiting.com\/en\/author\/carsten-olt\/"},{"@type":"Question","@id":"https:\/\/xiting.com\/en\/sap-identity-authentication-service-overview\/#faq-question-1595922754578","position":1,"url":"https:\/\/xiting.com\/en\/sap-identity-authentication-service-overview\/#faq-question-1595922754578","name":"What are the SAP Cloud Identity Services?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"The SAP Cloud Identity Services provide basic capabilities for user authentication and provisioning, which is a core requirement for all integration and\/or extension scenarios of the Intelligent Enterprise. SAP Cloud Identity Services consist of two main components: Identity Authentication and Identity Provisioning, with more components being planned for future release.<br\/><br\/>You can find further information about the transition of SAP IAS and SAP IPS into the SAP Cloud Identity Services in <a href=\"https:\/\/blogs.sap.com\/2020\/06\/24\/evolving-identity-authentication-and-identity-provisioning-into-sap-cloud-identity-services\/\">this blog post from SAP<\/a>.","inLanguage":"en-US"},"inLanguage":"en-US"},{"@type":"Question","@id":"https:\/\/xiting.com\/en\/sap-identity-authentication-service-overview\/#faq-question-1595922721215","position":2,"url":"https:\/\/xiting.com\/en\/sap-identity-authentication-service-overview\/#faq-question-1595922721215","name":"What is SAP Cloud Platform Identity Authentication?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Identity Authentication is a cloud service for authentication, single sign-on, and user management in SAP cloud and on-premise applications. It can act as an identity provider itself, or be used as a proxy to integrate with an existing single sign-on infrastructure. More information can be found <a href=\"https:\/\/community.sap.com\/topics\/cloud-platform-identity-authentication\">here<\/a>.","inLanguage":"en-US"},"inLanguage":"en-US"},{"@type":"Question","@id":"https:\/\/xiting.com\/en\/sap-identity-authentication-service-overview\/#faq-question-1595922787033","position":3,"url":"https:\/\/xiting.com\/en\/sap-identity-authentication-service-overview\/#faq-question-1595922787033","name":"What is SAP Cloud Platform Identity Provisioning?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Identity Provisioning offers a comprehensive, low-cost approach to identity lifecycle management in the cloud. It helps you provision identities and their authorizations to various cloud and on-premise business applications. SAP IPS is based on the SCIM standard (System for Cross-Domain Identity Management), which means you no longer need to develop specific connectors for each target application.","inLanguage":"en-US"},"inLanguage":"en-US"},{"@type":"Question","@id":"https:\/\/xiting.com\/en\/sap-identity-authentication-service-overview\/#faq-question-1595922807211","position":4,"url":"https:\/\/xiting.com\/en\/sap-identity-authentication-service-overview\/#faq-question-1595922807211","name":"Which applications can be used with SAP IAS?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"You need to distinguish between the applications that are pre-bundled with SAP IAS and those that are not. For the pre-integrated applications, the default authentication and identity service is provided by SAP Cloud Platform Identity Authentication Service.\u00a0<br\/><br\/>In general, any SAML 2.0 compatible web application running in the cloud (SaaS app) could be integrated with the SAP Cloud Platform Identity Authentication Service, which is now part of the SAP Cloud Identity Services. Of course you can use SAP IAS to integrate with your on-premise web applications as well, such as SAP HANA, SAP BusinessObjects, SAP Fiori, and almost any ICF service running on your SAP systems.<br\/><br\/><strong>Tip: <\/strong>Currently, SAP does not provide a full list of compatible applications. But here are a few of the most notable: S\/4HANA Public Cloud (MTE), SAP Cloud Platform Portal, SAP SuccessFactors, SAP Integrated Business Planning, SAP Jam Collaboration and SAP Hybris. In addition, SAP Cloud Platform Identity Authentication can serve as a trusted identity provider for Google G Suite.","inLanguage":"en-US"},"inLanguage":"en-US"},{"@type":"Question","@id":"https:\/\/xiting.com\/en\/sap-identity-authentication-service-overview\/#faq-question-1595922834089","position":5,"url":"https:\/\/xiting.com\/en\/sap-identity-authentication-service-overview\/#faq-question-1595922834089","name":"Are there more possible integration scenarios?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Yes, there are many others, including:<br\/>- Delegated authentication towards multiple identity providers<br\/>(IDP-initiated authentication).<br\/>- Conditional authentication (partner or subsidiary use-cases).<br\/>- Two-factor authentication options.<br\/>- Risk-based authentication (request two-factor authentication based on the user context).<br\/>- Integration of your Active Directory or ABAP HCM as an IAS user store.<br\/>- Many more \u2013 ask us for further information.","inLanguage":"en-US"},"inLanguage":"en-US"},{"@type":"Question","@id":"https:\/\/xiting.com\/en\/sap-identity-authentication-service-overview\/#faq-question-1595922866546","position":6,"url":"https:\/\/xiting.com\/en\/sap-identity-authentication-service-overview\/#faq-question-1595922866546","name":"How many IAS tenants can we use?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"he SAP Cloud Platform Identity Authentication Service is provided for most SAP Cloud Essential contracts and requires no separate license or subscription. SAP provides one IAS tenant per customer, regardless of the number of contracts signed in which Identity Authentication is included or bundled. A tenant granted as part of a bundle is not limited in scope, but allows you to use the full functionality that Identity Authentication offers. If a customer has a subscription for a productive instance of Identity Authentication, then the customer can request a second tenant (for testing purposes), which is provided upon request for no additional cost.","inLanguage":"en-US"},"inLanguage":"en-US"},{"@type":"Question","@id":"https:\/\/xiting.com\/en\/sap-identity-authentication-service-overview\/#faq-question-1595922883716","position":7,"url":"https:\/\/xiting.com\/en\/sap-identity-authentication-service-overview\/#faq-question-1595922883716","name":"What exactly is a SAML authentication process?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"If you open the application in your browser, the request is redirected to the IdP, which will take care of the user authentication. Once the user\u2019s identity is verified, the IdP sends the request back to the application \u2013 including the information about the user. The application can then perform the authorization check based on the verified information about who was sending the request, and decide if the user is allowed to perform the requested operation.\u00a0","inLanguage":"en-US"},"inLanguage":"en-US"},{"@type":"Question","@id":"https:\/\/xiting.com\/en\/sap-identity-authentication-service-overview\/#faq-question-1595922899798","position":8,"url":"https:\/\/xiting.com\/en\/sap-identity-authentication-service-overview\/#faq-question-1595922899798","name":"What is the relation to SAP Cloud Identity Access Governance (IAG)?\u00a0","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"SAP Identity and Access Governance is a separate product. Technically, it re-uses Identity Authentication and Provisioning, but also provides premium features such as segregation of duties, re-certification, and business role management.","inLanguage":"en-US"},"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/xiting.com\/en\/wp-json\/wp\/v2\/posts\/11366","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/xiting.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/xiting.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/xiting.com\/en\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/xiting.com\/en\/wp-json\/wp\/v2\/comments?post=11366"}],"version-history":[{"count":7,"href":"https:\/\/xiting.com\/en\/wp-json\/wp\/v2\/posts\/11366\/revisions"}],"predecessor-version":[{"id":51347,"href":"https:\/\/xiting.com\/en\/wp-json\/wp\/v2\/posts\/11366\/revisions\/51347"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/xiting.com\/en\/wp-json\/wp\/v2\/media\/11116"}],"wp:attachment":[{"href":"https:\/\/xiting.com\/en\/wp-json\/wp\/v2\/media?parent=11366"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/xiting.com\/en\/wp-json\/wp\/v2\/categories?post=11366"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/xiting.com\/en\/wp-json\/wp\/v2\/tags?post=11366"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}