Published on 23 February 2012, updated 19 March 2012
ISBN-10: 0738436569
ISBN-13: 9780738436562
IBM Form #: SG24-8015-00
Authors: Axel Buecker, Ivy Chiu, Kenny Chow, Ingo Dressler, Anthony Ferguson, Vaughan Harper, David Moore, Zoran Radenkovic, Guy Redding, John Robinson, Sascha Schefenacker and Franz Wolfhagen
Many large and medium-sized organizations have made strategic investments in the SAP NetWeaver technology platform as their primary application platform. In fact, SAP software is used to manage many core business processes and data. As a result, it is critical for all organizations to manage the life cycle of user access to the SAP applications while adhering to security and risk compliance requirements.
In this IBM® Redbooks® publication, we discuss the integration points into SAP solutions that are supported by the IBM Security access and identity management product capabilities. IBM Security software offers a range of identity management (IdM) adapters and access management components for SAP solutions that are available with IBM Tivoli® Identity Manager, IBM Tivoli Directory Integrator, IBM Tivoli Directory Server, IBM Access Manager for e-business, IBM Tivoli Access Manager for Enterprise Single Sign-On, and IBM Tivoli Federated Identity Manager.
This book is a valuable resource for security officers, consultants, administrators, and architects who want to understand and implement an identity management solution for an SAP environment.
Part 1. Business context and SAP solution overview
Chapter 1. Business context for SAP security integration
Chapter 2. Introduction to SAP solutions and security technology
Part 2. Identity management integration
Chapter 3. IBM Security identity management offerings
Chapter 4. IBM Tivoli Identity Manager
Chapter 5. IBM Tivoli Directory Integrator
Chapter 6. IBM Tivoli Directory Server
Chapter 7. Identity management use cases
Part 3. Access management integration
Chapter 8. IBM Security access management offerings
Chapter 9. IBM Tivoli Access Manager for Enterprise Single Sign-on
Chapter 10. IBM Tivoli Access Manager for e-business
Chapter 11. IBM Tivoli Federated Identity Manager
Chapter 12. Access management use cases
Appendix A. IBM Security systems integrations: Beyond identity and access management