Transcript
Page 1: SAP BusinessObjects GRC 10.0 Integration Guide – Access Control 10.0 and NetWeaver Identity Management

SAP ® BusinessObjects™ Access Control 10 and

SAP NetWeaver® Identity ManagementImplementation Guide

Ankur Baishya – Customer Solution Adoption

Page 2: SAP BusinessObjects GRC 10.0 Integration Guide – Access Control 10.0 and NetWeaver Identity Management

© 2011 SAP AG. All rights reserved. 2

Contents

Role of Access Control vs. IdM

Compliant Identity Management

Key Enhancements in AC10

Implementation Considerations

Available AC10 Web Services

Common Integration Scenarios

Available Documentation

Page 3: SAP BusinessObjects GRC 10.0 Integration Guide – Access Control 10.0 and NetWeaver Identity Management

© 2011 SAP AG. All rights reserved. 3

What Is the Role of Access Control vs. IdM?

CFO

Business Controls

CIO

Systems Access

Systems Connectors

Authentication and Single Sign-On

Identity Federation

Governance over identity data and

authentication data

Access Governance

Access Risk Analysis

Compliance Reviews

Compliance Reporting

SAP

BusinessObjects

Access Control

Identity

Management

Compliant identity management for the entire system landscape.

Business Layer IT Infrastructure

Page 4: SAP BusinessObjects GRC 10.0 Integration Guide – Access Control 10.0 and NetWeaver Identity Management

© 2011 SAP AG. All rights reserved. 4

Compliant Identity ManagementExample - Customer Scenario

Reduce TCO by simplifying assignment of roles and privileges to users, triggered by

HR events

Reduce risk through compliance checks and remediation

Automate manual processes through integration

Identity Management

Calculate Entitlements

Based on Position

HR Application

New Hire

/ Change

Position

Line Manager

No

Approve

Assignments

Create User

Assign Roles

Create User

Assign Roles

Create User

Assign Roles

Heterogeneous

Landscape

Yes

SAP BusinessObjects

Access Control

Compliance Check

Remediation

Create User

Assign Privileges

Page 5: SAP BusinessObjects GRC 10.0 Integration Guide – Access Control 10.0 and NetWeaver Identity Management

© 2011 SAP AG. All rights reserved. 5

Request Form and Request Submission

Automatic request creation from IdM integration (SAP or non-SAP)

Flexible and dynamic end-user request form, based on user and systems accessed

Create requests for position-based role assignment

End user features for viewing existing assignments, checking request history, viewing profiles

Request Approval Process and Provisioning

Support for additional system provisioning through IdM integration (SAP or non-SAP)

Improved navigation and usability including customization of approver view based on stage

Displays role risk and transaction information in request

Provisioning of additional entities such as business roles, PD profiles and groups, and system-

specific custom fields

Access Control 10 User Provisioning

Key Enhancements

Page 6: SAP BusinessObjects GRC 10.0 Integration Guide – Access Control 10.0 and NetWeaver Identity Management

© 2011 SAP AG. All rights reserved. 6

Access Control 10 and IdM-Driven Integrated ProvisioningKey Enhancements

Improved communication between IdM and AC that enables a complete view of request

approval process

IdM able to perform real-time access risk analysis, prior to submitting request for remediation

Improved infrastructure to support standard SPML1.0 protocol for all outbound

communication from AC

In addition to SAP‘s own Identity Management solution, we are actively working with our Identity

Management partners to ensure they have their corresponding releases ready, and take

advantage of the new functionality.

Page 7: SAP BusinessObjects GRC 10.0 Integration Guide – Access Control 10.0 and NetWeaver Identity Management

© 2011 SAP AG. All rights reserved. 7

Access Control 10 and IdM Integration Implementation Considerations

Request submission source

From where will the provisioning request be initiated (AC and/or IdM)?

Provisioning roles

Role source: Where will the roles for provisioning be maintained (AC and/or IdM)?

Preferred approach is to have one role source for SAP roles.

Approval workflow

Do you want to use approval workflow within AC and/or IdM?

Need to consider user notifications from AC and/or IdM

Risk analysis

When provisioning new users, the request does not have to be submitted to AC for risk analysis and no polling is required. IdM can retrieve the result by also polling the risk analysis web service with Request ID.

When provisioning existing users, risk analysis can be called by IdM.

Request status and audit trails

Consider requirements for request status and audit trails while defining the integration solution. (Web services can only pass certain fields while more details may be viewed natively in AC or IdM.)

Existing functionality and change control

IdM’s change control policy and its impact on solution and implementation: Are changes to the current IdM process realistic?

Page 8: SAP BusinessObjects GRC 10.0 Integration Guide – Access Control 10.0 and NetWeaver Identity Management

© 2011 SAP AG. All rights reserved. 8

Sr

No

Interface Description Inbound/Outbound Mandatory/

Optional

1 Lookup service Enables lookup for possible values for a use case

Example: Possible values for Request Status

Inbound Optional

2 Search roles Enables search roles before submitting a request to

GRC

Inbound Optional

3 Role Details Returns detailed role description and associated

attributes of the selected role

Inbound Optional

4 Select Applications Returns a list of resources configured within GRC Inbound Optional

5 Firefighter Returns list of Firefighter IDs along with Firefighter

Owner details

Inbound Optional

6 User’s Existing Assignments Returns the existing User Assignments Inbound Optional

7 User Access Request Defines the web service that will be called by IdM for

User Access

Inbound Manual

8 Risk analysis

(with request ID)

Performs segregation of duty (SoD) analysis on a

request submitted to GRC or on the assignment of an

existing user

Inbound Optional

9 Organization Assignment

Request

Enables IDMS to assign roles to OM Objects such as

Job, Position, and Organizational Unit.

Inbound Optional

Access Control 10Available Web Services

Page 9: SAP BusinessObjects GRC 10.0 Integration Guide – Access Control 10.0 and NetWeaver Identity Management

© 2011 SAP AG. All rights reserved. 9

Interface Description Inbound/Outbound Mandatory/

Optional

Provisioning by GRC after request approval

10 Exit – User Access Request Defines the service that will be called by GRC to

inform IdM about provisioning results

Outbound Mandatory

11 Provisioning Log Returns all the provisioning information for a user. It

helps to determine if the user was created, change, or

deleted or whether the role was added or removed.

Inbound Optional

12 Request status Returns the status of a request Inbound Optional

13 Audit Logs Returns workflow information about paths, stages,

and/or stage approvers. Also returns provisioning

information

Inbound Optional

14 Request Details Returns the request details along with Risk Analysis Inbound Optional

15 Risk Analysis (Without Request

Number)

Performs SoD analysis for User Level and Role Level Inbound Optional

16 End User Personalization

Configuration

Returns EUP configuration details for a user Inbound Optional

Access Control 10Available Web Services

Page 10: SAP BusinessObjects GRC 10.0 Integration Guide – Access Control 10.0 and NetWeaver Identity Management

© 2011 SAP AG. All rights reserved. 10

Access Control 10

Available Web Services (Technical Names)

Web Service Web Service Name

Inbound - Lookup GRAC_LOOKUP_WS

Inbound - Select Applications GRAC_SELECT_APPL_WS

Inbound - Firefighter GRAC_FIRE_FIGHTER_WS

Inbound - Search Roles GRAC_SEARCH_ROLES_WS

Inbound - Search Role Details GRAC_ROLE_DETAILS_WS

Inbound - User Existing Assignments GRAC_USER_EXISTING_ASSGN_WS

Inbound - User Access Request GRAC_USER_ACCES_WS

Inbound - User Access Request Status GRAC_REQUEST_STATUS_WS

Inbound - User Access Request Details GRAC_REQUEST_DETAILS_WS

Inbound - Provision Logs GRAC_PROV_LOGS_WS

Inbound - Audit Trails GRAC_AUDIT_LOGS_WS

Inbound - Risk Analysis with Request Number GRAC_RISK_ANALYSIS_WITH_NO_WS

Inbound - Risk Analysis without Request Number GRAC_RISK_ANALYSIS_WOUT_NO_WS

Inbound - Exit from IdM GRAC_EXIT_FROM_IDM_WS

Inbound - Org Assignments GRAC_ORG_ASSGN_REQUEST_WS

Inbound - EUP Configuration GRAC_EUP_CONFIG_DATA_WS

Page 11: SAP BusinessObjects GRC 10.0 Integration Guide – Access Control 10.0 and NetWeaver Identity Management

© 2011 SAP AG. All rights reserved. 11

Interface Description Type

[Inbound/Outbound]

Mandatory/Optional

IdM Prov/De-provisioning

requestProvisioning/De-provisioning

Request to IdM

Outbound Mandatory

IdM Prov/De-provisioning

request Status

Status of Provisioning/ De-

provisioning request

Outbound Mandatory

IdM Prov/De-provisioning

request

– Exit service

Provisioning/De-provisioning

Request to IdM

Inbound Mandatory

Audit Log from IdM

(This web service will be

published by IdM to

provide audit log details on

the provisioning actions

performed in IdM)

Audit log details from IdM Outbound Optional

Provisioning Operations supported:

Create User

Assign Roles

Change User

Lock/Unlock User

Delete User

Password Self-Service

Access Control 10Actions to/from IdM

Page 12: SAP BusinessObjects GRC 10.0 Integration Guide – Access Control 10.0 and NetWeaver Identity Management

© 2011 SAP AG. All rights reserved. 12

Business Process Legend

Business

Process Owner

Technical Team

Compliance /

Audit Team

Roles involved in process

Business process

Step 2

Step 3

Step 1

Alternate color indicates

connection to another

process

Dotted line indicates

optional step which can

be performed by two

separate process.

Step 4

Alternate color indicates

new integration step

Overlap of roles indicates

collaboration and/or process step

completed by either role

Page 13: SAP BusinessObjects GRC 10.0 Integration Guide – Access Control 10.0 and NetWeaver Identity Management

© 2011 SAP AG. All rights reserved. 13

Access Control 10 User Provisioning

Requestor

Approvers

Create &

Submit

Access

Request

Approve

Request?

Manage

Access RisksReview

Request

Modify Request

No

Perform Risk

Analysis

Yes

YesYes

Request

Modified?

Risk

Violations?

User

Provisioning

YesNo

Reject

Request

Request

Closed

No No

Appropriate

Access?

Page 14: SAP BusinessObjects GRC 10.0 Integration Guide – Access Control 10.0 and NetWeaver Identity Management

© 2011 SAP AG. All rights reserved. 14

Access Control 10-Driven User ProvisioningIdM Integration

AC

Requestor

AC

Approver

IdM Approver

Create an

Access

Request

Appropriate

Access?

Review

RequestPerform Risk

Analysis

Request

Modified?

Risk

Violations?

Approve

Request?User

Provisioning

Reject

Request

Request

Closed

Manage Risk

Update

Provisioning

Status

Yes

Yes

Yes

No

Yes

No

No

Request

Status and

Audit Log

Reporting

Provisioning

SAP/Non-SAP

Applications

Provisioning

SAP/Non-SAP

Applications

No

Page 15: SAP BusinessObjects GRC 10.0 Integration Guide – Access Control 10.0 and NetWeaver Identity Management

© 2011 SAP AG. All rights reserved. 15

IdM-Driven User ProvisioningAccess Control 10 Integration

AC Approver

IdM Approver

IdM Requestor

Approve

Request?

No

Yes

Create an

Access Request

Review

RequestAppropriate

Access?

Request

Modified?

Perform Risk

Analysis

Risk

Violations?Approve

Request?

User

Provisioning

Request

Closed

Reject

Request

Provisioning

SAP/Non-SAP

Applications

Provisioning

SAP/ Non-SAP

Applications

Perform Risk

Analysis

Create an

Access

Request

Manage Risk

User

Provisioning

Update

Provisioning

Status

Yes

No

No

No

No

Yes

Yes

Request

Status and

Audit Log

Reporting

Page 16: SAP BusinessObjects GRC 10.0 Integration Guide – Access Control 10.0 and NetWeaver Identity Management

© 2011 SAP AG. All rights reserved. 16

Further Information and Available Documentation

SAP Public Web

SAP Developer Network (SDN): www.sdn.sap.com

Business Process Expert (BPX) Community: www.bpx.sap.com

SAP BusinessObjects Community (BOC): www.boc.sap.com

SAP GRC: www.sap.com/grc

GRC-Related Documentation

SAP GRC Help: help.sap.com/content/bobj/grc/docu_bobj_grc_intro.htm

GRC How-to Guides: www.sdn.sap.com/irj/scn/articles-grc-all

NetWeaver IdM-Related Documentation

SAP NetWeaver Help:

help.sap.com/content/documentation/netweaver/docu_nw_idm_design.htm#idm72

Page 17: SAP BusinessObjects GRC 10.0 Integration Guide – Access Control 10.0 and NetWeaver Identity Management

© 2011 SAP AG. All rights reserved. 17

No part of this publication may be reproduced or transmitted in any form or for any

purpose without the express permission of SAP AG. The information contained

herein may be changed without prior notice.

Some software products marketed by SAP AG and its distributors contain

proprietary software components of other software vendors.

Microsoft, Windows, Excel, Outlook, and PowerPoint are registered trademarks of

Microsoft Corporation.

IBM, DB2, DB2 Universal Database, System i, System i5, System p, System p5,

System x, System z, System z10, System z9, z10, z9, iSeries, pSeries, xSeries,

zSeries, eServer, z/VM, z/OS, i5/OS, S/390, OS/390, OS/400, AS/400, S/390

Parallel Enterprise Server, PowerVM, Power Architecture, POWER6+, POWER6,

POWER5+, POWER5, POWER, OpenPower, PowerPC, BatchPipes, BladeCenter,

System Storage, GPFS, HACMP, RETAIN, DB2 Connect, RACF, Redbooks, OS/2,

Parallel Sysplex, MVS/ESA, AIX, Intelligent Miner, WebSphere, Netfinity, Tivoli and

Informix are trademarks or registered trademarks of IBM Corporation.

Linux is the registered trademark of Linus Torvalds in the U.S. and other countries.

Adobe, the Adobe logo, Acrobat, PostScript, and Reader are either trademarks or

registered trademarks of Adobe Systems Incorporated in the United States and/or

other countries.

Oracle and Java are registered trademarks of Oracle and/or its affiliates.

UNIX, X/Open, OSF/1, and Motif are registered trademarks of the Open Group.

Citrix, ICA, Program Neighborhood, MetaFrame, WinFrame, VideoFrame, and

MultiWin are trademarks or registered trademarks of Citrix Systems, Inc.

© 2011 SAP AG. All rights reserved.

HTML, XML, XHTML and W3C are trademarks or registered trademarks of W3C®,

World Wide Web Consortium, Massachusetts Institute of Technology.

SAP, R/3, SAP NetWeaver, Duet, PartnerEdge, ByDesign, SAP BusinessObjects

Explorer, StreamWork, and other SAP products and services mentioned herein as

well as their respective logos are trademarks or registered trademarks of SAP AG in

Germany and other countries.

Business Objects and the Business Objects logo, BusinessObjects, Crystal

Reports, Crystal Decisions, Web Intelligence, Xcelsius, and other Business Objects

products and services mentioned herein as well as their respective logos are

trademarks or registered trademarks of Business Objects Software Ltd. Business

Objects is an

SAP company.

Sybase and Adaptive Server, iAnywhere, Sybase 365, SQL Anywhere, and other

Sybase products and services mentioned herein as well as their respective logos

are trademarks or registered trademarks of Sybase, Inc. Sybase is an SAP

company.

All other product and service names mentioned are the trademarks of their

respective companies. Data contained in this document serves informational

purposes only. National product specifications may vary.

The information in this document is proprietary to SAP. No part of this document

may be reproduced, copied, or transmitted in any form or for any purpose without

the express prior written permission of SAP AG.


Recommended