System Landscapes and Identity Access Management (IAM) focuses on understanding the architecture of SAP S/4HANA Cloud and managing user roles and access securely.
A system landscape in SAP refers to the arrangement of different systems required to implement, test, and run SAP S/4HANA Cloud. This architecture ensures a smooth and controlled deployment while enabling configuration, testing, and live operations.
In SAP S/4HANA Cloud, there is a three-system landscape to support implementation and operations. Each system serves a specific purpose:
Development System (DEV):
Example Task: Configuring a new Approval Workflow for purchase requisitions.
Quality Assurance System (QAS):
Example Task: Validating that a purchase order (PO) approval workflow functions correctly by simulating different approval steps.
Production System (PRD):
Example Task: Posting a supplier invoice after goods have been received in the live environment.
Key Takeaways for Beginners:
SAP Central Business Configuration (CBC) is a cloud-based tool used to configure SAP S/4HANA Cloud. It centralizes the setup process and ensures consistency across the system landscape.
Guided Configuration Steps:
Cross-System Configuration Consistency:
Change Management for Iterative Configurations:
The transport mechanism refers to the process of moving configurations and changes from one system to another in a controlled manner.
Development System (DEV):
Quality Assurance System (QAS):
Production System (PRD):
Identity and Access Management (IAM) ensures that users can securely access SAP S/4HANA Cloud based on their roles and responsibilities. It also ensures compliance with data protection and security policies.
SAP Identity Authentication Service (IAS) simplifies and secures user authentication.
Single Sign-On (SSO):
Integration with Corporate Identity Providers:
Enhanced Security:
SAP Identity Provisioning Service (IPS) automates the process of assigning roles and permissions to users.
Automated User Provisioning:
De-Provisioning of Users:
Synchronization Across Systems:
Role-Based Access Control (RBAC) ensures that users can only access applications and data relevant to their job responsibilities.
Business Roles:
Technical Roles:
Assign SAP-Delivered Roles:
Create Custom Roles:
Monitor Role Assignments:
Effective IAM configuration is essential to ensure that users in SAP S/4HANA Cloud have appropriate access to perform their tasks while maintaining data security and compliance. Below are the key configuration tasks for user and role management:
SAP provides predefined business roles that align with standard business processes. These roles grant users access to specific SAP Fiori applications based on their job responsibilities.
Steps to Assign SAP-Delivered Roles:
Access the Maintain Business Roles App:
Search for SAP-Delivered Roles:
Assign Roles to Users:
Test Role Assignments:
Sometimes, standard SAP roles may not completely meet your organization’s requirements. You can create custom roles tailored to specific needs.
Steps to Create a Custom Role:
Access the Maintain Business Roles App:
Copy an Existing Role (Optional):
Adjust Role Permissions:
Add Restrictions (Optional):
Test the Custom Role:
Monitoring user activities is essential for maintaining system security and compliance. SAP S/4HANA Cloud provides tools to track user access and detect any unauthorized activities.
Key Tasks for Monitoring:
Review User Access Logs:
Compliance Audits:
Track Changes:
The SAP Fiori Launchpad serves as the central interface for users in SAP S/4HANA Cloud. User access to Fiori apps is controlled by role assignments, ensuring that users only see apps relevant to their job roles.
Example:
Personalization for Users:
Customizing App Layouts:
Restrict Access to Apps:
Simplified Access:
Improved Security:
Productivity:
Consistency:
To understand how IAM and the SAP Fiori Launchpad work together, let’s go through an example for a Buyer role:
Step 1: Assign the Buyer Role (SAP_BR_BUYER):
Step 2: Verify Role-Based Access in the Launchpad:
Step 3: Customize and Test Access:
Step 4: Monitor User Activity:
This section expands on SAP system landscapes, Identity and Access Management (IAM), emergency access management, segregation of duties, and SAP Fiori Launchpad security to provide a deeper understanding of security and system architecture in SAP S/4HANA Cloud.
SAP S/4HANA Cloud Public Edition typically uses a three-system landscape, but for SAP S/4HANA Cloud Private Edition or Hybrid Deployments, a four-system landscape may be implemented.
| System | Purpose |
|---|---|
| Sandbox (SBX) (Optional) | Used for experimentation, proof of concept (PoC), and training without affecting development configurations. |
| Development (DEV) | Used for system configuration, custom development, and initial testing before moving changes to QAS. |
| Quality Assurance (QAS) | Used for integration testing, User Acceptance Testing (UAT), and performance validation. |
| Production (PRD) | The live system where real business transactions are conducted. |
| Feature | Public Edition (3-System) | Private Edition (4-System) |
|---|---|---|
| Custom Development | Limited to In-App Extensibility | Supports ABAP custom development |
| Upgrade Control | SAP-managed quarterly updates | Customer controls update schedule |
| Sandbox Environment | Not included | Recommended for complex deployments |
| System Modifications | Standardized Fit-to-Standard approach | Custom modifications allowed |
Zero Trust Security is a modern approach to cybersecurity where access is granted only based on identity verification and strict access policies.
| Concept | Description | Example |
|---|---|---|
| Authentication | Users must verify their identity through Multi-Factor Authentication (MFA) or Single Sign-On (SSO). | SAP IAS (Identity Authentication Service) + Azure AD MFA |
| Authorization | Access is granted based on roles (Role-Based Access Control, RBAC) and restricted based on conditions. | Users can access SAP only from approved corporate networks. |
| Continuous Monitoring | User behavior is monitored in real-time to detect unauthorized activities. | SAP Cloud Identity Access Governance (IAG) monitors access patterns. |
SAP provides Emergency Access Management (EAM), also known as Firefighter ID (FFID), for situations where temporary high-level access is required.
| Feature | Description |
|---|---|
| Firefighter ID (FFID) | Provides temporary high-level access for emergency troubleshooting. |
| SAP Access Control (GRC) | Ensures that FFID usage is logged and audited to prevent abuse. |
| Emergency Logging & Reports | All EAM access sessions are monitored, recorded, and reviewed. |
Segregation of Duties (SoD) prevents fraud and errors by ensuring that one user does not control multiple critical steps in a business process.
| Risk | Potential Issue | SoD Solution |
|---|---|---|
| A buyer can both create and approve purchase orders. | Fraud risk – Users can approve their own purchases. | Separate Buyer and Approver roles. |
| A finance user can both create and pay supplier invoices. | Risk of unauthorized payments. | Require dual approval for payments. |
| A logistics user can modify supplier bank details. | Risk of redirecting payments to fraudulent accounts. | Restrict supplier bank updates to Finance team. |
SAP Fiori Launchpad is the primary user interface for SAP S/4HANA Cloud. Security is managed through Business Catalogs and Business Groups.
| Feature | Description | Example |
|---|---|---|
| Business Catalog | A collection of related Fiori apps assigned to a user role. | “Purchase Order Management” catalog includes “Manage Purchase Orders” and “Approve Purchase Requisitions.” |
| Business Role | A set of permissions defining what a user can do. | “Buyer” role is assigned the “Procurement” Business Catalog. |
| Restrictions | Limits user access based on company codes, plants, or locations. | Only users in Germany can access German purchase orders. |
| Feature | Description | Example |
|---|---|---|
| Business Groups | Organizes apps into functional groups for easier navigation. | A Procurement Group contains “Create PR” and “Monitor Suppliers” tiles. |
This supplementary knowledge provides a stronger understanding of system landscapes, IAM, EAM, SoD, and Fiori security in SAP S/4HANA Cloud.
What are the key systems in an S/4HANA Cloud system landscape?
The key systems are Starter System, Quality System, and Production System.
The Starter System is used for initial exploration and Fit-to-Standard workshops. The Quality System is used for configuration and testing, while Production handles live operations. Confusion often arises about when to use each system. The Starter System is temporary and not used for real configuration transport.
Demand Score: 80
Exam Relevance Score: 92
What is the role of Identity Authentication Service (IAS) in SAP Cloud?
IAS handles user authentication and provides single sign-on capabilities.
IAS integrates with S/4HANA Cloud to manage login authentication. It is often confused with IPS, which handles user provisioning. Misunderstanding these roles leads to access issues.
Demand Score: 82
Exam Relevance Score: 90
Why might a user not see an app in the SAP Fiori Launchpad?
The issue is typically due to missing business roles, catalogs, or group assignments.
Access to apps depends on proper role configuration. Users often assign roles but forget catalogs or spaces. This results in missing tiles. Troubleshooting requires checking role-to-catalog assignments and user role assignment.
Demand Score: 81
Exam Relevance Score: 93
What is the difference between business roles and business catalogs?
Business roles are assigned to users, while catalogs contain the apps and are assigned to roles.
This distinction is fundamental in IAM. A common mistake is assigning catalogs directly to users, which is not supported. Roles act as containers for catalogs and define access.
Demand Score: 79
Exam Relevance Score: 91