Many large and medium-sized organizations have made strategic investments in the SAP NetWeaver technology platform as their primary application platform. In fact, SAP software is used to manage many core business processes and data. As a result, it is critical for all organizations to manage the life cycle of user access to the SAP applications while adhering to security and risk compliance requirements. In this IBMAr RedbooksAr publication, we discuss the integration points into SAP solutions that are supported by the IBM Security access and identity management product capabilities. IBM Security software offers a range of identity management (IdM) adapters and access management components for SAP solutions that are available with IBM TivoliAr Identity Manager, IBM Tivoli Directory Integrator, IBM Tivoli Directory Server, IBM Access Manager for e-business, IBM Tivoli Access Manager for Enterprise Single Sign-On, and IBM Tivoli Federated Identity Manager. This book is a valuable resource for security officers, consultants, administrators, and architects who want to understand and implement an identity management solution for an SAP environment.The profile_SAP_GUI remains in the state_setup state until the SAP GUI main window appears. ... The particular entity injected depends on the number of screen fields supported by the profile (see 9.6.2, aNumber of capture or injection fieldsaanbsp;...
|Title||:||Integrating IBM Security and SAP Solutions|
|Author||:||Axel Buecker, Ivy Chiu, Kenny Chow, Ingo Dressler, Anthony Ferguson, Vaughan Harper, David Moore, Zoran Radenkovic, Guy Redding, John Robinson, Sascha Schefenacker, Franz Wolfhagen, IBM Redbooks|
|Publisher||:||IBM Redbooks - 2012-03-19|