SlideShare a Scribd company logo
Extensible Authorization for
SAP Applications



Andy Han,
VP Product Management,
NextLabs, Inc.




                         © 2005-2012 NextLabs Inc.
Agenda

 Objectives
   Highlight relevant access management challenges
   Learn about the OASIS XACML standard
   Understand the benefits of XACML to SAP customers
 Presentation
   Access Management Challenges
   Introduction to XACML
   NextLabs Entitlement Manager for SAP
   Benefits of XACML to SAP Customers
 Question and Answers




                                          Slide 2      © 2005-2011 NextLabs Inc.
Access Management Challenges




                               Slide 3   © 2005-2011 NextLabs Inc.
Enforcement Granularity
 “We can give her the role, but we can’t limit
           what data she can see”

               Product A   Product B   Product C   Product D   Product E


    Supplier   Granted Access            Required Access




    Leads to too much access, custom authorization
               logic and/or complex roles




                                                    Slide 4        © 2005-2011 NextLabs Inc.
Discretionary Authorization
 “Please have you manager approve access”

• Why should or shouldn’t you manager approve access?
   • Role purpose
   • Job function and assignments
   • Least privileges
   • Compliance requirements
   • Existing access
   • Trust
• When should your access be revoked?




                                     Slide 5   © 2005-2011 NextLabs Inc.
Role Explosion
    “We have 20,000 users and 25,000 roles”
 Companies have multiple access drivers
      Functional Roles
      Compliance Regulations (e.g. ITAR, DOE, PCI)
      IP Control Agreements (e.g. PIEA, NDA)
      Multiple Applications and Systems (e.g. PLM, ERP, CRM)
 Traditional role based access control (RBAC) explodes based on the number of variables
               Required Access Rules




                                       Number of Access Variables

                                                                            Slide 6       © 2005-2011 NextLabs Inc.
Introduction to XACML


                    An authorization architecture
                    and a standard policy
                    language.

   eXtensible       Attribute-based access
    Access          control (ABAC)
    Control
    Markup          Simultaneous policy
    Language        evaluation with combined
                    decisions



                                Slide 7      © 2005-2011 NextLabs Inc.
Native Authorization


                       Role-Based Authorization controls
                       access to application resources (e.g.
                       functions, transactions)
     Application
                       Business Logic controls access to
      Business Logic
                       data resources (e.g. accounts, service
          RBAC         requests)

                       Optionally access governance
                       manages roles (e.g. GRC Access
         Data          Controls)




                                       Slide 8     © 2005-2011 NextLabs Inc.
XACML Authorization Architecture
                                             Authorization
                                             Business Logic
                           Policy
                     Administration Point
                                             externalized
                           (PAP)                 Reduce customization
                          Bus AuthZ              Increase flexibility
                            Logic
                                                 AuthZ logic independent
                                                 of business logic
    Application
     PIP      PEP    Policy Decision Point
                            (PDP)            Role-Based
     AuthZ Concept                           Authorization can still
                                             control access to
                                             application resources
                             Policy
                          Information
       Data               Point (PIP)        Optionally access
                                             governance manages
                                             roles (e.g. GRC
                                             Access Controls)
                                             Slide 9        © 2005-2011 NextLabs Inc.
Universal Data Authorization


                              Policy
                                                Business authorization
                        Administration Point    logic externalized
                              (PAP)
  Application
                             Data AuthZ
   PIP pplication
     A      PEP                Policy
                                                The same policy can
      Application
      PIP       PEP                             be used across
   AuthZ Concept
       PIP       PEP
                                                multiple applications
     AuthZ Concept      Policy Decision Point
                               (PDP)
        AuthZ Concept
                                                Consistent access to
                                                data in multiple
                                                applications
                                Policy
                             Information
                             Point (PIP)




                                                Slide 10     © 2005-2011 NextLabs Inc.
XACML Policy Language
Policy Set
  Target
  Policy-Combining
                           Combining Algorithms
                               Deny-overrides, Permit-overrides, First-
   Policy (1..n)               applicable and Only-one-applicable.

       Target
                           Target
       Rule-Combining          Defines policy/rule applicability
                                    Subject
        Rule (1..n)
                                    Action
             Target                 Resource
             Condition
             Effect                 Other
             Obligations
             Advise        Conditions
                               Determine the Effect, Obligations
        Effect
        Obligations
                           Effects
        Advise                 Allow / Deny
                           Obligations and Advise
   Obligations
                               Additional actions to be performed
   Advise




                                         Slide 11           © 2005-2011 NextLabs Inc.
NextLabs Policy Studio




                         Slide 12   © 2005-2011 NextLabs Inc.
Attribute-Based Access Control (ABAC)
Allow only US Engineers to access Project X Specifications from US Offices




          Subject
Location = US AND
Department = Engineering

                                Resource
                      Project = Project X AND
                      Type = Specification

                                                         Environment
                                                  Network Address = 192.168.*




        Attribute-based rule retails business intent.
           Provide fine-grain, data level control.
                                                     Slide 13      © 2005-2011 NextLabs Inc.
Policy Combining

                                                                Deny Override

                                                                       Policy 1
                                                                     (IP Control)

                     Andy                                             ALLOW
                     Access
                     Material A
    Application
                                                                       Policy 2
     PIP      PEP                 Policy Decision Point                (Export
                                                                     Compliance)
                                         (PDP)
     AuthZ Concept                                                     ALLOW


                       DENY
                                                                        Policy 3
                                                                       (National
                                                                       Security)
                                          Policy
                                       Information                      DENY
       Data                            Point (PIP)




     Manage Access Rules Independently.
     Reduces the number of authorizations
                                                          Slide 14                  © 2005-2011 NextLabs Inc.
Scales Linearly with Authorization Drivers

 Manage Access Drivers Independently. Reduces
        the number of rules to manage.
       Required Access Rules




                               Number of Access Variables


                                                            Slide 15   © 2005-2011 NextLabs Inc.
Entitlement Manager for SAP
 Out-of-the-box SAP
 application integration                   Entitlement Packs
                                  ECC            DMS              PLM              CRM
 Entitlement Services
    Security Classification
    Access Control
    Integrated Rights         Entitlement Manager for SAP
    Management
                                                                Integrated
                                Security
    Audit                     Classification
                                                 ABAC             Rights            Audit
                                                               Management


 XACML Policy
 Management                                     Control Center
    SAP Policy Model                           Policy Management
                                   Identity             Data                 Remediation
 Extensible to
 Customer Programs

                                                        Slide 16                © 2005-2011 NextLabs Inc.
Security Classification

                          Central Management of Data
                          Security Classification Attributes
                          Provides
                              Extensible Attributes
                              Classification Inheritance (e.g.
                              Document to Material
                              Associations)
                              Policy Based Classification Rules
                              Granular Classification
                              (Transaction and Document
                              Level)
                                  Can be used to classify a BOM,
                                  separate from individual Materials
                              UI, Batch Import and RFCs




                                    Slide 17          © 2005-2011 NextLabs Inc.
Attribute-Based Access Control

                           Fine-grain access control
                           to data based on data
                           classification, user
                           attributes (e.g. US Person)
                           and location
                           Policy messages to
                           educate users on
                           restrictions
                           Audit of activity and policy
                           Fully integrated in SAP UI
                           (Web UI, Portal, SAP GUI,
                           EasyDMS)




                                 Slide 18     © 2005-2011 NextLabs Inc.
Record Keeping and Reporting

                         Dashboards
                            Role based dashboards for easy access to most
                             critical analysis
                         Analytics
                            Multi-dimensional summary analysis
                            Trend Analysis
                         End to End Activity Audit
                            Data access, use and distribution across
                             applications
                            Details required for Incident Investigation and
                             Response
                         Compliance Audit
                            Policy Enforcement
                            Policy Based Activity Audit
                         Personal and Shared Reports




                                     Slide 19              © 2005-2011 NextLabs Inc.
Benefits of XACML to SAP Customers
 Address compliance or security requirement not met by
 standard roles.
 Reduce the number of managed roles, especially for
 data level authorization.
 Drive authorization by rules, reduce discretionary
 access.
 Reduce cost of implementing and maintaining custom
 authorization logic.
 Leverage policies in multiple SAP and non-SAP
 applications for consistent authorization.
 Improve ability



                                      Slide 20   © 2005-2011 NextLabs Inc.
SAP Endorsed Business Solutions (EBS)
 An SAP Ecosystem “By Invitation Only” Program




                  Endorsed Business Solutions

                 P
                            Complementary solutions selected by SAP
                             Product and Industry groups

                 P
                          Application level integration with 3 month
                           solution qualification to ensure end-to-end
                           business process

                 P
                           Product roadmap guided by SAP based on
                            Cooperative Development Agreement

                P
                           Endorsed by SAP and sold by partners




© 2011 SAP AG. All rights reserved.                                      Confidential   21
Co-organized by NextLabs and SAP
NextLabs Overview                      NextLabs Entitlement Manager is
                                       an SAP-Endorsed Business
 “We allow companies to preserve       Solution
 confidentiality, prevent data loss
 and ensure compliance across          Policy-driven, information risk
                                       management software for Global
 more channels and more points         5000 enterprises.
 with a single unified solution with      Help companies achieve safer
 unmatched user acceptance and            and more secure internal and
 total cost of ownership.”                external collaboration
                                          Ensure proper access to
                                          applications and data
       - Keng Lim, Chairman and CEO
                                       Facts
                                          Locations
                                              HQ: San Mateo, CA
                                              Boston, MA
                                              Hangzhou, PRC
                                              Malaysia
                                          25+ Patent Portfolio
                                          Major go-to-market Partners: IBM,
                                          SAP, HCL


                                                 Slide 22         © 2005-2011 NextLabs Inc.
Thank You!

                      Questions?
Ruth Stephens: 650-356-4801, ruth.stephens@nextlabs.com




             Contact Ruth for more information:
    Request our whitepaper on SAP dynamic authorization and access
     control
    Request to view a self-running demo
    Schedule a meeting with Ruth Stephens to learn more about our
     Information Risk Management solutions for SAP




                                                Slide 23     © 2005-2011 NextLabs Inc.

More Related Content

PPTX
Part III of III: SAP Advanced Authorization for SAP Global Deployments: Octo...
PPTX
Part II of III: Advanced Authorization for SAP Global Deployments: September ...
PPT
SharePoint Business Track Part 1 of 2
PPTX
Managing Role Explosion with Attribute-based Access Control - Webinar Series ...
PPTX
Managing Role Explosion with Attribute-based Access Control - Webinar Series ...
PDF
E-RBAC Development - A Risk Based Security Architecture Approach
PPTX
RM5 IdM, Centralized Entitlement Management
PDF
Data Entitlement with WSO2 Enterprise Middleware Platform
Part III of III: SAP Advanced Authorization for SAP Global Deployments: Octo...
Part II of III: Advanced Authorization for SAP Global Deployments: September ...
SharePoint Business Track Part 1 of 2
Managing Role Explosion with Attribute-based Access Control - Webinar Series ...
Managing Role Explosion with Attribute-based Access Control - Webinar Series ...
E-RBAC Development - A Risk Based Security Architecture Approach
RM5 IdM, Centralized Entitlement Management
Data Entitlement with WSO2 Enterprise Middleware Platform

What's hot (20)

PPTX
Entitlement and Access Manegement
PPTX
Data Entitlement in an API-Centric Architecture
PDF
Identity and Entitlement Management Concepts
PDF
Application Portfolio Rationalization
PPSX
M.S. Dissertation in Salesforce on Force.com
PPTX
Flex net manager for sap applications v9 1 presentation
PDF
Webinar: Simplify, Gain Insight, Strengthen with SAP GRC 10.1
PDF
Webinar Siebel CRM - The most common license compliance issues seen
PPTX
EA - Enterprise Integration Introduction
PPTX
Managed It Services
PDF
Implementing Cloud Financials
PPTX
Mis 20021241104 20021241103_20021241148_20021241155_20021241149_eai and flexi...
PDF
Application Portfolio Rationalization - Whitepaper
PPTX
Application Rationalization and Portfolio Management solution
PDF
E-Business Suite 1 | Nadia Bendiedou | Oracle E-Business Suite Technology rel...
PPTX
Introduction to SOA EAI ETL BPM
PPT
Enterprise application integration
PPT
Oracle Fusion Development, May 2009
PPTX
Integrating Salesforce.com and Oracle ERP Using IBM WebSphere Cast Iron
PDF
Entitlements Management Strategy-White Paper
Entitlement and Access Manegement
Data Entitlement in an API-Centric Architecture
Identity and Entitlement Management Concepts
Application Portfolio Rationalization
M.S. Dissertation in Salesforce on Force.com
Flex net manager for sap applications v9 1 presentation
Webinar: Simplify, Gain Insight, Strengthen with SAP GRC 10.1
Webinar Siebel CRM - The most common license compliance issues seen
EA - Enterprise Integration Introduction
Managed It Services
Implementing Cloud Financials
Mis 20021241104 20021241103_20021241148_20021241155_20021241149_eai and flexi...
Application Portfolio Rationalization - Whitepaper
Application Rationalization and Portfolio Management solution
E-Business Suite 1 | Nadia Bendiedou | Oracle E-Business Suite Technology rel...
Introduction to SOA EAI ETL BPM
Enterprise application integration
Oracle Fusion Development, May 2009
Integrating Salesforce.com and Oracle ERP Using IBM WebSphere Cast Iron
Entitlements Management Strategy-White Paper
Ad

Viewers also liked (11)

PPT
6 7-users-authorization
PDF
Data-Centric Security for the Extended Enterprise
PPTX
PART I of III: Advanced Authorization for SAP Global Deployments: September ...
PPT
SAP HCM Structural Authorization Overview Presentation
PDF
Authorisations in SAP: best practices
PDF
An expert guide to new sap bi security features
PPTX
SAP HCM authorisations: streamline processes and improve HR data security
PDF
Grc 10 training
DOC
Authorisation Concept In SAP | http://sapdocs.info
PDF
Introduction to SAP Security
PDF
Practical guide for sap security
6 7-users-authorization
Data-Centric Security for the Extended Enterprise
PART I of III: Advanced Authorization for SAP Global Deployments: September ...
SAP HCM Structural Authorization Overview Presentation
Authorisations in SAP: best practices
An expert guide to new sap bi security features
SAP HCM authorisations: streamline processes and improve HR data security
Grc 10 training
Authorisation Concept In SAP | http://sapdocs.info
Introduction to SAP Security
Practical guide for sap security
Ad

Similar to Extensible Authorization for SAP Applications Webinar (20)

PPT
PCTY 2012, Risk Based Access Control v. Pat Wardrop
PPTX
The day when role based access control disappears
PPTX
Authorization Pattern.pptx power point s
PPTX
SANS Institute Product Review: Oracle Entitlements Server
PPTX
Advanced Authorization for SAP Global Deployments Part III of III
PPTX
Identity Manager in Cloud with Openflow Switches
PDF
Layer 7: Fine Grained Authorization for Web Services
PPT
Building an Effective Identity Management Strategy
PPTX
Leveraging Identity to Manage Change and Complexity
PDF
Integrating Information Protection Into Data Architecture & SDLC
PDF
Requirements for Implementing Data-Centric ABAC
PDF
Opa in the api management world
PDF
Security and interoperability
PPTX
Advanced Authorization for SAP Global Deployments Part I of III
PDF
OWASP Identity Manegement
PPTX
Unpacking Authorization Approaches: Policy as Code Versus Traditional Busines...
PPTX
Building The Framework For A Culture Of Security
PPT
Compliance and Governance Through Complex Entitlement Management
PDF
SBC 2012 - Dynamic Access Control in Windows Server 2012 (Nguyễn Ngọc Thuận)
PPTX
Attribute based access control
PCTY 2012, Risk Based Access Control v. Pat Wardrop
The day when role based access control disappears
Authorization Pattern.pptx power point s
SANS Institute Product Review: Oracle Entitlements Server
Advanced Authorization for SAP Global Deployments Part III of III
Identity Manager in Cloud with Openflow Switches
Layer 7: Fine Grained Authorization for Web Services
Building an Effective Identity Management Strategy
Leveraging Identity to Manage Change and Complexity
Integrating Information Protection Into Data Architecture & SDLC
Requirements for Implementing Data-Centric ABAC
Opa in the api management world
Security and interoperability
Advanced Authorization for SAP Global Deployments Part I of III
OWASP Identity Manegement
Unpacking Authorization Approaches: Policy as Code Versus Traditional Busines...
Building The Framework For A Culture Of Security
Compliance and Governance Through Complex Entitlement Management
SBC 2012 - Dynamic Access Control in Windows Server 2012 (Nguyễn Ngọc Thuận)
Attribute based access control

More from NextLabs, Inc. (9)

PPTX
Digital Rights Management
PDF
Addressing Gaps in Your Cyber Security
PDF
Cyber Security
PDF
eGRC for Information Export Control
PPTX
Using Microsoft Dynamic Access Control to create Information Barriers for SEC...
PPTX
NextLabs Internships
PPTX
Advanced Authorization for SAP Global Deployments Part II of III
PPT
Preview Of Gary Stanley 10 Commandments
PPT
Preview of Heaney On ITAR Controls
Digital Rights Management
Addressing Gaps in Your Cyber Security
Cyber Security
eGRC for Information Export Control
Using Microsoft Dynamic Access Control to create Information Barriers for SEC...
NextLabs Internships
Advanced Authorization for SAP Global Deployments Part II of III
Preview Of Gary Stanley 10 Commandments
Preview of Heaney On ITAR Controls

Recently uploaded (20)

PPTX
sap open course for s4hana steps from ECC to s4
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PPTX
Big Data Technologies - Introduction.pptx
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
cuic standard and advanced reporting.pdf
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPT
Teaching material agriculture food technology
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Network Security Unit 5.pdf for BCA BBA.
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Encapsulation_ Review paper, used for researhc scholars
PPTX
Programs and apps: productivity, graphics, security and other tools
sap open course for s4hana steps from ECC to s4
Chapter 3 Spatial Domain Image Processing.pdf
Big Data Technologies - Introduction.pptx
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
cuic standard and advanced reporting.pdf
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Teaching material agriculture food technology
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Building Integrated photovoltaic BIPV_UPV.pdf
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
The Rise and Fall of 3GPP – Time for a Sabbatical?
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Advanced methodologies resolving dimensionality complications for autism neur...
MIND Revenue Release Quarter 2 2025 Press Release
Mobile App Security Testing_ A Comprehensive Guide.pdf
Network Security Unit 5.pdf for BCA BBA.
MYSQL Presentation for SQL database connectivity
Encapsulation_ Review paper, used for researhc scholars
Programs and apps: productivity, graphics, security and other tools

Extensible Authorization for SAP Applications Webinar

  • 1. Extensible Authorization for SAP Applications Andy Han, VP Product Management, NextLabs, Inc. © 2005-2012 NextLabs Inc.
  • 2. Agenda Objectives Highlight relevant access management challenges Learn about the OASIS XACML standard Understand the benefits of XACML to SAP customers Presentation Access Management Challenges Introduction to XACML NextLabs Entitlement Manager for SAP Benefits of XACML to SAP Customers Question and Answers Slide 2 © 2005-2011 NextLabs Inc.
  • 3. Access Management Challenges Slide 3 © 2005-2011 NextLabs Inc.
  • 4. Enforcement Granularity “We can give her the role, but we can’t limit what data she can see” Product A Product B Product C Product D Product E Supplier Granted Access Required Access Leads to too much access, custom authorization logic and/or complex roles Slide 4 © 2005-2011 NextLabs Inc.
  • 5. Discretionary Authorization “Please have you manager approve access” • Why should or shouldn’t you manager approve access? • Role purpose • Job function and assignments • Least privileges • Compliance requirements • Existing access • Trust • When should your access be revoked? Slide 5 © 2005-2011 NextLabs Inc.
  • 6. Role Explosion “We have 20,000 users and 25,000 roles” Companies have multiple access drivers Functional Roles Compliance Regulations (e.g. ITAR, DOE, PCI) IP Control Agreements (e.g. PIEA, NDA) Multiple Applications and Systems (e.g. PLM, ERP, CRM) Traditional role based access control (RBAC) explodes based on the number of variables Required Access Rules Number of Access Variables Slide 6 © 2005-2011 NextLabs Inc.
  • 7. Introduction to XACML An authorization architecture and a standard policy language. eXtensible Attribute-based access Access control (ABAC) Control Markup Simultaneous policy Language evaluation with combined decisions Slide 7 © 2005-2011 NextLabs Inc.
  • 8. Native Authorization Role-Based Authorization controls access to application resources (e.g. functions, transactions) Application Business Logic controls access to Business Logic data resources (e.g. accounts, service RBAC requests) Optionally access governance manages roles (e.g. GRC Access Data Controls) Slide 8 © 2005-2011 NextLabs Inc.
  • 9. XACML Authorization Architecture Authorization Business Logic Policy Administration Point externalized (PAP) Reduce customization Bus AuthZ Increase flexibility Logic AuthZ logic independent of business logic Application PIP PEP Policy Decision Point (PDP) Role-Based AuthZ Concept Authorization can still control access to application resources Policy Information Data Point (PIP) Optionally access governance manages roles (e.g. GRC Access Controls) Slide 9 © 2005-2011 NextLabs Inc.
  • 10. Universal Data Authorization Policy Business authorization Administration Point logic externalized (PAP) Application Data AuthZ PIP pplication A PEP Policy The same policy can Application PIP PEP be used across AuthZ Concept PIP PEP multiple applications AuthZ Concept Policy Decision Point (PDP) AuthZ Concept Consistent access to data in multiple applications Policy Information Point (PIP) Slide 10 © 2005-2011 NextLabs Inc.
  • 11. XACML Policy Language Policy Set Target Policy-Combining Combining Algorithms Deny-overrides, Permit-overrides, First- Policy (1..n) applicable and Only-one-applicable. Target Target Rule-Combining Defines policy/rule applicability Subject Rule (1..n) Action Target Resource Condition Effect Other Obligations Advise Conditions Determine the Effect, Obligations Effect Obligations Effects Advise Allow / Deny Obligations and Advise Obligations Additional actions to be performed Advise Slide 11 © 2005-2011 NextLabs Inc.
  • 12. NextLabs Policy Studio Slide 12 © 2005-2011 NextLabs Inc.
  • 13. Attribute-Based Access Control (ABAC) Allow only US Engineers to access Project X Specifications from US Offices Subject Location = US AND Department = Engineering Resource Project = Project X AND Type = Specification Environment Network Address = 192.168.* Attribute-based rule retails business intent. Provide fine-grain, data level control. Slide 13 © 2005-2011 NextLabs Inc.
  • 14. Policy Combining Deny Override Policy 1 (IP Control) Andy ALLOW Access Material A Application Policy 2 PIP PEP Policy Decision Point (Export Compliance) (PDP) AuthZ Concept ALLOW DENY Policy 3 (National Security) Policy Information DENY Data Point (PIP) Manage Access Rules Independently. Reduces the number of authorizations Slide 14 © 2005-2011 NextLabs Inc.
  • 15. Scales Linearly with Authorization Drivers Manage Access Drivers Independently. Reduces the number of rules to manage. Required Access Rules Number of Access Variables Slide 15 © 2005-2011 NextLabs Inc.
  • 16. Entitlement Manager for SAP Out-of-the-box SAP application integration Entitlement Packs ECC DMS PLM CRM Entitlement Services Security Classification Access Control Integrated Rights Entitlement Manager for SAP Management Integrated Security Audit Classification ABAC Rights Audit Management XACML Policy Management Control Center SAP Policy Model Policy Management Identity Data Remediation Extensible to Customer Programs Slide 16 © 2005-2011 NextLabs Inc.
  • 17. Security Classification Central Management of Data Security Classification Attributes Provides Extensible Attributes Classification Inheritance (e.g. Document to Material Associations) Policy Based Classification Rules Granular Classification (Transaction and Document Level) Can be used to classify a BOM, separate from individual Materials UI, Batch Import and RFCs Slide 17 © 2005-2011 NextLabs Inc.
  • 18. Attribute-Based Access Control Fine-grain access control to data based on data classification, user attributes (e.g. US Person) and location Policy messages to educate users on restrictions Audit of activity and policy Fully integrated in SAP UI (Web UI, Portal, SAP GUI, EasyDMS) Slide 18 © 2005-2011 NextLabs Inc.
  • 19. Record Keeping and Reporting Dashboards  Role based dashboards for easy access to most critical analysis Analytics  Multi-dimensional summary analysis  Trend Analysis End to End Activity Audit  Data access, use and distribution across applications  Details required for Incident Investigation and Response Compliance Audit  Policy Enforcement  Policy Based Activity Audit Personal and Shared Reports Slide 19 © 2005-2011 NextLabs Inc.
  • 20. Benefits of XACML to SAP Customers Address compliance or security requirement not met by standard roles. Reduce the number of managed roles, especially for data level authorization. Drive authorization by rules, reduce discretionary access. Reduce cost of implementing and maintaining custom authorization logic. Leverage policies in multiple SAP and non-SAP applications for consistent authorization. Improve ability Slide 20 © 2005-2011 NextLabs Inc.
  • 21. SAP Endorsed Business Solutions (EBS) An SAP Ecosystem “By Invitation Only” Program Endorsed Business Solutions P  Complementary solutions selected by SAP Product and Industry groups P  Application level integration with 3 month solution qualification to ensure end-to-end business process P  Product roadmap guided by SAP based on Cooperative Development Agreement P  Endorsed by SAP and sold by partners © 2011 SAP AG. All rights reserved. Confidential 21
  • 22. Co-organized by NextLabs and SAP NextLabs Overview NextLabs Entitlement Manager is an SAP-Endorsed Business “We allow companies to preserve Solution confidentiality, prevent data loss and ensure compliance across Policy-driven, information risk management software for Global more channels and more points 5000 enterprises. with a single unified solution with Help companies achieve safer unmatched user acceptance and and more secure internal and total cost of ownership.” external collaboration Ensure proper access to applications and data - Keng Lim, Chairman and CEO Facts Locations HQ: San Mateo, CA Boston, MA Hangzhou, PRC Malaysia 25+ Patent Portfolio Major go-to-market Partners: IBM, SAP, HCL Slide 22 © 2005-2011 NextLabs Inc.
  • 23. Thank You! Questions? Ruth Stephens: 650-356-4801, ruth.stephens@nextlabs.com Contact Ruth for more information:  Request our whitepaper on SAP dynamic authorization and access control  Request to view a self-running demo  Schedule a meeting with Ruth Stephens to learn more about our Information Risk Management solutions for SAP Slide 23 © 2005-2011 NextLabs Inc.

Editor's Notes

  • #8: While some of you may be familiar with XACML, others may not. So to level set, here is a quick introduction to XACML. XACML, is an standard developed within the OASIS standards organization. Its objective is to provide a model for authorization that is not tied to any specific application or product. This would allow companies to define their authorization logic in a way that is centralized, can be used across multiple applications, and can be interoperable across products from different vendors. Many of the leading technology companies support XACML and their are many commercial products that support the standard.XACML defines a standard Authorization Architecture and standard language for expressing authorization policy.XACML is based on a concept called Attribute-Based Access Control, or ABAC, which offers greater flexibility and expressiveness than traditional Role-Based Access Control models.Finally, one of the most valuable characteristics of XACML is that it allows an access control decision to be based on the simultaneous evaluation of multiple policies.Let’s take a look at these in a little more detail
  • #9: If you look at a traditional authorization, native to an application you will generally see two types of authorization logic, a Role Based model like the SAP authorization concept, and business logic that in some cases is provide business processs specific authorization. For example, in CRM this may be logic that says a users needs to be assigned to an account team to view and account.This type of Business Authorization Logic, is where we find a number of SAP customers having to customize SAP by either writing code or creating customer authorization objects. A third and important components is access governance to help manage the assignment of roles to users and requisite compliance processes.
  • #11: Another benefit of externalizing this business authorization logic is now the same logic can be applied to multiple applications. So for example, if you have multiple applications in your environment that manage similar data you can write a policy once regarding those data resources and apply them across all applications where that data exists. This eliminates access management silos and ensures the controls are consistent.