{"id":12096,"date":"2024-09-11T11:23:27","date_gmt":"2024-09-11T09:23:27","guid":{"rendered":"https:\/\/www.inprosec.com\/?p=12096"},"modified":"2025-07-10T13:46:31","modified_gmt":"2025-07-10T11:46:31","slug":"how-to-configurate-pam-iag","status":"publish","type":"post","link":"https:\/\/www.inprosec.com\/en\/how-to-configurate-pam-iag\/","title":{"rendered":"How to configurate PAM IAG"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Within the SAP\u00ae portfolio of solutions for identity and access control, a solution called SAP IAG (Identity Access Governance) has been available since 2018. This solution, like SAP GRC AC (Governance, risk, and compliance Access Control), enables centralised access management for customers in their SAP environments. However, one of the main innovations of this recent tool is that it is natively connectable to SAP public cloud systems (such as Ariba, Fieldglass, S\/4 HANA Cloud, among others) and also to On-Premise systems, while GRC AC is not (only, as an exception, SFEC).<\/span><\/p>\n<p><img decoding=\"async\" class=\"aligncenter size-full wp-image-12059\" src=\"https:\/\/www.inprosec.com\/wp-content\/uploads\/2024\/08\/1-1.png\" alt=\"\" width=\"569\" height=\"294\" srcset=\"https:\/\/www.inprosec.com\/wp-content\/uploads\/2024\/08\/1-1.png 569w, https:\/\/www.inprosec.com\/wp-content\/uploads\/2024\/08\/1-1-300x155.png 300w\" sizes=\"(max-width: 569px) 100vw, 569px\" \/><\/p>\n<p><span style=\"font-weight: 400;\">Focusing on SAP IAG, we can also draw some equivalence between the modules of GRC AC, and the (now services) of SAP IAG. Below is a chart showing the main functionalities of SAP IAG:<\/span><\/p>\n<p><img decoding=\"async\" class=\"aligncenter size-full wp-image-12061\" src=\"https:\/\/www.inprosec.com\/wp-content\/uploads\/2024\/09\/2.png\" alt=\"\" width=\"569\" height=\"336\" srcset=\"https:\/\/www.inprosec.com\/wp-content\/uploads\/2024\/09\/2.png 569w, https:\/\/www.inprosec.com\/wp-content\/uploads\/2024\/09\/2-300x177.png 300w\" sizes=\"(max-width: 569px) 100vw, 569px\" \/><\/p>\n<p><span style=\"font-weight: 400;\">In this article, we will only explain in detail the Privileged Access Management service, the purpose of which is the management of super-privileged accesses necessary to carry out extraordinary tasks in a limited period of time.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The first thing to understand is that SAP IAG is a product that exists within the SAP BTP (Business Technology Platform). Therefore, customers who wish to have SAP IAG must have access to this platform.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In addition, SAP IAG currently has 2 procurement models:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">1) As the only access control tool (i.e. no GRC AC is available).<\/span><\/p>\n<p><span style=\"font-weight: 400;\">2) As an extension of SAP GRC AC for Cloud environments.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In this article, only the first point will be dealt with, i.e. assuming that SAP IAG is the only tool for access control. In addition, emergency access management will be carried out in an On-Premise system (SAP S\/4 HANA).<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Currently, the PAM service can be used for:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">&#8211; Any AS ABAP system, in the same way as GRC AC EAM.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">&#8211; S\/4 HANA Cloud.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In addition, it is necessary to understand that SAP IAG is a product that exists in the SAP public cloud, and therefore is not within the customers&#8217; internal network.<\/span><\/p>\n<p><img decoding=\"async\" class=\"aligncenter size-full wp-image-12063\" src=\"https:\/\/www.inprosec.com\/wp-content\/uploads\/2024\/09\/3.png\" alt=\"\" width=\"570\" height=\"307\" srcset=\"https:\/\/www.inprosec.com\/wp-content\/uploads\/2024\/09\/3.png 570w, https:\/\/www.inprosec.com\/wp-content\/uploads\/2024\/09\/3-300x162.png 300w\" sizes=\"(max-width: 570px) 100vw, 570px\" \/><\/p>\n<p><span style=\"font-weight: 400;\">In order to facilitate this task of interconnectivity from the public cloud to the customers&#8217; internal network, the Cloud Connector software is delivered to expose those function modules that will be used by IAG (in this case) to manage emergency access in a secure manner.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Once the software has been installed and configured, the next step is to create the connection in SAP BTP, which will then be used by SAP IAG. This is, analogous to what would be done in SAP GRC AC, to create an RFC connection.<\/span><\/p>\n<p><img decoding=\"async\" class=\"aligncenter size-full wp-image-12065\" src=\"https:\/\/www.inprosec.com\/wp-content\/uploads\/2024\/09\/4.png\" alt=\"\" width=\"570\" height=\"313\" srcset=\"https:\/\/www.inprosec.com\/wp-content\/uploads\/2024\/09\/4.png 570w, https:\/\/www.inprosec.com\/wp-content\/uploads\/2024\/09\/4-300x165.png 300w\" sizes=\"(max-width: 570px) 100vw, 570px\" \/><\/p>\n<p><span style=\"font-weight: 400;\">After this step has been completed, you can start to perform the application-specific configuration in the SAP IAG tool itself.<\/span><\/p>\n<h2><b>General Considerations PAM<\/b><\/h2>\n<h3><b>Application methods<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">In the case of PAM, and as in SAP GRC AC, there are 2 methods of use. However, by contrast, both are not available for all types of systems where PAM can be used.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">&#8211; Decentralised PAM: this is the only method of using PAM for AS ABAP systems.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">&#8211; Centralised PAM: is the only method of use for Cloud systems (currently only S\/4 HANA Cloud).<\/span><\/p>\n<p><span style=\"font-weight: 400;\">However, unlike GRC AC, there is only one method of use. Whereas in SAP GRC AC it was possible to use role-based or ID-based superuser accesses, in IAG it can only be configured via the latter.<\/span><\/p>\n<h2><b>PAM Configuration<\/b><\/h2>\n<h3><b>Decentralised RFC creation<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Exactly as in GRC AC, in order to be able to use decentralised PAM in AS ABAP systems, it is necessary to create an RFC connection in the target system pointing to the system itself, which allows the leap to the superuser. It is important that this connection, as well as the one in section 1. Introduction, have the same identifier.<\/span><\/p>\n<p><img decoding=\"async\" class=\"aligncenter size-full wp-image-12067\" src=\"https:\/\/www.inprosec.com\/wp-content\/uploads\/2024\/09\/5.png\" alt=\"\" width=\"570\" height=\"189\" srcset=\"https:\/\/www.inprosec.com\/wp-content\/uploads\/2024\/09\/5.png 570w, https:\/\/www.inprosec.com\/wp-content\/uploads\/2024\/09\/5-300x99.png 300w\" sizes=\"(max-width: 570px) 100vw, 570px\" \/><\/p>\n<h3><b>Application creation<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Thus, the first step would be the creation of the application to be monitored in IAG. To do this, you can access the route:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Administration &gt; Applications<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The type of system must be chosen (as previously mentioned, it will be an S\/4 HANA On-Premise, in this case), and cover the HCP Destination, which has to coincide with the connector created in BTP previously.<\/span><\/p>\n<p><img decoding=\"async\" class=\"aligncenter size-full wp-image-12069\" src=\"https:\/\/www.inprosec.com\/wp-content\/uploads\/2024\/09\/6.png\" alt=\"\" width=\"569\" height=\"325\" srcset=\"https:\/\/www.inprosec.com\/wp-content\/uploads\/2024\/09\/6.png 569w, https:\/\/www.inprosec.com\/wp-content\/uploads\/2024\/09\/6-300x171.png 300w\" sizes=\"(max-width: 569px) 100vw, 569px\" \/><\/p>\n<h3><b>Creating Reason Codes<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Another configuration option is the creation of Reason Codes.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Administration &gt; Request Reason<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In order to be able to use emergency access, it is necessary to create 2 different types of reason codes:<\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Access Request: these are reason codes transversal to any type of request, not only PAM, and that allow to categorise the nature of the request.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Privileged Access Session: similar to GRC AC, when a superuser session is initiated, it is necessary to categorise it. This is where the superuser session reason codes come into play.<\/span><\/li>\n<\/ol>\n<p><img decoding=\"async\" class=\"aligncenter size-full wp-image-12071\" src=\"https:\/\/www.inprosec.com\/wp-content\/uploads\/2024\/09\/7.png\" alt=\"\" width=\"570\" height=\"182\" srcset=\"https:\/\/www.inprosec.com\/wp-content\/uploads\/2024\/09\/7.png 570w, https:\/\/www.inprosec.com\/wp-content\/uploads\/2024\/09\/7-300x96.png 300w\" sizes=\"(max-width: 570px) 100vw, 570px\" \/><\/p>\n<h3><b>Business processes<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">It is also possible to create your own risk levels and business processes in the options:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Administration &gt; Business Processes<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The business processes are necessary to be able to categorise the business roles, which are then assigned to the superusers.<\/span><\/p>\n<h3><b>Business Roles<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">In IAG, only one type of roles can be managed, namely Business Roles. This type of role is a collection of technical roles\/groups\/etc. of one or several systems.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In SAP IAG, and unlike GRC AC where the roles are assigned to the emergency users in the target systems, the business roles are assigned in the central IAG system itself, and from this it is replicated to the target system.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Thus, the creation of business roles is necessary to provide the emergency user with the necessary authorisations to be able to carry out the emergency tasks.<\/span><\/p>\n<h2><b>PAM Flow Configuration<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Another task necessary to start using emergency access is the configuration of the approval and review flow for the use of emergency access. This task is carried out in 2 steps:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Administration &gt; Maintain Workflow Template<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In this path, the different approval paths through which the requests (e.g. request and review of emergency accesses) will pass must be loaded.<\/span><\/p>\n<p><img decoding=\"async\" class=\"aligncenter wp-image-12073\" src=\"https:\/\/www.inprosec.com\/wp-content\/uploads\/2024\/09\/8.png\" alt=\"\" width=\"699\" height=\"247\" srcset=\"https:\/\/www.inprosec.com\/wp-content\/uploads\/2024\/09\/8.png 1330w, https:\/\/www.inprosec.com\/wp-content\/uploads\/2024\/09\/8-300x106.png 300w, https:\/\/www.inprosec.com\/wp-content\/uploads\/2024\/09\/8-1024x362.png 1024w, https:\/\/www.inprosec.com\/wp-content\/uploads\/2024\/09\/8-600x212.png 600w\" sizes=\"(max-width: 699px) 100vw, 699px\" \/><\/p>\n<p><span style=\"font-weight: 400;\">An incident can be opened to SAP to cover the existing default information, but it is also possible to create them by the customer himself.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Administration &gt; Configuration &gt; Business Rule &gt; Launch<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In this service, the equivalent of the SAP GRC AC BRF+s can be configured, where the logic that routes requests through the different approval paths is configured.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In this case, it is stipulated that emergency access requests will flow through the approval path managerwf where the manager of the request will be in charge of approving.<\/span><\/p>\n<p><img decoding=\"async\" class=\"aligncenter size-full wp-image-12075\" src=\"https:\/\/www.inprosec.com\/wp-content\/uploads\/2024\/09\/9.png\" alt=\"\" width=\"570\" height=\"404\" srcset=\"https:\/\/www.inprosec.com\/wp-content\/uploads\/2024\/09\/9.png 570w, https:\/\/www.inprosec.com\/wp-content\/uploads\/2024\/09\/9-300x213.png 300w\" sizes=\"(max-width: 570px) 100vw, 570px\" \/><\/p>\n<h2><b>PAM ID Lifecycle<\/b><\/h2>\n<h3><b>Creation<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Administration &gt; Maintain Privileged Access<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Unlike GRC AC, it is in IAG where emergency accesses are created centrally, and then replicated to the target systems.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">These emergency accesses must be assigned a previously created Business Role that will contain the authorisations.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">They must also be assigned a set of permitted activities. The usefulness of this functionality is that when reviewing the superuser usage logs, the executed tasks that are NOT part of this list will be marked in a special way to focus the review.<\/span><\/p>\n<p><img decoding=\"async\" class=\"aligncenter size-full wp-image-12077\" src=\"https:\/\/www.inprosec.com\/wp-content\/uploads\/2024\/09\/10.png\" alt=\"\" width=\"569\" height=\"333\" srcset=\"https:\/\/www.inprosec.com\/wp-content\/uploads\/2024\/09\/10.png 569w, https:\/\/www.inprosec.com\/wp-content\/uploads\/2024\/09\/10-300x176.png 300w\" sizes=\"(max-width: 569px) 100vw, 569px\" \/><\/p>\n<p><span style=\"font-weight: 400;\">Once the emergency access has been created, it is necessary to run the Provisioning Job programme which will trigger the creation of the emergency access in the satellite system.<\/span><\/p>\n<h3><b>Request<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Once the superuser has been created and is active, it can be requested to be assigned to users. To do so:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Access Request &gt; Create Access Request<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Here you must select the emergency access and the validity with which it will be assigned once it has been approved.<\/span><\/p>\n<p><img decoding=\"async\" class=\"aligncenter size-full wp-image-12079\" src=\"https:\/\/www.inprosec.com\/wp-content\/uploads\/2024\/09\/11.png\" alt=\"\" width=\"570\" height=\"403\" srcset=\"https:\/\/www.inprosec.com\/wp-content\/uploads\/2024\/09\/11.png 570w, https:\/\/www.inprosec.com\/wp-content\/uploads\/2024\/09\/11-300x212.png 300w\" sizes=\"(max-width: 570px) 100vw, 570px\" \/><\/p>\n<h3><b>Approval<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Depending on the approval flow configuration, the request will be approved by one or the other agent. After this approval, and without the need to run any programme, superuser access will be assigned to the user.<\/span><\/p>\n<p><img decoding=\"async\" class=\"aligncenter size-full wp-image-12081\" src=\"https:\/\/www.inprosec.com\/wp-content\/uploads\/2024\/09\/12.png\" alt=\"\" width=\"569\" height=\"347\" srcset=\"https:\/\/www.inprosec.com\/wp-content\/uploads\/2024\/09\/12.png 569w, https:\/\/www.inprosec.com\/wp-content\/uploads\/2024\/09\/12-300x183.png 300w\" sizes=\"(max-width: 569px) 100vw, 569px\" \/><\/p>\n<h3><b>Use<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">As soon as the superuser access is tested, it shall be assigned to the user. In order to start the emergency session, the transaction SIAG_PAM_LAUNCH_PAD must be executed.<\/span><\/p>\n<p><img decoding=\"async\" class=\"aligncenter size-full wp-image-12085\" src=\"https:\/\/www.inprosec.com\/wp-content\/uploads\/2024\/09\/14.png\" alt=\"\" width=\"570\" height=\"159\" srcset=\"https:\/\/www.inprosec.com\/wp-content\/uploads\/2024\/09\/14.png 570w, https:\/\/www.inprosec.com\/wp-content\/uploads\/2024\/09\/14-300x84.png 300w\" sizes=\"(max-width: 570px) 100vw, 570px\" \/><\/p>\n<p><span style=\"font-weight: 400;\">As in SAP GRC AC, the Logon button must be selected, and from there the parameters (reason code, explanation of the transactions to be used, etc.) must be entered.<\/span><\/p>\n<p><img decoding=\"async\" class=\"aligncenter size-full wp-image-12083\" src=\"https:\/\/www.inprosec.com\/wp-content\/uploads\/2024\/09\/13.png\" alt=\"\" width=\"532\" height=\"505\" srcset=\"https:\/\/www.inprosec.com\/wp-content\/uploads\/2024\/09\/13.png 532w, https:\/\/www.inprosec.com\/wp-content\/uploads\/2024\/09\/13-300x285.png 300w\" sizes=\"(max-width: 532px) 100vw, 532px\" \/><\/p>\n<h3><b>Generation of Revision Tasks<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Once the emergency access is used, it will be necessary to run 2 programs to generate the superuser access review tasks. To do this, navigate to the following path:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Administration &gt; Job Scheduler<\/span><\/p>\n<p><span style=\"font-weight: 400;\">And launch the following programs in the order given:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">&#8211; Privileged Access Log Sync Job<\/span><\/p>\n<p><span style=\"font-weight: 400;\">&#8211; Privileged Access Review Request<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Once executed, and if there are superuser usage review tasks, these will be sent to the corresponding reviewers.<\/span><\/p>\n<h3><b>\u00a0Review<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">After executing the above programs, the reviewer user will receive a task to perform the emergency access usage review.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Depending on the transactions executed by the superuser, and also depending on which activities have been configured as allowed, the review task will highlight certain transactions for review or not.<\/span><\/p>\n<p><img decoding=\"async\" class=\"aligncenter size-full wp-image-12087\" src=\"https:\/\/www.inprosec.com\/wp-content\/uploads\/2024\/09\/15.png\" alt=\"\" width=\"569\" height=\"166\" srcset=\"https:\/\/www.inprosec.com\/wp-content\/uploads\/2024\/09\/15.png 569w, https:\/\/www.inprosec.com\/wp-content\/uploads\/2024\/09\/15-300x88.png 300w\" sizes=\"(max-width: 569px) 100vw, 569px\" \/><\/p>\n<p><span style=\"font-weight: 400;\">The review task allows for additional information such as attachments or comments by the reviewer.<\/span><\/p>\n<h2><b>Reporting<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">The SAP IAG tool has a number of reports that allow you to view the usage of superuser access at any time.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The most relevant is the Privileged Access Monitoring, which can be found in the Reports section.<\/span><\/p>\n<p><img decoding=\"async\" class=\"aligncenter size-full wp-image-12089\" src=\"https:\/\/www.inprosec.com\/wp-content\/uploads\/2024\/09\/16.png\" alt=\"\" width=\"247\" height=\"239\" \/><\/p>\n<h2><b>Conclusions<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">By way of summary, it has been demonstrated how SAP IAG Privileged Access Management allows, in a similar way to SAP GRC AC EAM, the management of superuser accesses in order to manage the life cycle of superuser accesses (create them, request them, approve them, review them).<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In addition, the great novelty of IAG with respect to GRC AC is to be able to integrate superuser accesses in cloud systems (for the moment, only S\/4 HANA Cloud).<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Lastly, the tool is under development by SAP, progressively incorporating new functionalities. To consult these, you can access the tool&#8217;s roadmap:<\/span><\/p>\n<p><img decoding=\"async\" class=\"aligncenter size-full wp-image-12091\" src=\"https:\/\/www.inprosec.com\/wp-content\/uploads\/2024\/09\/17.png\" alt=\"\" width=\"570\" height=\"239\" srcset=\"https:\/\/www.inprosec.com\/wp-content\/uploads\/2024\/09\/17.png 570w, https:\/\/www.inprosec.com\/wp-content\/uploads\/2024\/09\/17-300x126.png 300w\" sizes=\"(max-width: 570px) 100vw, 570px\" \/><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Within the SAP\u00ae portfolio of solutions for identity and access control, a solution called SAP IAG (Identity Access Governance) has been available since 2018. This solution, like SAP GRC AC (Governance, risk, and compliance Access Control), enables centralised access management for customers in their SAP environments. However, one of the main innovations of this recent&#8230;<\/p>\n","protected":false},"author":6,"featured_media":13410,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[4,60],"tags":[],"class_list":["post-12096","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-general","category-sap-grc-en"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>How to configurate PAM IAG - Inprosec<\/title>\n<meta name=\"description\" content=\"Discover how SAP IAG (Identity Access Governance) manages privileged access in SAP environments, including both cloud and On-Premise systems. This article details the use of Privileged Access Management and its integration with SAP BTP.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.inprosec.com\/en\/how-to-configurate-pam-iag\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to configurate PAM IAG\" \/>\n<meta property=\"og:description\" content=\"Discover how SAP IAG (Identity Access Governance) manages privileged access in SAP environments, including both cloud and On-Premise systems. This article details the use of Privileged Access Management and its integration with SAP BTP.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.inprosec.com\/en\/how-to-configurate-pam-iag\/\" \/>\n<meta property=\"og:site_name\" content=\"Inprosec\" \/>\n<meta property=\"article:published_time\" content=\"2024-09-11T09:23:27+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-07-10T11:46:31+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.inprosec.com\/wp-content\/uploads\/2024\/09\/How-to-configurate-PAM-IAG.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Fernando Mosquera\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Fernando Mosquera\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"11 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/how-to-configurate-pam-iag\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/how-to-configurate-pam-iag\\\/\"},\"author\":{\"name\":\"Fernando Mosquera\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/#\\\/schema\\\/person\\\/b05a40c0c3e81b819075dd95a10532e2\"},\"headline\":\"How to configurate PAM IAG\",\"datePublished\":\"2024-09-11T09:23:27+00:00\",\"dateModified\":\"2025-07-10T11:46:31+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/how-to-configurate-pam-iag\\\/\"},\"wordCount\":1595,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/how-to-configurate-pam-iag\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.inprosec.com\\\/wp-content\\\/uploads\\\/2024\\\/09\\\/How-to-configurate-PAM-IAG.jpg\",\"articleSection\":[\"General\",\"SAP GRC\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.inprosec.com\\\/en\\\/how-to-configurate-pam-iag\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/how-to-configurate-pam-iag\\\/\",\"url\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/how-to-configurate-pam-iag\\\/\",\"name\":\"How to configurate PAM IAG - Inprosec\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/how-to-configurate-pam-iag\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/how-to-configurate-pam-iag\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.inprosec.com\\\/wp-content\\\/uploads\\\/2024\\\/09\\\/How-to-configurate-PAM-IAG.jpg\",\"datePublished\":\"2024-09-11T09:23:27+00:00\",\"dateModified\":\"2025-07-10T11:46:31+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/#\\\/schema\\\/person\\\/b05a40c0c3e81b819075dd95a10532e2\"},\"description\":\"Discover how SAP IAG (Identity Access Governance) manages privileged access in SAP environments, including both cloud and On-Premise systems. This article details the use of Privileged Access Management and its integration with SAP BTP.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/how-to-configurate-pam-iag\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.inprosec.com\\\/en\\\/how-to-configurate-pam-iag\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/how-to-configurate-pam-iag\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.inprosec.com\\\/wp-content\\\/uploads\\\/2024\\\/09\\\/How-to-configurate-PAM-IAG.jpg\",\"contentUrl\":\"https:\\\/\\\/www.inprosec.com\\\/wp-content\\\/uploads\\\/2024\\\/09\\\/How-to-configurate-PAM-IAG.jpg\",\"width\":1200,\"height\":630},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/how-to-configurate-pam-iag\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to configurate PAM IAG\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/\",\"name\":\"Inprosec\",\"description\":\"Information security is our priority.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/#\\\/schema\\\/person\\\/b05a40c0c3e81b819075dd95a10532e2\",\"name\":\"Fernando Mosquera\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/199e6c54b14f5b5ddf7e11a9bb0b455c3bed7a9a1a738b7be5c2572878e69d1a?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/199e6c54b14f5b5ddf7e11a9bb0b455c3bed7a9a1a738b7be5c2572878e69d1a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/199e6c54b14f5b5ddf7e11a9bb0b455c3bed7a9a1a738b7be5c2572878e69d1a?s=96&d=mm&r=g\",\"caption\":\"Fernando Mosquera\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"How to configurate PAM IAG - Inprosec","description":"Discover how SAP IAG (Identity Access Governance) manages privileged access in SAP environments, including both cloud and On-Premise systems. This article details the use of Privileged Access Management and its integration with SAP BTP.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.inprosec.com\/en\/how-to-configurate-pam-iag\/","og_locale":"en_US","og_type":"article","og_title":"How to configurate PAM IAG","og_description":"Discover how SAP IAG (Identity Access Governance) manages privileged access in SAP environments, including both cloud and On-Premise systems. This article details the use of Privileged Access Management and its integration with SAP BTP.","og_url":"https:\/\/www.inprosec.com\/en\/how-to-configurate-pam-iag\/","og_site_name":"Inprosec","article_published_time":"2024-09-11T09:23:27+00:00","article_modified_time":"2025-07-10T11:46:31+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/www.inprosec.com\/wp-content\/uploads\/2024\/09\/How-to-configurate-PAM-IAG.jpg","type":"image\/jpeg"}],"author":"Fernando Mosquera","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Fernando Mosquera","Est. reading time":"11 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.inprosec.com\/en\/how-to-configurate-pam-iag\/#article","isPartOf":{"@id":"https:\/\/www.inprosec.com\/en\/how-to-configurate-pam-iag\/"},"author":{"name":"Fernando Mosquera","@id":"https:\/\/www.inprosec.com\/en\/#\/schema\/person\/b05a40c0c3e81b819075dd95a10532e2"},"headline":"How to configurate PAM IAG","datePublished":"2024-09-11T09:23:27+00:00","dateModified":"2025-07-10T11:46:31+00:00","mainEntityOfPage":{"@id":"https:\/\/www.inprosec.com\/en\/how-to-configurate-pam-iag\/"},"wordCount":1595,"commentCount":0,"image":{"@id":"https:\/\/www.inprosec.com\/en\/how-to-configurate-pam-iag\/#primaryimage"},"thumbnailUrl":"https:\/\/www.inprosec.com\/wp-content\/uploads\/2024\/09\/How-to-configurate-PAM-IAG.jpg","articleSection":["General","SAP GRC"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.inprosec.com\/en\/how-to-configurate-pam-iag\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.inprosec.com\/en\/how-to-configurate-pam-iag\/","url":"https:\/\/www.inprosec.com\/en\/how-to-configurate-pam-iag\/","name":"How to configurate PAM IAG - Inprosec","isPartOf":{"@id":"https:\/\/www.inprosec.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.inprosec.com\/en\/how-to-configurate-pam-iag\/#primaryimage"},"image":{"@id":"https:\/\/www.inprosec.com\/en\/how-to-configurate-pam-iag\/#primaryimage"},"thumbnailUrl":"https:\/\/www.inprosec.com\/wp-content\/uploads\/2024\/09\/How-to-configurate-PAM-IAG.jpg","datePublished":"2024-09-11T09:23:27+00:00","dateModified":"2025-07-10T11:46:31+00:00","author":{"@id":"https:\/\/www.inprosec.com\/en\/#\/schema\/person\/b05a40c0c3e81b819075dd95a10532e2"},"description":"Discover how SAP IAG (Identity Access Governance) manages privileged access in SAP environments, including both cloud and On-Premise systems. This article details the use of Privileged Access Management and its integration with SAP BTP.","breadcrumb":{"@id":"https:\/\/www.inprosec.com\/en\/how-to-configurate-pam-iag\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.inprosec.com\/en\/how-to-configurate-pam-iag\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.inprosec.com\/en\/how-to-configurate-pam-iag\/#primaryimage","url":"https:\/\/www.inprosec.com\/wp-content\/uploads\/2024\/09\/How-to-configurate-PAM-IAG.jpg","contentUrl":"https:\/\/www.inprosec.com\/wp-content\/uploads\/2024\/09\/How-to-configurate-PAM-IAG.jpg","width":1200,"height":630},{"@type":"BreadcrumbList","@id":"https:\/\/www.inprosec.com\/en\/how-to-configurate-pam-iag\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.inprosec.com\/en\/"},{"@type":"ListItem","position":2,"name":"How to configurate PAM IAG"}]},{"@type":"WebSite","@id":"https:\/\/www.inprosec.com\/en\/#website","url":"https:\/\/www.inprosec.com\/en\/","name":"Inprosec","description":"Information security is our priority.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.inprosec.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.inprosec.com\/en\/#\/schema\/person\/b05a40c0c3e81b819075dd95a10532e2","name":"Fernando Mosquera","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/199e6c54b14f5b5ddf7e11a9bb0b455c3bed7a9a1a738b7be5c2572878e69d1a?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/199e6c54b14f5b5ddf7e11a9bb0b455c3bed7a9a1a738b7be5c2572878e69d1a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/199e6c54b14f5b5ddf7e11a9bb0b455c3bed7a9a1a738b7be5c2572878e69d1a?s=96&d=mm&r=g","caption":"Fernando Mosquera"}}]}},"_links":{"self":[{"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/posts\/12096","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/comments?post=12096"}],"version-history":[{"count":1,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/posts\/12096\/revisions"}],"predecessor-version":[{"id":12098,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/posts\/12096\/revisions\/12098"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/media\/13410"}],"wp:attachment":[{"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/media?parent=12096"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/categories?post=12096"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/tags?post=12096"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}