{"id":9467,"date":"2023-09-20T09:59:34","date_gmt":"2023-09-20T07:59:34","guid":{"rendered":"https:\/\/www.inprosec.com\/?p=9467"},"modified":"2024-05-16T13:17:28","modified_gmt":"2024-05-16T11:17:28","slug":"webinar-introduction-to-sap-iag-how-does-it-differ-from-sap-grc-access-control","status":"publish","type":"post","link":"https:\/\/www.inprosec.com\/en\/webinar-introduction-to-sap-iag-how-does-it-differ-from-sap-grc-access-control\/","title":{"rendered":"Webinar &#8211; Introduction to SAP IAG. How does it differ from SAP GRC Access Control?"},"content":{"rendered":"<p>Uxio Fernandez Hermo, one of our SAP consultants, conducted a webinar on the Introduction to SAP IAG. How does it differ from SAP GRC Access Control? The webinar was held on our partner platform CUVIV and consisted of two one-hour sessions. One session was scheduled in the morning for the European audience, while the other took place in the afternoon for the Latin American audience.<\/p>\n<p>Targeted towards users with some knowledge of SAP, this webinar aimed to expand their knowledge and facilitate interaction with Uxio at the end of each session.<\/p>\n<h2>SAP IAG Features<\/h2>\n<p><img decoding=\"async\" class=\"aligncenter wp-image-9465\" src=\"https:\/\/www.inprosec.com\/wp-content\/uploads\/2023\/09\/WEBINAR-CUVIV_INPROSEC_IAG-10.jpg\" alt=\"\" width=\"701\" height=\"427\" srcset=\"https:\/\/www.inprosec.com\/wp-content\/uploads\/2023\/09\/WEBINAR-CUVIV_INPROSEC_IAG-10.jpg 1191w, https:\/\/www.inprosec.com\/wp-content\/uploads\/2023\/09\/WEBINAR-CUVIV_INPROSEC_IAG-10-300x183.jpg 300w, https:\/\/www.inprosec.com\/wp-content\/uploads\/2023\/09\/WEBINAR-CUVIV_INPROSEC_IAG-10-1024x623.jpg 1024w, https:\/\/www.inprosec.com\/wp-content\/uploads\/2023\/09\/WEBINAR-CUVIV_INPROSEC_IAG-10-600x365.jpg 600w\" sizes=\"(max-width: 701px) 100vw, 701px\" \/><\/p>\n<p>During the presentation, Uxio delved into<strong> Access Analysis Service<\/strong>, a service that functions similarly to Access Risk Analysis in SAP GRC AC, enabling the management of risks in systems connected to IAG. He explained the main differences compared to GRC AC, highlighting the native risk analysis for Cloud systems (AC only allows it for SuccessFactors) and the ability to perform cross-system risk analysis between both Cloud and non-Cloud applications.<\/p>\n<p>He emphasized the advantages of tools like <strong>Privilege Access Management (PAM)<\/strong>, which allows for the management of emergency access from request to review. PAM integrates with Access Request Service, enabling the request of emergency access through an approval workflow. When properly configured, this tool can be used directly by end-users without the need for administrative intervention. Uxio pointed out differences from GRC AC, such as its use only in ABAP systems, reliance on ID-based emergency access, and decentralized usage. Additionally, PAM doesn&#8217;t require software installation on satellite systems; ABAP is sufficient.<\/p>\n<p>Uxio then analyzed the functionalities of <strong>Access Request Service<\/strong>. This tool centralizes access management in SAP, using an approval workflow that enhances efficiency and traceability of changes. Unlike GRC AC, the workflows are not as configurable. Key differences from GRC AC include the ability to connect with both On-Premise and Cloud systems. Furthermore, HR events can be integrated to automate the Hire to Retire process, which cannot be customized in IAG as extensively as in GRC AC.<\/p>\n<p>Lastly, within the IAG functionalities, there&#8217;s<strong> Role Design Service<\/strong>, which manages the lifecycle of SAP system roles. It serves as a repository for roles that can be added to access requests through the Access Request service.<\/p>\n<p><img decoding=\"async\" class=\"aligncenter wp-image-9461\" src=\"https:\/\/www.inprosec.com\/wp-content\/uploads\/2023\/09\/WEBINAR-CUVIV_INPROSEC_IAG-20.jpg\" alt=\"\" width=\"701\" height=\"262\" srcset=\"https:\/\/www.inprosec.com\/wp-content\/uploads\/2023\/09\/WEBINAR-CUVIV_INPROSEC_IAG-20.jpg 1200w, https:\/\/www.inprosec.com\/wp-content\/uploads\/2023\/09\/WEBINAR-CUVIV_INPROSEC_IAG-20-300x112.jpg 300w, https:\/\/www.inprosec.com\/wp-content\/uploads\/2023\/09\/WEBINAR-CUVIV_INPROSEC_IAG-20-1024x382.jpg 1024w, https:\/\/www.inprosec.com\/wp-content\/uploads\/2023\/09\/WEBINAR-CUVIV_INPROSEC_IAG-20-600x224.jpg 600w\" sizes=\"(max-width: 701px) 100vw, 701px\" \/><\/p>\n<p>It differs from GRC AC in that it can be used as a repository for both On-Premise and Cloud system roles, providing assistants that assist administrators in creating Business Roles and also requiring less information for role categorization.<\/p>\n<h2>Integrations<\/h2>\n<p><strong>When to Implement GRC AC or IAG?<\/strong><\/p>\n<p><span style=\"text-decoration: underline;\">IAG-Only Scenario<\/span>: In this scenario, companies would use IAG as the sole access control application.<\/p>\n<p><span style=\"text-decoration: underline;\">Hybrid Scenario (GRC AC + IAG)<\/span>: In this scenario, SAP GRC AC is used for access management, and through a native integration with SAP GRC AC, IAG handles tasks related to Cloud systems. This scenario includes risk analysis, emergency access, access requests, and role management.<\/p>\n<h2>Conclusions<\/h2>\n<p>As shown throughout this article, <strong>the best outcome can be achieved by using the hybrid scenario<\/strong> in which SAP GRC AC and SAP IAG work together. The choice between a purely Cloud model (IAG only), a mixed model (IAG &amp; GRC AC), or a purely On-Premise model (GRC AC) can be summarized as follows:<\/p>\n<ul>\n<li><strong><span style=\"text-decoration: underline;\">Cloud Solution<\/span><\/strong>: Suitable for organizations with<strong> fewer than 500 users or straightforward and standardized access control<\/strong> <strong>processes<\/strong>, especially those related to account management. It can easily adapt to default processes provided by SAP IAG, and when access control over Cloud-type systems is needed. It&#8217;s worth noting that the licensing cost of SAP IAG is lower than SAP GRC AC.<\/li>\n<li><span style=\"text-decoration: underline;\"><strong>Hybrid Solution:<\/strong><\/span> Recommended for organizations with <strong>more than 500 users or complex processes<\/strong>. If an organization needs to manage access to Cloud systems and requires a high degree of customization in the tool, this solution is suitable. GRC AC offers greater adaptability, and when used in conjunction with SAP IAG, it can extend its capabilities to Cloud systems.<\/li>\n<\/ul>\n<p><img decoding=\"async\" class=\"aligncenter wp-image-9463\" src=\"https:\/\/www.inprosec.com\/wp-content\/uploads\/2023\/09\/WEBINAR-CUVIV_INPROSEC_IAG-26.jpg\" alt=\"\" width=\"701\" height=\"394\" srcset=\"https:\/\/www.inprosec.com\/wp-content\/uploads\/2023\/09\/WEBINAR-CUVIV_INPROSEC_IAG-26.jpg 1200w, https:\/\/www.inprosec.com\/wp-content\/uploads\/2023\/09\/WEBINAR-CUVIV_INPROSEC_IAG-26-300x169.jpg 300w, https:\/\/www.inprosec.com\/wp-content\/uploads\/2023\/09\/WEBINAR-CUVIV_INPROSEC_IAG-26-1024x576.jpg 1024w, https:\/\/www.inprosec.com\/wp-content\/uploads\/2023\/09\/WEBINAR-CUVIV_INPROSEC_IAG-26-600x338.jpg 600w\" sizes=\"(max-width: 701px) 100vw, 701px\" \/><\/p>\n<ul>\n<li><strong><span style=\"text-decoration: underline;\">On-Premise Solution<\/span><\/strong>: If an organization has <strong>more than 500 users and does not need to manage access to Cloud systems<\/strong>, implementing only SAP GRC AC would be advisable.<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Uxio Fernandez Hermo, one of our SAP consultants, conducted a webinar on the Introduction to SAP IAG. How does it differ from SAP GRC Access Control? The webinar was held on our partner platform CUVIV and consisted of two one-hour sessions. One session was scheduled in the morning for the European audience, while the other&#8230;<\/p>\n","protected":false},"author":1,"featured_media":9454,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[60,62],"tags":[149,152],"class_list":["post-9467","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-sap-grc-en","category-webinar-en","tag-access-control-en","tag-cloud-identity-governance-en"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.3 (Yoast SEO v27.6) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Webinar - Introduction to SAP IAG. How does it differ from SAP GRC Access Control? - Inprosec<\/title>\n<meta name=\"description\" content=\"Discover the most important aspects of the webinar &quot;Introduction to SAP IAG - how is it different from SAP GRC Access Control&quot; in this overview.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.inprosec.com\/en\/webinar-introduction-to-sap-iag-how-does-it-differ-from-sap-grc-access-control\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Webinar - Introduction to SAP IAG. How does it differ from SAP GRC Access Control?\" \/>\n<meta property=\"og:description\" content=\"Discover the most important aspects of the webinar &quot;Introduction to SAP IAG - how is it different from SAP GRC Access Control&quot; in this overview.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.inprosec.com\/en\/webinar-introduction-to-sap-iag-how-does-it-differ-from-sap-grc-access-control\/\" \/>\n<meta property=\"og:site_name\" content=\"Inprosec\" \/>\n<meta property=\"article:published_time\" content=\"2023-09-20T07:59:34+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-05-16T11:17:28+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.inprosec.com\/wp-content\/uploads\/2023\/09\/Webinar-SAP-IAG.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/webinar-introduction-to-sap-iag-how-does-it-differ-from-sap-grc-access-control\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/webinar-introduction-to-sap-iag-how-does-it-differ-from-sap-grc-access-control\\\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/#\\\/schema\\\/person\\\/5b5899cc2de44dac734f58620c63035c\"},\"headline\":\"Webinar &#8211; Introduction to SAP IAG. How does it differ from SAP GRC Access Control?\",\"datePublished\":\"2023-09-20T07:59:34+00:00\",\"dateModified\":\"2024-05-16T11:17:28+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/webinar-introduction-to-sap-iag-how-does-it-differ-from-sap-grc-access-control\\\/\"},\"wordCount\":684,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/webinar-introduction-to-sap-iag-how-does-it-differ-from-sap-grc-access-control\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.inprosec.com\\\/wp-content\\\/uploads\\\/2023\\\/09\\\/Webinar-SAP-IAG.jpg\",\"keywords\":[\"Access Control\",\"Cloud Identity Governance\"],\"articleSection\":[\"SAP GRC\",\"Webinar\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.inprosec.com\\\/en\\\/webinar-introduction-to-sap-iag-how-does-it-differ-from-sap-grc-access-control\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/webinar-introduction-to-sap-iag-how-does-it-differ-from-sap-grc-access-control\\\/\",\"url\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/webinar-introduction-to-sap-iag-how-does-it-differ-from-sap-grc-access-control\\\/\",\"name\":\"Webinar - Introduction to SAP IAG. How does it differ from SAP GRC Access Control? - Inprosec\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/webinar-introduction-to-sap-iag-how-does-it-differ-from-sap-grc-access-control\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/webinar-introduction-to-sap-iag-how-does-it-differ-from-sap-grc-access-control\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.inprosec.com\\\/wp-content\\\/uploads\\\/2023\\\/09\\\/Webinar-SAP-IAG.jpg\",\"datePublished\":\"2023-09-20T07:59:34+00:00\",\"dateModified\":\"2024-05-16T11:17:28+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/#\\\/schema\\\/person\\\/5b5899cc2de44dac734f58620c63035c\"},\"description\":\"Discover the most important aspects of the webinar \\\"Introduction to SAP IAG - how is it different from SAP GRC Access Control\\\" in this overview.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/webinar-introduction-to-sap-iag-how-does-it-differ-from-sap-grc-access-control\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.inprosec.com\\\/en\\\/webinar-introduction-to-sap-iag-how-does-it-differ-from-sap-grc-access-control\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/webinar-introduction-to-sap-iag-how-does-it-differ-from-sap-grc-access-control\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.inprosec.com\\\/wp-content\\\/uploads\\\/2023\\\/09\\\/Webinar-SAP-IAG.jpg\",\"contentUrl\":\"https:\\\/\\\/www.inprosec.com\\\/wp-content\\\/uploads\\\/2023\\\/09\\\/Webinar-SAP-IAG.jpg\",\"width\":1200,\"height\":630},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/webinar-introduction-to-sap-iag-how-does-it-differ-from-sap-grc-access-control\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Webinar &#8211; Introduction to SAP IAG. How does it differ from SAP GRC Access Control?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/\",\"name\":\"Inprosec\",\"description\":\"Information security is our priority.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/#\\\/schema\\\/person\\\/5b5899cc2de44dac734f58620c63035c\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d903daf71b546605502fd9841b9dc598cc8d3a04ee26680ca18eb3633e5209be?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d903daf71b546605502fd9841b9dc598cc8d3a04ee26680ca18eb3633e5209be?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d903daf71b546605502fd9841b9dc598cc8d3a04ee26680ca18eb3633e5209be?s=96&d=mm&r=g\",\"caption\":\"admin\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Webinar - Introduction to SAP IAG. How does it differ from SAP GRC Access Control? - Inprosec","description":"Discover the most important aspects of the webinar \"Introduction to SAP IAG - how is it different from SAP GRC Access Control\" in this overview.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.inprosec.com\/en\/webinar-introduction-to-sap-iag-how-does-it-differ-from-sap-grc-access-control\/","og_locale":"en_US","og_type":"article","og_title":"Webinar - Introduction to SAP IAG. How does it differ from SAP GRC Access Control?","og_description":"Discover the most important aspects of the webinar \"Introduction to SAP IAG - how is it different from SAP GRC Access Control\" in this overview.","og_url":"https:\/\/www.inprosec.com\/en\/webinar-introduction-to-sap-iag-how-does-it-differ-from-sap-grc-access-control\/","og_site_name":"Inprosec","article_published_time":"2023-09-20T07:59:34+00:00","article_modified_time":"2024-05-16T11:17:28+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/www.inprosec.com\/wp-content\/uploads\/2023\/09\/Webinar-SAP-IAG.jpg","type":"image\/jpeg"}],"author":"admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.inprosec.com\/en\/webinar-introduction-to-sap-iag-how-does-it-differ-from-sap-grc-access-control\/#article","isPartOf":{"@id":"https:\/\/www.inprosec.com\/en\/webinar-introduction-to-sap-iag-how-does-it-differ-from-sap-grc-access-control\/"},"author":{"name":"admin","@id":"https:\/\/www.inprosec.com\/en\/#\/schema\/person\/5b5899cc2de44dac734f58620c63035c"},"headline":"Webinar &#8211; Introduction to SAP IAG. How does it differ from SAP GRC Access Control?","datePublished":"2023-09-20T07:59:34+00:00","dateModified":"2024-05-16T11:17:28+00:00","mainEntityOfPage":{"@id":"https:\/\/www.inprosec.com\/en\/webinar-introduction-to-sap-iag-how-does-it-differ-from-sap-grc-access-control\/"},"wordCount":684,"commentCount":0,"image":{"@id":"https:\/\/www.inprosec.com\/en\/webinar-introduction-to-sap-iag-how-does-it-differ-from-sap-grc-access-control\/#primaryimage"},"thumbnailUrl":"https:\/\/www.inprosec.com\/wp-content\/uploads\/2023\/09\/Webinar-SAP-IAG.jpg","keywords":["Access Control","Cloud Identity Governance"],"articleSection":["SAP GRC","Webinar"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.inprosec.com\/en\/webinar-introduction-to-sap-iag-how-does-it-differ-from-sap-grc-access-control\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.inprosec.com\/en\/webinar-introduction-to-sap-iag-how-does-it-differ-from-sap-grc-access-control\/","url":"https:\/\/www.inprosec.com\/en\/webinar-introduction-to-sap-iag-how-does-it-differ-from-sap-grc-access-control\/","name":"Webinar - Introduction to SAP IAG. How does it differ from SAP GRC Access Control? - Inprosec","isPartOf":{"@id":"https:\/\/www.inprosec.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.inprosec.com\/en\/webinar-introduction-to-sap-iag-how-does-it-differ-from-sap-grc-access-control\/#primaryimage"},"image":{"@id":"https:\/\/www.inprosec.com\/en\/webinar-introduction-to-sap-iag-how-does-it-differ-from-sap-grc-access-control\/#primaryimage"},"thumbnailUrl":"https:\/\/www.inprosec.com\/wp-content\/uploads\/2023\/09\/Webinar-SAP-IAG.jpg","datePublished":"2023-09-20T07:59:34+00:00","dateModified":"2024-05-16T11:17:28+00:00","author":{"@id":"https:\/\/www.inprosec.com\/en\/#\/schema\/person\/5b5899cc2de44dac734f58620c63035c"},"description":"Discover the most important aspects of the webinar \"Introduction to SAP IAG - how is it different from SAP GRC Access Control\" in this overview.","breadcrumb":{"@id":"https:\/\/www.inprosec.com\/en\/webinar-introduction-to-sap-iag-how-does-it-differ-from-sap-grc-access-control\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.inprosec.com\/en\/webinar-introduction-to-sap-iag-how-does-it-differ-from-sap-grc-access-control\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.inprosec.com\/en\/webinar-introduction-to-sap-iag-how-does-it-differ-from-sap-grc-access-control\/#primaryimage","url":"https:\/\/www.inprosec.com\/wp-content\/uploads\/2023\/09\/Webinar-SAP-IAG.jpg","contentUrl":"https:\/\/www.inprosec.com\/wp-content\/uploads\/2023\/09\/Webinar-SAP-IAG.jpg","width":1200,"height":630},{"@type":"BreadcrumbList","@id":"https:\/\/www.inprosec.com\/en\/webinar-introduction-to-sap-iag-how-does-it-differ-from-sap-grc-access-control\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.inprosec.com\/en\/"},{"@type":"ListItem","position":2,"name":"Webinar &#8211; Introduction to SAP IAG. How does it differ from SAP GRC Access Control?"}]},{"@type":"WebSite","@id":"https:\/\/www.inprosec.com\/en\/#website","url":"https:\/\/www.inprosec.com\/en\/","name":"Inprosec","description":"Information security is our priority.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.inprosec.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.inprosec.com\/en\/#\/schema\/person\/5b5899cc2de44dac734f58620c63035c","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/d903daf71b546605502fd9841b9dc598cc8d3a04ee26680ca18eb3633e5209be?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d903daf71b546605502fd9841b9dc598cc8d3a04ee26680ca18eb3633e5209be?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d903daf71b546605502fd9841b9dc598cc8d3a04ee26680ca18eb3633e5209be?s=96&d=mm&r=g","caption":"admin"}}]}},"_links":{"self":[{"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/posts\/9467","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/comments?post=9467"}],"version-history":[{"count":1,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/posts\/9467\/revisions"}],"predecessor-version":[{"id":9470,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/posts\/9467\/revisions\/9470"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/media\/9454"}],"wp:attachment":[{"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/media?parent=9467"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/categories?post=9467"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/tags?post=9467"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}