SlideShare a Scribd company logo
Advanced Authorization for SAP Global Deployments Part 3:  SAP authorization model for secure Partner Collaboration Andy Han, VP Products, NextLabs, Inc.
Agenda Objective Understand partner collaboration lifecycle for global SAP deployment Apply the 2-Layer authorization model Identify authorization tools used in the solution Presentation Quick Recap of Part I The Partner Collaboration Lifecycle Partner Collaboration requirements for global SAP deployment 2-Layer authorization model Authorization implementation Question and Answers
Part I: Map Requirements to Authorization Tools Understanding Global Deployment Authorization Requirements and Challenges Authorization Model – Clear Separation of Authorization Dimensions Introduction to the Authorization Toolbox
The Partner Collaboration Lifecycle Marketing Engineering Manu- facturing Logistics Sales Service
Partner Collaboration Authorizations Intellectual Property (IP) Licenses NDA, PIA, PIEA Patent Licenses Trade Secrets Third Party IP Licenses Contractual Obligations Classified, Top Secret, Need to Know
Business Authorization Dimensions Functional Access Determine the actions a user can perform Data Access Determine the data a user can see Governance Rules for access management Data Access Functional Access Governance
Authorization Requirements - Functional Marketing Engineering Manu- facturing Logistics Sales Service
Authorization Requirements - Data Intellectual Property Type PUBLIC PATENT TRADESECRET PROPRIETARY THIRD-PARTY PROPRIETARY COPYRIGHT TRADEMARK IP License IP Owner – IP Designee IP License (NDA, PIA, Patent License) Business Classification Program, Project Product Technology Family Customer (Service) Significant overlap with Export Classification – the same data will also have Export classifications.
Authorization Requirements - Governance Classification Processes IP Classification (type, owner, license) Business classification (Program, project, product, customer) IP Publication Process for publishing IP to external facing applications External User Company and Project assignments Managing the creation of accounts for external users with accurate information for company and project assignment IP License Management Managing IP licenses established by legal Marking, Audit and Record Keeping
Authorization Map Example
Access Control Subjects Roles Marketing Roles Engineering Roles Manufacturing Roles Logistic Roles Sales Roles Service Roles Legal Roles IT Administrators Supply Chain Management Attributes Program Contract Project Company Application / Scope of Work Technology
Functional Authorization Map
Data Authorization Map
Governance Authorization Map
Authorization Layers Subject 2 1 Functional Authorization Layer 1 3 1 3 3 Governance Data Authorization Layer 5 6 Resource
Authorization Toolbox Functional Authorization Layer SAP Authorization Concept Access Provisioning Custom Development Data Authorization Layer System Segregation Client Partitions SAP Authorization Concept PLM Access Control Model (ACM) Attribute Based Access Control (ABAC) Custom Development Governance SAP GRC Access & Process Control Identity Management Manual Authorization Management Procedures
Sustainable Authorization Management How many partner organizations will I collaborate with? How many programs or projects will I need to support? How many IP Licenses will I need to manage?
Functional Authorization Map SAP Authorization Concept ,[object Object]
Define Transaction or Function Groups
Define Authorization ObjectsSAP PLM ACM ,[object Object]
Group Resources and UsersSystem Segregation ,[object Object],[object Object]
Custom authorization objectsABAC or PLM ACM ,[object Object]
Choice depends on number of authorizations,[object Object],[object Object]
Advanced Authorization Challenges Collaboration Security How do I share data and functions to enable global collaboration? How to I enable collaboration with external partners? How do I do more business around the world? How to I support systems 24/7 at the lowest cost? How do I limit access to data and functions for users in a specific region or LOB? How do I protect my company IP from leaking outside the company? How do ensure compliance with multiple global regulations? How do I control privileged IT users?
Anatomy of a Global Deployment RegulatoryJurisdictions Global Shared Process ,[object Object]

More Related Content

What's hot

McKesson - Business Process Redesign
McKesson - Business Process RedesignMcKesson - Business Process Redesign
McKesson - Business Process Redesign
Bhavik Doshi
 
Sage Solutions Brief.Mjo
Sage Solutions Brief.MjoSage Solutions Brief.Mjo
Sage Solutions Brief.Mjo
mjo57
 
E-RBAC Development - A Risk Based Security Architecture Approach
E-RBAC Development - A Risk Based Security Architecture ApproachE-RBAC Development - A Risk Based Security Architecture Approach
E-RBAC Development - A Risk Based Security Architecture Approach
Femi Ashaye
 
SAP Risk Management
SAP Risk ManagementSAP Risk Management
SAP Risk Management
AuditBot SAP Security Audit
 
Advanced Controls access and user security for superusers con8824
Advanced Controls access and user security for superusers con8824Advanced Controls access and user security for superusers con8824
Advanced Controls access and user security for superusers con8824
Oracle
 
Sap GRC Basic Information | GRC 12 online training
Sap GRC Basic Information | GRC 12 online trainingSap GRC Basic Information | GRC 12 online training
Sap GRC Basic Information | GRC 12 online training
grconlinetraining
 
Identity & Access Management for Securing DevOps
Identity & Access Management for Securing DevOpsIdentity & Access Management for Securing DevOps
Identity & Access Management for Securing DevOps
Eryk Budi Pratama
 
SAP License Audit Tips
SAP License Audit TipsSAP License Audit Tips
SAP License Audit Tips
AuditBot SAP Security Audit
 
McKesson Case Study
McKesson Case StudyMcKesson Case Study
McKesson Case Study
ForgeRock
 
The Information Office
The Information OfficeThe Information Office
The Information Office
Mahesh Patwardhan
 
Iam suite introduction
Iam suite introductionIam suite introduction
Iam suite introduction
wardell henley
 
Co p
Co pCo p
Co p
Co pCo p
AMB110: IT Asset Management – How to Start When You Don’t Know Where to Start
AMB110: IT Asset Management – How to Start When You Don’t Know Where to StartAMB110: IT Asset Management – How to Start When You Don’t Know Where to Start
AMB110: IT Asset Management – How to Start When You Don’t Know Where to Start
Ivanti
 
Reducing The Time And Costs Associated With Sarbanes Oxley Compliance
Reducing The Time And Costs Associated With Sarbanes Oxley ComplianceReducing The Time And Costs Associated With Sarbanes Oxley Compliance
Reducing The Time And Costs Associated With Sarbanes Oxley Compliance
Michael Findling
 
Case Study: McKesson
Case Study: McKessonCase Study: McKesson
Case Study: McKesson
ForgeRock
 
Soa best practice
Soa best practiceSoa best practice
Soa best practice
Ravi Nekkalapu
 
Stop Overpaying, Take Control of SAP Licensing and Only Pay for What You Actu...
Stop Overpaying, Take Control of SAP Licensing and Only Pay for What You Actu...Stop Overpaying, Take Control of SAP Licensing and Only Pay for What You Actu...
Stop Overpaying, Take Control of SAP Licensing and Only Pay for What You Actu...
Ivanti
 
Data Security Service Offering-v3
Data Security Service Offering-v3Data Security Service Offering-v3
Data Security Service Offering-v3
Abe Newton
 
Cm3 secure code_training_1day_access_control
Cm3 secure code_training_1day_access_controlCm3 secure code_training_1day_access_control
Cm3 secure code_training_1day_access_control
dcervigni
 

What's hot (20)

McKesson - Business Process Redesign
McKesson - Business Process RedesignMcKesson - Business Process Redesign
McKesson - Business Process Redesign
 
Sage Solutions Brief.Mjo
Sage Solutions Brief.MjoSage Solutions Brief.Mjo
Sage Solutions Brief.Mjo
 
E-RBAC Development - A Risk Based Security Architecture Approach
E-RBAC Development - A Risk Based Security Architecture ApproachE-RBAC Development - A Risk Based Security Architecture Approach
E-RBAC Development - A Risk Based Security Architecture Approach
 
SAP Risk Management
SAP Risk ManagementSAP Risk Management
SAP Risk Management
 
Advanced Controls access and user security for superusers con8824
Advanced Controls access and user security for superusers con8824Advanced Controls access and user security for superusers con8824
Advanced Controls access and user security for superusers con8824
 
Sap GRC Basic Information | GRC 12 online training
Sap GRC Basic Information | GRC 12 online trainingSap GRC Basic Information | GRC 12 online training
Sap GRC Basic Information | GRC 12 online training
 
Identity & Access Management for Securing DevOps
Identity & Access Management for Securing DevOpsIdentity & Access Management for Securing DevOps
Identity & Access Management for Securing DevOps
 
SAP License Audit Tips
SAP License Audit TipsSAP License Audit Tips
SAP License Audit Tips
 
McKesson Case Study
McKesson Case StudyMcKesson Case Study
McKesson Case Study
 
The Information Office
The Information OfficeThe Information Office
The Information Office
 
Iam suite introduction
Iam suite introductionIam suite introduction
Iam suite introduction
 
Co p
Co pCo p
Co p
 
Co p
Co pCo p
Co p
 
AMB110: IT Asset Management – How to Start When You Don’t Know Where to Start
AMB110: IT Asset Management – How to Start When You Don’t Know Where to StartAMB110: IT Asset Management – How to Start When You Don’t Know Where to Start
AMB110: IT Asset Management – How to Start When You Don’t Know Where to Start
 
Reducing The Time And Costs Associated With Sarbanes Oxley Compliance
Reducing The Time And Costs Associated With Sarbanes Oxley ComplianceReducing The Time And Costs Associated With Sarbanes Oxley Compliance
Reducing The Time And Costs Associated With Sarbanes Oxley Compliance
 
Case Study: McKesson
Case Study: McKessonCase Study: McKesson
Case Study: McKesson
 
Soa best practice
Soa best practiceSoa best practice
Soa best practice
 
Stop Overpaying, Take Control of SAP Licensing and Only Pay for What You Actu...
Stop Overpaying, Take Control of SAP Licensing and Only Pay for What You Actu...Stop Overpaying, Take Control of SAP Licensing and Only Pay for What You Actu...
Stop Overpaying, Take Control of SAP Licensing and Only Pay for What You Actu...
 
Data Security Service Offering-v3
Data Security Service Offering-v3Data Security Service Offering-v3
Data Security Service Offering-v3
 
Cm3 secure code_training_1day_access_control
Cm3 secure code_training_1day_access_controlCm3 secure code_training_1day_access_control
Cm3 secure code_training_1day_access_control
 

Viewers also liked

Part III of III: SAP Advanced Authorization for SAP Global Deployments: Octo...
Part III of III:  SAP Advanced Authorization for SAP Global Deployments: Octo...Part III of III:  SAP Advanced Authorization for SAP Global Deployments: Octo...
Part III of III: SAP Advanced Authorization for SAP Global Deployments: Octo...
NextLabs, Inc.
 
Digital Rights Management
Digital Rights ManagementDigital Rights Management
Digital Rights Management
NextLabs, Inc.
 
Cloud & Mobility Goldmines
Cloud & Mobility GoldminesCloud & Mobility Goldmines
Cloud & Mobility Goldmines
VSR *
 
Responsible Global Spend - Sample Program and Timeline
Responsible Global Spend - Sample Program and TimelineResponsible Global Spend - Sample Program and Timeline
Responsible Global Spend - Sample Program and Timeline
Bill Kohnen
 
TechNight #12: Cloud Identity Summit 2014 @ Monteray 概要と主要トピック
TechNight #12: Cloud Identity Summit2014 @ Monteray 概要と主要トピックTechNight #12: Cloud Identity Summit2014 @ Monteray 概要と主要トピック
TechNight #12: Cloud Identity Summit 2014 @ Monteray 概要と主要トピック
Daisuke Fuke
 
Project Management is the Catalyst to transform India into a Global Leader in...
Project Management is the Catalyst to transform India into a Global Leader in...Project Management is the Catalyst to transform India into a Global Leader in...
Project Management is the Catalyst to transform India into a Global Leader in...
VSR *
 
Identity assurance & the market for verified attributes
Identity assurance & the market for verified attributesIdentity assurance & the market for verified attributes
Identity assurance & the market for verified attributes
James Varga
 
Taste of Failure is Key for Sustainable Success
Taste of Failure is Key for Sustainable SuccessTaste of Failure is Key for Sustainable Success
Taste of Failure is Key for Sustainable Success
VSR *
 
AGLEA SAP Security Analyzer SoD Remediation SoX authorization
AGLEA SAP Security Analyzer SoD Remediation SoX authorizationAGLEA SAP Security Analyzer SoD Remediation SoX authorization
AGLEA SAP Security Analyzer SoD Remediation SoX authorization
Massimo Manara
 
CIS13: Next Generation Privileged Identity Management: A Market Overview
CIS13: Next Generation Privileged Identity Management: A Market OverviewCIS13: Next Generation Privileged Identity Management: A Market Overview
CIS13: Next Generation Privileged Identity Management: A Market Overview
CloudIDSummit
 
OpenID Connect Demo at OpenID Tech Night
OpenID Connect Demo at OpenID Tech NightOpenID Connect Demo at OpenID Tech Night
OpenID Connect Demo at OpenID Tech Night
Daisuke Fuke
 
OpenID TechNight - Ping Identity 製品紹介
OpenID TechNight - Ping Identity 製品紹介OpenID TechNight - Ping Identity 製品紹介
OpenID TechNight - Ping Identity 製品紹介Daisuke Fuke
 
SharePoint Business Track Part 1 of 2
SharePoint Business Track Part 1 of 2SharePoint Business Track Part 1 of 2
SharePoint Business Track Part 1 of 2
NextLabs, Inc.
 
Digital in store for dummies
Digital in store for dummiesDigital in store for dummies
Digital in store for dummies
Paolo Maioli
 
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John DasilvaCIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CloudIDSummit
 
Colin Glynn, Rolls-Royce plc Presentation
Colin Glynn, Rolls-Royce plc PresentationColin Glynn, Rolls-Royce plc Presentation
Colin Glynn, Rolls-Royce plc Presentation
Amy Jacobs MA BA Hons
 
CIS13: Intelligence-Driven IAM: The Next Generation of Identity and Access Go...
CIS13: Intelligence-Driven IAM: The Next Generation of Identity and Access Go...CIS13: Intelligence-Driven IAM: The Next Generation of Identity and Access Go...
CIS13: Intelligence-Driven IAM: The Next Generation of Identity and Access Go...
CloudIDSummit
 
Fédération d'identité, séminaire du 27 novembre 2014
Fédération d'identité, séminaire du 27 novembre 2014Fédération d'identité, séminaire du 27 novembre 2014
Fédération d'identité, séminaire du 27 novembre 2014
e-Xpert Solutions SA
 
Self Branding of Project Manager.. What & How?
Self Branding of Project Manager.. What & How?Self Branding of Project Manager.. What & How?
Self Branding of Project Manager.. What & How?
VSR *
 
Retail ERP Solution -SOD Technologies Pvt Ltd
Retail ERP Solution -SOD Technologies Pvt LtdRetail ERP Solution -SOD Technologies Pvt Ltd
Retail ERP Solution -SOD Technologies Pvt Ltd
Sodtech
 

Viewers also liked (20)

Part III of III: SAP Advanced Authorization for SAP Global Deployments: Octo...
Part III of III:  SAP Advanced Authorization for SAP Global Deployments: Octo...Part III of III:  SAP Advanced Authorization for SAP Global Deployments: Octo...
Part III of III: SAP Advanced Authorization for SAP Global Deployments: Octo...
 
Digital Rights Management
Digital Rights ManagementDigital Rights Management
Digital Rights Management
 
Cloud & Mobility Goldmines
Cloud & Mobility GoldminesCloud & Mobility Goldmines
Cloud & Mobility Goldmines
 
Responsible Global Spend - Sample Program and Timeline
Responsible Global Spend - Sample Program and TimelineResponsible Global Spend - Sample Program and Timeline
Responsible Global Spend - Sample Program and Timeline
 
TechNight #12: Cloud Identity Summit 2014 @ Monteray 概要と主要トピック
TechNight #12: Cloud Identity Summit2014 @ Monteray 概要と主要トピックTechNight #12: Cloud Identity Summit2014 @ Monteray 概要と主要トピック
TechNight #12: Cloud Identity Summit 2014 @ Monteray 概要と主要トピック
 
Project Management is the Catalyst to transform India into a Global Leader in...
Project Management is the Catalyst to transform India into a Global Leader in...Project Management is the Catalyst to transform India into a Global Leader in...
Project Management is the Catalyst to transform India into a Global Leader in...
 
Identity assurance & the market for verified attributes
Identity assurance & the market for verified attributesIdentity assurance & the market for verified attributes
Identity assurance & the market for verified attributes
 
Taste of Failure is Key for Sustainable Success
Taste of Failure is Key for Sustainable SuccessTaste of Failure is Key for Sustainable Success
Taste of Failure is Key for Sustainable Success
 
AGLEA SAP Security Analyzer SoD Remediation SoX authorization
AGLEA SAP Security Analyzer SoD Remediation SoX authorizationAGLEA SAP Security Analyzer SoD Remediation SoX authorization
AGLEA SAP Security Analyzer SoD Remediation SoX authorization
 
CIS13: Next Generation Privileged Identity Management: A Market Overview
CIS13: Next Generation Privileged Identity Management: A Market OverviewCIS13: Next Generation Privileged Identity Management: A Market Overview
CIS13: Next Generation Privileged Identity Management: A Market Overview
 
OpenID Connect Demo at OpenID Tech Night
OpenID Connect Demo at OpenID Tech NightOpenID Connect Demo at OpenID Tech Night
OpenID Connect Demo at OpenID Tech Night
 
OpenID TechNight - Ping Identity 製品紹介
OpenID TechNight - Ping Identity 製品紹介OpenID TechNight - Ping Identity 製品紹介
OpenID TechNight - Ping Identity 製品紹介
 
SharePoint Business Track Part 1 of 2
SharePoint Business Track Part 1 of 2SharePoint Business Track Part 1 of 2
SharePoint Business Track Part 1 of 2
 
Digital in store for dummies
Digital in store for dummiesDigital in store for dummies
Digital in store for dummies
 
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John DasilvaCIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
 
Colin Glynn, Rolls-Royce plc Presentation
Colin Glynn, Rolls-Royce plc PresentationColin Glynn, Rolls-Royce plc Presentation
Colin Glynn, Rolls-Royce plc Presentation
 
CIS13: Intelligence-Driven IAM: The Next Generation of Identity and Access Go...
CIS13: Intelligence-Driven IAM: The Next Generation of Identity and Access Go...CIS13: Intelligence-Driven IAM: The Next Generation of Identity and Access Go...
CIS13: Intelligence-Driven IAM: The Next Generation of Identity and Access Go...
 
Fédération d'identité, séminaire du 27 novembre 2014
Fédération d'identité, séminaire du 27 novembre 2014Fédération d'identité, séminaire du 27 novembre 2014
Fédération d'identité, séminaire du 27 novembre 2014
 
Self Branding of Project Manager.. What & How?
Self Branding of Project Manager.. What & How?Self Branding of Project Manager.. What & How?
Self Branding of Project Manager.. What & How?
 
Retail ERP Solution -SOD Technologies Pvt Ltd
Retail ERP Solution -SOD Technologies Pvt LtdRetail ERP Solution -SOD Technologies Pvt Ltd
Retail ERP Solution -SOD Technologies Pvt Ltd
 

Similar to Advanced Authorization for SAP Global Deployments Part III of III

PART I of III: Advanced Authorization for SAP Global Deployments: September ...
PART I of III:  Advanced Authorization for SAP Global Deployments: September ...PART I of III:  Advanced Authorization for SAP Global Deployments: September ...
PART I of III: Advanced Authorization for SAP Global Deployments: September ...
NextLabs, Inc.
 
Coghead Overview 21 Aug08
Coghead Overview 21 Aug08Coghead Overview 21 Aug08
Coghead Overview 21 Aug08
Tomoaki Sawada
 
Forum Presentation
Forum PresentationForum Presentation
Forum Presentation
allaboutsyed
 
SAP GRC
SAP GRC SAP GRC
The 4th Generation Kingland platform
The 4th Generation Kingland platformThe 4th Generation Kingland platform
The 4th Generation Kingland platform
Kingland
 
Business Intelligenze Corporate
Business Intelligenze CorporateBusiness Intelligenze Corporate
Business Intelligenze Corporate
BusinessIntelligenze
 
DataOps: Control-M's role in data pipeline orchestration
DataOps: Control-M's role in data pipeline orchestrationDataOps: Control-M's role in data pipeline orchestration
DataOps: Control-M's role in data pipeline orchestration
pzjnjr6rsg
 
Ireland Apo University Fy 10 Tibbs Slideshare
Ireland Apo University Fy 10 Tibbs SlideshareIreland Apo University Fy 10 Tibbs Slideshare
Ireland Apo University Fy 10 Tibbs Slideshare
Tibbs Pereira
 
IT Software Category
IT Software CategoryIT Software Category
IT Software Category
Mehul Vora
 
Redefining Business Collaboration
Redefining Business CollaborationRedefining Business Collaboration
Redefining Business Collaboration
Juan Manuel Mogollón
 
Red7 Product Management Software Tools Overview
Red7 Product Management Software Tools OverviewRed7 Product Management Software Tools Overview
Red7 Product Management Software Tools Overview
Robert Grupe, CSSLP CISSP PE PMP
 
Andy chatha - arc advisory group - rethinking it and automation solutions
Andy chatha - arc advisory group - rethinking it and automation solutionsAndy chatha - arc advisory group - rethinking it and automation solutions
Andy chatha - arc advisory group - rethinking it and automation solutions
ARC Advisory Group
 
Trailhead Live Developer Workshop - Salesforce App Cloud
Trailhead Live Developer Workshop - Salesforce App CloudTrailhead Live Developer Workshop - Salesforce App Cloud
Trailhead Live Developer Workshop - Salesforce App Cloud
Sam Garforth
 
One Vision
One VisionOne Vision
One Vision
johneverhard
 
Platform for Secure Digital Business
Platform for Secure Digital BusinessPlatform for Secure Digital Business
Platform for Secure Digital Business
Akana
 
Clarity It Sourcing Diagnostic Presentation
Clarity It Sourcing Diagnostic PresentationClarity It Sourcing Diagnostic Presentation
Clarity It Sourcing Diagnostic Presentation
tony_at_integration_executive
 
Monitoring and observabilty at Bolt
Monitoring and observabilty at BoltMonitoring and observabilty at Bolt
Monitoring and observabilty at Bolt
MoovingON
 
IAM Solution
IAM  SolutionIAM  Solution
IAM Solution
vikasraina
 
Converge Leveraging Identity With Professional Open Source Final
Converge   Leveraging Identity With Professional Open Source FinalConverge   Leveraging Identity With Professional Open Source Final
Converge Leveraging Identity With Professional Open Source Final
Gonow
 
Connecting the dots – Industrial IoT is more than just sensor deployment
Connecting the dots – Industrial IoT is more than just sensor deploymentConnecting the dots – Industrial IoT is more than just sensor deployment
Connecting the dots – Industrial IoT is more than just sensor deployment
Nagarro
 

Similar to Advanced Authorization for SAP Global Deployments Part III of III (20)

PART I of III: Advanced Authorization for SAP Global Deployments: September ...
PART I of III:  Advanced Authorization for SAP Global Deployments: September ...PART I of III:  Advanced Authorization for SAP Global Deployments: September ...
PART I of III: Advanced Authorization for SAP Global Deployments: September ...
 
Coghead Overview 21 Aug08
Coghead Overview 21 Aug08Coghead Overview 21 Aug08
Coghead Overview 21 Aug08
 
Forum Presentation
Forum PresentationForum Presentation
Forum Presentation
 
SAP GRC
SAP GRC SAP GRC
SAP GRC
 
The 4th Generation Kingland platform
The 4th Generation Kingland platformThe 4th Generation Kingland platform
The 4th Generation Kingland platform
 
Business Intelligenze Corporate
Business Intelligenze CorporateBusiness Intelligenze Corporate
Business Intelligenze Corporate
 
DataOps: Control-M's role in data pipeline orchestration
DataOps: Control-M's role in data pipeline orchestrationDataOps: Control-M's role in data pipeline orchestration
DataOps: Control-M's role in data pipeline orchestration
 
Ireland Apo University Fy 10 Tibbs Slideshare
Ireland Apo University Fy 10 Tibbs SlideshareIreland Apo University Fy 10 Tibbs Slideshare
Ireland Apo University Fy 10 Tibbs Slideshare
 
IT Software Category
IT Software CategoryIT Software Category
IT Software Category
 
Redefining Business Collaboration
Redefining Business CollaborationRedefining Business Collaboration
Redefining Business Collaboration
 
Red7 Product Management Software Tools Overview
Red7 Product Management Software Tools OverviewRed7 Product Management Software Tools Overview
Red7 Product Management Software Tools Overview
 
Andy chatha - arc advisory group - rethinking it and automation solutions
Andy chatha - arc advisory group - rethinking it and automation solutionsAndy chatha - arc advisory group - rethinking it and automation solutions
Andy chatha - arc advisory group - rethinking it and automation solutions
 
Trailhead Live Developer Workshop - Salesforce App Cloud
Trailhead Live Developer Workshop - Salesforce App CloudTrailhead Live Developer Workshop - Salesforce App Cloud
Trailhead Live Developer Workshop - Salesforce App Cloud
 
One Vision
One VisionOne Vision
One Vision
 
Platform for Secure Digital Business
Platform for Secure Digital BusinessPlatform for Secure Digital Business
Platform for Secure Digital Business
 
Clarity It Sourcing Diagnostic Presentation
Clarity It Sourcing Diagnostic PresentationClarity It Sourcing Diagnostic Presentation
Clarity It Sourcing Diagnostic Presentation
 
Monitoring and observabilty at Bolt
Monitoring and observabilty at BoltMonitoring and observabilty at Bolt
Monitoring and observabilty at Bolt
 
IAM Solution
IAM  SolutionIAM  Solution
IAM Solution
 
Converge Leveraging Identity With Professional Open Source Final
Converge   Leveraging Identity With Professional Open Source FinalConverge   Leveraging Identity With Professional Open Source Final
Converge Leveraging Identity With Professional Open Source Final
 
Connecting the dots – Industrial IoT is more than just sensor deployment
Connecting the dots – Industrial IoT is more than just sensor deploymentConnecting the dots – Industrial IoT is more than just sensor deployment
Connecting the dots – Industrial IoT is more than just sensor deployment
 

More from NextLabs, Inc.

Addressing Gaps in Your Cyber Security
Addressing Gaps in Your Cyber Security Addressing Gaps in Your Cyber Security
Addressing Gaps in Your Cyber Security
NextLabs, Inc.
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
NextLabs, Inc.
 
eGRC for Information Export Control
eGRC for Information Export ControleGRC for Information Export Control
eGRC for Information Export Control
NextLabs, Inc.
 
Requirements for Implementing Data-Centric ABAC
Requirements for Implementing Data-Centric ABAC Requirements for Implementing Data-Centric ABAC
Requirements for Implementing Data-Centric ABAC
NextLabs, Inc.
 
Data-Centric Security for the Extended Enterprise
Data-Centric Security for the Extended EnterpriseData-Centric Security for the Extended Enterprise
Data-Centric Security for the Extended Enterprise
NextLabs, Inc.
 
Managing Role Explosion with Attribute-based Access Control - Webinar Series ...
Managing Role Explosion with Attribute-based Access Control - Webinar Series ...Managing Role Explosion with Attribute-based Access Control - Webinar Series ...
Managing Role Explosion with Attribute-based Access Control - Webinar Series ...
NextLabs, Inc.
 
Managing Role Explosion with Attribute-based Access Control - Webinar Series ...
Managing Role Explosion with Attribute-based Access Control - Webinar Series ...Managing Role Explosion with Attribute-based Access Control - Webinar Series ...
Managing Role Explosion with Attribute-based Access Control - Webinar Series ...
NextLabs, Inc.
 
Using Microsoft Dynamic Access Control to create Information Barriers for SEC...
Using Microsoft Dynamic Access Control to create Information Barriers for SEC...Using Microsoft Dynamic Access Control to create Information Barriers for SEC...
Using Microsoft Dynamic Access Control to create Information Barriers for SEC...
NextLabs, Inc.
 
NextLabs Internships
NextLabs InternshipsNextLabs Internships
NextLabs Internships
NextLabs, Inc.
 
Extensible Authorization for SAP Applications Webinar
Extensible Authorization for SAP Applications WebinarExtensible Authorization for SAP Applications Webinar
Extensible Authorization for SAP Applications Webinar
NextLabs, Inc.
 
Preview Of Gary Stanley 10 Commandments
Preview  Of Gary Stanley 10 CommandmentsPreview  Of Gary Stanley 10 Commandments
Preview Of Gary Stanley 10 Commandments
NextLabs, Inc.
 
Preview of Heaney On ITAR Controls
Preview of Heaney On ITAR ControlsPreview of Heaney On ITAR Controls
Preview of Heaney On ITAR Controls
NextLabs, Inc.
 

More from NextLabs, Inc. (12)

Addressing Gaps in Your Cyber Security
Addressing Gaps in Your Cyber Security Addressing Gaps in Your Cyber Security
Addressing Gaps in Your Cyber Security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
eGRC for Information Export Control
eGRC for Information Export ControleGRC for Information Export Control
eGRC for Information Export Control
 
Requirements for Implementing Data-Centric ABAC
Requirements for Implementing Data-Centric ABAC Requirements for Implementing Data-Centric ABAC
Requirements for Implementing Data-Centric ABAC
 
Data-Centric Security for the Extended Enterprise
Data-Centric Security for the Extended EnterpriseData-Centric Security for the Extended Enterprise
Data-Centric Security for the Extended Enterprise
 
Managing Role Explosion with Attribute-based Access Control - Webinar Series ...
Managing Role Explosion with Attribute-based Access Control - Webinar Series ...Managing Role Explosion with Attribute-based Access Control - Webinar Series ...
Managing Role Explosion with Attribute-based Access Control - Webinar Series ...
 
Managing Role Explosion with Attribute-based Access Control - Webinar Series ...
Managing Role Explosion with Attribute-based Access Control - Webinar Series ...Managing Role Explosion with Attribute-based Access Control - Webinar Series ...
Managing Role Explosion with Attribute-based Access Control - Webinar Series ...
 
Using Microsoft Dynamic Access Control to create Information Barriers for SEC...
Using Microsoft Dynamic Access Control to create Information Barriers for SEC...Using Microsoft Dynamic Access Control to create Information Barriers for SEC...
Using Microsoft Dynamic Access Control to create Information Barriers for SEC...
 
NextLabs Internships
NextLabs InternshipsNextLabs Internships
NextLabs Internships
 
Extensible Authorization for SAP Applications Webinar
Extensible Authorization for SAP Applications WebinarExtensible Authorization for SAP Applications Webinar
Extensible Authorization for SAP Applications Webinar
 
Preview Of Gary Stanley 10 Commandments
Preview  Of Gary Stanley 10 CommandmentsPreview  Of Gary Stanley 10 Commandments
Preview Of Gary Stanley 10 Commandments
 
Preview of Heaney On ITAR Controls
Preview of Heaney On ITAR ControlsPreview of Heaney On ITAR Controls
Preview of Heaney On ITAR Controls
 

Recently uploaded

HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
SitimaJohn
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
Jason Packer
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 
Project Management Semester Long Project - Acuity
Project Management Semester Long Project - AcuityProject Management Semester Long Project - Acuity
Project Management Semester Long Project - Acuity
jpupo2018
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
akankshawande
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
Webinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data WarehouseWebinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data Warehouse
Federico Razzoli
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 

Recently uploaded (20)

HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 
Project Management Semester Long Project - Acuity
Project Management Semester Long Project - AcuityProject Management Semester Long Project - Acuity
Project Management Semester Long Project - Acuity
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
Webinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data WarehouseWebinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data Warehouse
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 

Advanced Authorization for SAP Global Deployments Part III of III

  • 1. Advanced Authorization for SAP Global Deployments Part 3: SAP authorization model for secure Partner Collaboration Andy Han, VP Products, NextLabs, Inc.
  • 2. Agenda Objective Understand partner collaboration lifecycle for global SAP deployment Apply the 2-Layer authorization model Identify authorization tools used in the solution Presentation Quick Recap of Part I The Partner Collaboration Lifecycle Partner Collaboration requirements for global SAP deployment 2-Layer authorization model Authorization implementation Question and Answers
  • 3. Part I: Map Requirements to Authorization Tools Understanding Global Deployment Authorization Requirements and Challenges Authorization Model – Clear Separation of Authorization Dimensions Introduction to the Authorization Toolbox
  • 4. The Partner Collaboration Lifecycle Marketing Engineering Manu- facturing Logistics Sales Service
  • 5. Partner Collaboration Authorizations Intellectual Property (IP) Licenses NDA, PIA, PIEA Patent Licenses Trade Secrets Third Party IP Licenses Contractual Obligations Classified, Top Secret, Need to Know
  • 6. Business Authorization Dimensions Functional Access Determine the actions a user can perform Data Access Determine the data a user can see Governance Rules for access management Data Access Functional Access Governance
  • 7. Authorization Requirements - Functional Marketing Engineering Manu- facturing Logistics Sales Service
  • 8. Authorization Requirements - Data Intellectual Property Type PUBLIC PATENT TRADESECRET PROPRIETARY THIRD-PARTY PROPRIETARY COPYRIGHT TRADEMARK IP License IP Owner – IP Designee IP License (NDA, PIA, Patent License) Business Classification Program, Project Product Technology Family Customer (Service) Significant overlap with Export Classification – the same data will also have Export classifications.
  • 9. Authorization Requirements - Governance Classification Processes IP Classification (type, owner, license) Business classification (Program, project, product, customer) IP Publication Process for publishing IP to external facing applications External User Company and Project assignments Managing the creation of accounts for external users with accurate information for company and project assignment IP License Management Managing IP licenses established by legal Marking, Audit and Record Keeping
  • 11. Access Control Subjects Roles Marketing Roles Engineering Roles Manufacturing Roles Logistic Roles Sales Roles Service Roles Legal Roles IT Administrators Supply Chain Management Attributes Program Contract Project Company Application / Scope of Work Technology
  • 15. Authorization Layers Subject 2 1 Functional Authorization Layer 1 3 1 3 3 Governance Data Authorization Layer 5 6 Resource
  • 16. Authorization Toolbox Functional Authorization Layer SAP Authorization Concept Access Provisioning Custom Development Data Authorization Layer System Segregation Client Partitions SAP Authorization Concept PLM Access Control Model (ACM) Attribute Based Access Control (ABAC) Custom Development Governance SAP GRC Access & Process Control Identity Management Manual Authorization Management Procedures
  • 17. Sustainable Authorization Management How many partner organizations will I collaborate with? How many programs or projects will I need to support? How many IP Licenses will I need to manage?
  • 18.
  • 19. Define Transaction or Function Groups
  • 20.
  • 21.
  • 22.
  • 23.
  • 24. Advanced Authorization Challenges Collaboration Security How do I share data and functions to enable global collaboration? How to I enable collaboration with external partners? How do I do more business around the world? How to I support systems 24/7 at the lowest cost? How do I limit access to data and functions for users in a specific region or LOB? How do I protect my company IP from leaking outside the company? How do ensure compliance with multiple global regulations? How do I control privileged IT users?
  • 25.
  • 26. Multi Line of Business
  • 27.
  • 28.
  • 30.
  • 32.
  • 35. Multi Level Supply ChainCustomer Design Partners
  • 36. Co-organized by NextLabs and SAP NextLabs Overview Policy-driven, information risk management software for Global 5000 enterprises. Help companies achieve safer and more secure internal and external collaboration Ensure proper access to applications and data Facts Locations HQ: San Mateo, CA New York, NY Hangzhou, PRC Malaysia 25+ Patent Portfolio Major go-to-market Partners: IBM, SAP, Microsoft “We allow companies to preserve confidentiality, prevent data loss and ensure compliance across more channels and more points with a single unified solution with unmatched user acceptance and total cost of ownership.” - Keng Lim, Chairman and CEO
  • 37. Thank You! Questions? Ruth Stephens: 650-356-4801, ruth.stephens@nextlabs.com