The global and independent platform for the SAP community.

The identity of the user is the linchpin

There is only one constant that remains the same regardless of the IT device used and the access location: the identity of the user. This makes it all the more important to verify this identity and to quickly and transparently control the accesses made in its name.
Jörg Meuser, Conet
December 5, 2019
It Security
avatar
This text has been automatically translated from German to English.

The flexibilization and acceleration in the use of IT services and information resources, for example with BYOD, mobile working and cloud services, poses new challenges for IT security.

If you don't want to stand in the way of modern working concepts, security can no longer be established by restricting hardware or controlling network paths alone.

Rather, there is only one constant that endures regardless of the IT device used and beyond the point of access, and that is the identity of the user.

With a conceptually and technically sound authentication, identity and access management system (IAM), the corresponding risks can be reliably assessed and minimized.

While basic user accounts, roles and corresponding authorizations are defined and managed in identity management, access management is used to control and manage individual access rights to specific parts of the physical or virtual infrastructure.

With fixed specifications for the precise division of responsibilities ("Segregation of Duties"), the sensible grouping of authorizations into roles and the tool-supported handling of personnel changes, as well as intelligent provisioning, holistic support of the entire identity management lifecycle becomes tangible.

The resulting transparency of all accesses is also an important building block for governance and compliance with legal requirements.

An increasingly important challenge in this context is the management of access rights for particularly authorized persons. This is because certain users sometimes require far-reaching authorizations for their work.

These "privileged users" pose a particular challenge to IT security because they can inadvertently, through criminal energy or because their access data falls into the wrong hands, put their organization's IT resources and data at risk.

When dealing with these "privileges", Privileged User Management solutions take care of managing the special access roles such as Administrator or Root Access.

The goal of all integrated approaches in identity, access and privileged user management must always be to balance high security standards with the most comprehensive possible automation in administration, convenience in use and thus high acceptance.

Because as soon as users perceive the secure access and usage paths as too complicated or do not have sufficient authorizations, they will adopt simplified ways of working that undermine existing security measures.

However, in order for access management to be able to fulfill its task as an access control system at all, the proper identification of the user must be ensured at the outset and a suitable mechanism selected for this purpose.

In particular, classic password-protected access is increasingly criticized here, because in order to be sufficiently secure, password specifications are becoming increasingly complex and are therefore often either stored insecurely or simply forgotten.

To alleviate this dilemma, advanced authentication mechanisms such as an Advanced Authentication Framework (AAF) or Multi-Factor Authentication (MFA) are increasingly being used, requiring multiple identity sources when granting access.

Ideally, this combines different aspects: something users know (a PIN), something physical they own (a key card or token), and something that proves their identity (a fingerprint, retina scan, or voice recognition).

Moreover, the central positioning of the platform often already achieves an implicit single sign-on, so that after the first secure authentication the user does not have to enter his password again when using further services.

avatar
Jörg Meuser, Conet

Jörg Meuser is Managing Consultant Identity & Security Management at Conet.


Write a comment

Working on the SAP basis is crucial for successful S/4 conversion. 

This gives the Competence Center strategic importance for existing SAP customers. Regardless of the S/4 Hana operating model, topics such as Automation, Monitoring, Security, Application Lifecycle Management and Data Management the basis for S/4 operations.

For the second time, E3 magazine is organizing a summit for the SAP community in Salzburg to provide comprehensive information on all aspects of S/4 Hana groundwork.

Venue

More information will follow shortly.

Event date

Wednesday, May 21, and
Thursday, May 22, 2025

Early Bird Ticket

Available until Friday, January 24, 2025
EUR 390 excl. VAT

Regular ticket

EUR 590 excl. VAT

Venue

Hotel Hilton Heidelberg
Kurfürstenanlage 1
D-69115 Heidelberg

Event date

Wednesday, March 5, and
Thursday, March 6, 2025

Tickets

Regular ticket
EUR 590 excl. VAT
Early Bird Ticket

Available until December 20, 2024

EUR 390 excl. VAT
The event is organized by the E3 magazine of the publishing house B4Bmedia.net AG. The presentations will be accompanied by an exhibition of selected SAP partners. The ticket price includes attendance at all presentations of the Steampunk and BTP Summit 2025, a visit to the exhibition area, participation in the evening event and catering during the official program. The lecture program and the list of exhibitors and sponsors (SAP partners) will be published on this website in due course.