Topic 1: Introduction to SAP Cloud Identity and Access Governance (IAG)
Topic 2: Discussing Business Challenges and Solutions
Topic 3: Different Use cases using IAG.
Topic 4: High level comparison with GRC Access Control
Topic 5: Architecture, Security, and Authorizations
Topic 6: Describing the System Architecture
Topic 7: IAG Positioning in SAP IAM landscape.
Topic 8: Describing Security and Authorizations
Topic 1: SAP BTP Overview
Topic 2: Subaccount Creation in BTP
Topic 3: Describing Security and Authorizations in BTP
Topic 4: IAG Subscription & Initial Setup
Topic 5: Subscription Request
Topic 6: Subscription Validation
Topic 7: New user Creation in BTP
Topic 8: Role Collections Assignment
Topic 1: SAP IAS Overview
Topic 2: Differentiation between IAS, IPS and IAG Setting up.
Topic 3: Trust Relationship between IAS and IAG
Topic 4: IAG Group Maintenance in IAS
Topic 5: Authentication in cloud systems using IAS or Corporate Identity Provider
Topic 6: SAP IPS Overview
Topic 7: Collaboration with SAP cloud IAG
Topic 1: Master Data Configuration in SAP IAG
Topic 2: Segregation of Tasks between Basis, IAG Application Team and SAP
Topic 3: Initial Master Data Setup for Business Process, Business Function groups Topic 4: (BFG) and other basic Information's
Topic 5: SAP IAG Repository & Job Analysis
Topic 6: Synchronizing Objects into the IAG Repository
Topic 7: Scheduling and Viewing Background Jobs
Topic 1: Master data setup for Access Risk Analysis
Topic 2: Risk Ruleset Upload by SAP
Topic 3: Risk Ruleset Validation/User Risk Analysis
Topic 4: Custom Risk Ruleset update
Topic 5: Mitigation Control Setup
Topic 6: Dashboard Analysis
Topic 7: Risk Score Policy
Topic 8: Access Refinement
Topic 9: Limitations with IAG and comparisons with SAP GRC AC
Topic 1: Master data setup for Role Designer
Topic 2: Repository Sync from Target Systems
Topic 3: Access Assignment to Role Owners
Topic 4: Access Maintenance in IAG
Topic 5: Business Role Creation in IAG
Topic 6: Candidate Business Role (CBR) overview
Topic 7: CBR Simulation and Creation process
Topic 8: Limitations with IAG Role Designer and comparisons with SAP GRC AC Role
Topic 1: Master data setup for Access Request
Topic 2: Business Rule for workflow upload by SAP
Topic 3: Workflow customization/configuration
Topic 4: Custom Field setup (Optional)
Topic 5: Access Assignment to different type of Owners
Topic 6: Access Request Creation and Approval Process
Topic 7: Audit Trail Analysis
Topic 8: Schedule Job and Analyze Job Log
Topic 9: Limitations with IAG and comparisons with SAP GRC AC Access Request Management
IAG Provisioning to S/4 HANA
IAG Provisioning to S/4 HANA
IAG Provisioning to SAC
IAG Provisioning to SAC
IAG Bridge
Topic 1: Privilege Access Management (PAM)
Topic 2: Describing Privilege Access Management in IAG
Topic 3: Configuring for Privilege Access
Topic 4: Monitoring Privilege Access
IAG Provisioning for PAM to S/4 HANA
Topic 1: Planning Periodic Review for User's Access
Topic 2: Access Certification Configuration
Topic 3: Starting Campaign for Access Certification
Topic 4: Monitoring Periodic Review
Topic 5: Privilege Access Management (PAM)
Topic 6: Describing Privilege Access Management in IAG
Topic 7: Configuring for Privilege Access
Topic 8: Monitoring Privilege Access