SAP Identity Access Governance (IAG) is a solution that helps organizations manage the access rights of their users across different SAP and non-SAP systems. IAG enables users to request, approve, certify, and monitor access rights in a centralized and compliant manner. One of the features of IAG is privileged access management (PAM), which allows users to request and grant temporary elevated access to sensitive systems or data for a specific purpose and duration.
What is a PAM request and why is it needed?
- The system or data that the user needs to access
- The reason or purpose for the access
- The duration or validity period of the access
- The approval workflow or the approvers who need to authorize the access
- To ensure that the access is granted only for a legitimate and justified purpose
Who can review the PAM request?
Allowed activity in PAM:
When a user is assigned with the PAM ID and logs into the target system, the user can run all the activities defined by the Business Role of the PAM ID, which are not limited to the activities manually added the “Allowed Activities” list.
Example:
PAM reviewer will see the below message when PAM user executes transaction which are not listed in allowed activity –
