Does anyone have any experience leveraging access via IAM to ERP tools and the permissions can be so granular that there would be an extreme amount of options in an IAM tool?

1.8k views1 Upvote5 Comments
Sort By:
Oldest
CIO in Educationa year ago
It’s crucial to establish a role-based access control (RBAC) model, assign permissions based on job responsibilities, and regularly review access to ensure appropriate privileges. Robust user provisioning and deprovisioning processes, segregation of duties, monitoring, and auditing mechanisms are essential. Educating users about data security and fostering a security-conscious culture is also important. Although challenging, effective IAM implementation in ERP systems ensures secure access while maintaining data integrity and compliance.
CEOa year ago
There are newer identity governance applications that are addressing these challenges effectively - notably Clarity Security. There are likely others that can help find SOD conflicts, orphaned accounts, weak authentication challenges, etc. 
Senior Director, Information Technology in Softwarea year ago
An IAM tool is an extension of the ERP tool's roles/permissions capability.   The ERP tool is where you define and assign granular permissions to specific roles and job responsibilities.   Keep in mind the amount of effort to maintain these granular permissions (and their assignments) if your organization has regular permissions change requests.
1
lock icon

Please join or sign in to view more content.

By joining the Peer Community, you'll get:

  • Peer Discussions and Polls
  • One-Minute Insights
  • Connect with like-minded individuals
Chief Information Security Officer in Healthcare and Biotecha year ago
It depends on the IAM and ERP if both the tool support open API or have rest API then it can be achieved easily 
Director, Information Technology & Finance Business Partner5 months ago
We use an IAM tool that provisions roles in a few hundred applications including the main ERP system. It detects SODs between systems or within other systems (outside of ERP).  

We only include the ERP (SAP) Security roles in the IAM tool and not the permissions. IAM feeds the request into SAP GRC to workflow. The ERP role permissions are tracked and validated for SODs between roles in the SAP GRC system.

Content you might like

Head of Enterprise Architecture MERCK Group in Healthcare and Biotecha year ago
Strategy & Architecture
Read More Comments
39k views5 Upvotes34 Comments

TCO19%

Pricing26%

Integrations21%

Alignment with Cloud Provider7%

Security10%

Alignment with Existing IT Skills4%

Product / Feature Set7%

Vendor Relationship / Reputation

Other (comment)

View Results
5.7k views3 Upvotes1 Comment
1.8k views2 Upvotes

Strongly agree4%

Agreee59%

Neutral23%

Disagree12%

Strongly disagree1%

View Results
3.8k views2 Upvotes3 Comments
Senior Director, Technology Solutions and Analytics in Telecommunication3 years ago
Palantir Foundry
3
Read More Comments
11.7k views13 Upvotes49 Comments