1️⃣ Objective
The objective of this capstone is to design and implement an **SAP Role-Based Security & Authorization Manager** that automates role analysis, detects Segregation of Duties (SoD) conflicts, simplifies role mining, manages access requests and approvals, and provides governance reports. The system will help organizations reduce access risk, streamline access provisioning, and maintain audit-ready compliance for SAP landscapes.
Key Goals:
✨ Automate extraction of user-role-authority data from SAP systems (S/4HANA / ECC).
✨ Perform role mining and clustering to propose optimized role definitions.
✨ Detect and visualize SoD conflicts using configurable rule sets.
✨ Provide an Access Request & Approval workflow integrated with SAP (PFCG, SU01) and an admin dashboard for remediation.
✨Enhance the recruitment workflow with faster and more intelligent decision-making.
✨Generate audit-ready reports and support periodic access reviews.
✨Provide simulation and impact analysis for role changes before production deployment.
2️⃣ Problem Statement
Enterprises running SAP often face complex role & authorization sprawl, leading to excessive privilege accumulation, SoD violations, and time-consuming compliance audits. Manual role design and reactive remediation create security gaps and increase operational cost.
This project addresses these problems by delivering a centralized tool to analyze, visualize, and manage SAP authorizations — enabling proactive risk reduction and faster, auditable access operations.
3️⃣ Methodology
The project will follow the following step-by-step approach:
✨ Step 1 — Data Extraction: Connect to SAP systems (RFC/OData or export) and extract user, role, profile, authorization and transaction data (tables like USR02, AGR_USERS, AGR_1251, AGR_1252, UST12).
✨ Step 2 — Data Normalization: Clean and normalize data — map transactions, authorization objects, and values. Enrich with business context (departments, cost centers).
✨ Step 3 — Role Mining & Optimization: Apply unsupervised learning (clustering, association rules) to propose consolidated roles and identify redundant roles/privileges.
✨ Step 4 — SoD Rule Engine: Implement a configurable rule engine to detect SoD conflicts (predefined and custom rules). Score risk per user/role.
✨ Step 5 — Access Request Workflow: Build a self-service access request portal with manager approvals & auditor visibility; integrate with SAP provisioning (PFCG / identity management) for automated assignment where safe.
✨ Step 6 — Simulation & Remediation: Provide impact simulation for role changes and suggested remediation (role modifications, user unassignments) with a ticketing integration for manual steps.
✨ Step 7 — Reporting & Audit: Generate audit-ready SoD reports, periodic certification packages, and dashboards for risk monitoring.
4️⃣ Dataset
Sources:
✨ SAP user & role tables (e.g., USR02, AGR_USERS)
✨ Role definition exports (AGR_1251, AGR_1252 — authorization objects and field values)
✨ Transaction usage logs (ST03N / system traces) and audit logs
✨ Organizational master data: business units, cost centers, position mapping
Data Fields:
| Attribute | Description |
|---|---|
| User ID | SAP user name (USR02) |
| Assigned Roles | Role IDs assigned to users (AGR_USERS) |
| Authorization Objects | Objects and field values inside roles (AGR_1251 / AGR_1252) |
| Transactions | Transaction codes (T-codes) used by users and roles |
| Last Used | Timestamp of last activity (for entitlement recertification) |
| Org Context | Department, cost center, location |
| SoD Rules | Predefined conflicting transaction pairs / object combinations |
5️⃣ Tools and Technologies
| Category | Tools / Libraries |
|---|---|
| SAP Integration | RFC / SAP NetWeaver Gateway (OData), SAP GUI extracts, SAP HANA SQL |
| SAP Security Utilities | PFCG (Role maintenance), SUIM (user & role reports), SAP GRC Access Control (if available) |
| Backend & Processing | Python (pandas), SQL (Postgres or HANA), Node.js (optional) |
| Analytics & ML | scikit-learn (clustering), NetworkX / Neo4j (relationship graphs), Pandas |
| Frontend | React / SAP UI5 (Fiori) for dashboards and access request portal |
| Database | PostgreSQL / SAP HANA (metadata & audit store) |
| Workflow & Ticketing | Camunda / BPMN engine or integration with ServiceNow / Jira |
| Deployment & Security | Docker, Kubernetes, TLS, Vault (secrets) |
6️⃣ Evaluation Metrics
✨ SoD Violation Count: Number of users with active SoD conflicts (before & after remediation).
✨ Risk Score Reduction: Aggregate risk score reduction after implementing recommendations.
✨ Role Redundancy Ratio: % reduction in duplicate/redundant roles post role-mining.
✨ Provisioning Time: Average time to fulfill access requests (manual vs automated).
✨ Recertification Coverage: % of user-role pairs reviewed during periodic certification.
✨ False Positive Rate: Fraction of flagged conflicts that are acceptable exceptions after business review.
✨ Audit Readiness: Time to assemble audit package & completeness score.
7️⃣ Deliverables
| Deliverable | Description |
|---|---|
| Data Extractors | Scripts/connectors to pull users, roles, authorizations, and transaction logs from SAP |
| Normalized Security Repository | Database storing cleaned user-role-authority mappings and metadata |
| Role Mining Module | Clustering/association code that proposes consolidated role definitions |
| SoD Rule Engine | Configurable rule engine to detect conflicts and compute risk scores |
| Access Request Portal | UI to request, approve, and provision access (with workflow integration) |
| Remediation & Simulation Tools | Impact simulator and remediation suggestion engine (automated/manual) |
| Admin Dashboard & Reports | Interactive dashboards for risk, SoD, certification & audit exports |
| Final Documentation | Design, deployment scripts, user guides, and audit evidence templates |
8️⃣ System Architecture Diagram
Phase 1: Role Design & Risk Analysis
Business process workshops define access needs. Roles are checked against SOD matrices (e.g., creating a Vendor & posting Invoice).
SAP GRC Access Control (AC)
Manages access request workflow, approval chains, and emergency access (Firefighter).
SAP Identity Management (IDM)
Automated user creation, provisioning, de-provisioning, and sync across connected target systems.
Central User Management (CUA/IDP)
Central authentication point, SSO enforcement, and single identity for all cloud/on-premise access.
SAP S/4HANA Core ERP
PFCG Role assignment and underlying authorization object checks (SU24, SU53).
Fiori Launchpad / UI Services
Catalogs and Groups assigned to Fiori Business Roles control tile visibility and application access.
Non-SAP Applications
Integration of IDM with Active Directory or LDAP for centralized access governance.
SAP GRC AC Risk Analysis & Reporting
Scheduled reporting of critical access risks, compliance status, and segregation of duties (SoD) violations.
Phase 1: Role Design & Risk Analysis
Business process workshops define access needs. Roles are checked against **SoD matrices** (e.g., creating a Vendor & posting Invoice).
SAP GRC Access Control (AC)
Manages access request workflow, approval chains, and emergency access (**Firefighter**).
SAP Identity Management (IDM)
Automated user creation, provisioning, de-provisioning, and sync across connected target systems.
Central User Management (CUA/IDP)
Central authentication point, **SSO enforcement**, and single identity for all cloud/on-premise access.
SAP S/4HANA Core ERP
**PFCG Role assignment** and underlying authorization object checks (SU24, SU53).
Fiori Launchpad / UI Services
Catalogs and Groups assigned to Fiori Business Roles control tile visibility and application access.
Non-SAP Applications
Integration of IDM with Active Directory or LDAP for centralized access governance.
SAP GRC AC Risk Analysis & Reporting
Scheduled reporting of critical access risks, compliance status, and segregation of duties (**SoD**) violations.
9️⃣ Expected Outcome
✨ Centralized view of user-role-authority relationships and real-time SoD violation detection.
✨ Proposed optimized role model with reduced redundancy and clearer separation of duties.
✨ Automated access request workflow with provisioning hooks and audit trails.
✨Quantifiable reduction in access risk and faster audit readiness (certifications & reports).
✨Simulation tools for safe role changes and a documented, deployable codebase with deployment scripts.