Integrating SAP SuccessFactors with IAS
Integrating SAP SuccessFactors with IAS
10 Additional Configurations for SAP SuccessFactors HCM suite with SAP Cloud Identity
Services. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73
10.1 Remapping an Identity Authentication Tenant. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73
10.2 Authenticating New Hires with Identity Authentication in SAP Cloud Identity Services. . . . . . . . . . . . . . . 76
10.3 Manage Real-Time Sync of New Hires from SAP SuccessFactors to Identity Authentication with
Identity Provisioning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .78
10.4 Configure Transformations in Identity Provisioning. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83
Setting Up SAP SuccessFactors with Identity Authentication and Identity Provisioning
Services
2 PUBLIC Content
Migrating Passwords from SAP SuccessFactors to Identity Authentication in SAP Cloud Identity
Services. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93
Remove Dummy Emails Transformation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96
Define SendMail Transformation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97
Define PasswordStatus Transformation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97
Define PreferredLanguage Transformation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98
Set Up Default Passwords Using Transformations. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99
Instance Migration with SSO Login for Corporate Users. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 102
Group Users Based on Login Method. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 105
Change the Redirect URL for Password Users in Identity Authentication Service. . . . . . . . . . . . . . . .107
10.5 SAP Cloud Identity Services - Identity Authentication Service Administration Console Tasks. . . . . . . . . 108
Adding Users to the SAP Cloud Identity Services - Identity Authentication Service. . . . . . . . . . . . . . 110
Creating User Groups in Identity Authentication (Video). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 112
Configure Password Based Logins (Video). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .113
Configure Two-Factor Authentication. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 113
Email Templates and Branding Themes. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .114
Process to Set Up Single Sign-On with Identity Authentication. . . . . . . . . . . . . . . . . . . . . . . . . . . . 114
Implementing Single Sign-On After Upgrading. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 117
10.6 Public API to Retrieve Customer SSO Service Provider Metadata. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 117
10.7 Public API to Retrieve New Customer SSO Certificate. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 119
10.8 Register Your Own Application to Communicate with SAP SuccessFactors HCM Suite with OpenID
Connect. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 120
10.9 SAP Cloud Identity Services - Identity Provisioning Service Administration Console Tasks. . . . . . . . . . . 126
Setting Up the Identity Provisioning Source and Target Systems. . . . . . . . . . . . . . . . . . . . . . . . . . . 128
Upgrade from ODATA Identity Provisioning Connector to SCIM Connector with SAP
SuccessFactors. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 130
Running and Scheduling Jobs (User Sync). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 146
10.10 Configure Single Sign-On in Admin Center. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 148
Manage SAML SSO Settings in SAP SuccessFactors. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 148
Opening the Identity Authentication Administration Console in SAP Cloud Identity Services. . . . . . . 152
Single Sign-On without SAP Cloud Identity Services - Identity Authentication. . . . . . . . . . . . . . . . . .157
Determine if you have to set up your SAP SuccessFactors system to use Identity Authentication in SAP Cloud
Identity Services.
There are two scenarios that require you to set up SAP SuccessFactors with the Identity Authentication service:
Before you set up your SAP SuccessFactors system to use the Identity Authentication service, you should be aware
of the following notes.
• Data centers in different regions. The Identity Authentication service has data centers in various global
regions but they are not a one-for-one match with SAP SuccessFactors data centers. During authentication,
some personal information is passed between SAP SuccessFactors and the service.
When an Identity Authentication tenant is assigned to you, you’re provided by email with details about your
system, including the region of both your SAP SuccessFactors and Identity Authentication tenants.
If you have any data protection and privacy concerns about the region your tenant is in, contact us to request a
tenant in the appropriate region.
• SAP NS2 support. Eligible SAP SuccessFactors customers using SAP NS2 can migrate to the Identity
Authentication service, however, the migration would be a manual process. Please contact SAP support to
start this migration.
• Changes to Company ID. As with all integrations, the connection to the Identity Authentication service is
impacted by a change in Company ID. If you ever need to change the Company ID of your SAP SuccessFactors
system, you need to update the configurations in the Identity Authentication service accordingly. For more
information, see the note: 2087436 .
• Data Protection and Privacy.
If you use the Identity Authentication service, be sure to review the latest documentation to ensure that it
meets your data protection and privacy requirements. For more information, see here.
• Global Assignment and Concurrent Employment (GA/CE) are supported for upgrade to the Identity
Authentication service.
• Integrated External Learners and Onboarding 2.0 are supported for upgrade to the Identity Authentication
service.
• Restriction
After you've upgraded to the Identity Authentication service, you won’t have the ability to turn on partial
SSO in SAP SuccessFactors company Provisioning. By default, partial SSO is disabled after activating
Identity Authentication. If needed, you can set up partial SSO in Identity Authentication.
After you've upgraded to the Identity Authentication service, you won’t have the ability to enable multiple
SAML asserting parties in SAP SuccessFactors company provisioning. By default, Identity Authentication
will be enabled as the single SAML asserting party in the SAP SuccessFactors provisioning setting after
activating Identity Authentication. If you need multiple asserting parties, you can accomplish this by setting
up conditional authentication.
Remember
As a customer, you don't have access to Provisioning. To complete tasks in Provisioning, contact your
implementation partner or Account Executive. For any non-implementation tasks, contact Technical
Support.
Related Information
Activating an Account and Setting New Password After Identity Authentication Service Is Enabled
All SAP SuccessFactors systems can use the Identity Authentication service. We are requesting for all systems to
be migrated to the service by June 2, 2025.
Caution
For customers still using 3rd Party IDP or Basic Authentication (Username and Password):
• The SSO signing certificate used by both Identity Authentication and 3rd party IDPs for authentication is
set to expire on June 2, 2025. In addition, Google is phasing out support for third-party cookies in Chrome
browsers in the second half of 2024.
• Upon the expiration of this SSO certificate, if it is not updated, SSO authentication via IDP will not work,
preventing users from access to your SAP SuccessFactors applications.
• Customers still using basic authentication will also not be able to adopt the latest security and compliance
requirements for cloud applications upon deprecation of 3rd party browser cookie support.
• We strongly recommend that you migrate to Identity Authentication to avoid disruptions and for the best
integration experience with SAP SuccessFactors.
Note
• For customers/tenants using Identity Authentication (either as a real IDP or proxy IDP to a 3rd party
coporate IDP, Identity Authentication will take care of their certificate update automatically.
• If Identity Authentication is the real IDP for SuccessFactors, then SAP will handle the upgrade necessary
to minimize the impact of 3rd party coookie deprecation. If Identity Authentication is proxy to a corporate
IDP such as Microsoft Azure AD, Okta, Google, etc, SAP will provide automation to assist the upgrade
necessary to minimize the impact of third party cookie deprecation. There could be further configuration
needed.
• When your SAP SuccessFactors is connected to the Identity Authentication service, it handles all logins
(including password, two-factor authentication, risk-based authentication or corporate identity provider)
for your SAP SuccessFactors system.
• Identity Authentication allows HCM suite customers to complete a major Identity Authentication pre-
requisite for some of the most important innovations of SAP SuccessFactors solutions i.e. Stories in People
Analytics, Work Zone, Task Center, Internal Career Site, etc.
• Faster innovation and better product quality/support with one unified authentication services to develop,
maintain and innovate.
• Better incorporation of new technologies and innovations in the security/authentication domain.
• Streamlined user management across the enterprise and better user self-services.
Learn how to handle different migration scenarios for SSO users authenticating with a corporate IDP (without
Identity Authentication), partial SSO users, and Onboarding users undergoing a status change (e.g., new hires to
alumni transitions).
When migrating to Identity Authentication, understanding the different migration behaviors for each customer
group helps ensure a smooth transition. The following approaches outline best practices for managing each
migration scenario.
Caution
Direct integration with SAP SuccessFactors through the corporate IDP will be deprecated in
November 2026, so users should plan to transition to using Identity Authentication as the proxy
IDP before this date.
• No need to include these users in the Identity Provisioning sync job unless they require access to
features such as SAP Analytics Cloud or People Stories in Analytics. For these features, Identity
Authentication must first be activated, and the relevant IPS sync job must be run to sync the users'
data to Identity Authentication.
2. Partial SSO Users Using SAP SuccessFactors Username and Password Authentication
• Current Setup: These users log into SAP SuccessFactors directly with their username and password, which
means they are still using basic authentication.
• Migration Scenario:
• These users must migrate to Identity Authentication before the deprecation of basic authentication. Once
synced using Identity Provisioning, the Identity Authentication service will manage their authentication.
• Define conditional authentication rules in Identity Authentication:
• Full SSO users (those who authenticate through the corporate IDP) will continue to be routed to the
corporate IDP for authentication.
• Partial SSO users (who still use SAP SuccessFactors username and password) will authenticate via the
Identity Authentication login screen, rather than using basic authentication.
Remember
Partial SSO will be disabled in November 2026 to ensure all authentication requests go
through Identity Authentication for consistency. After the deprecation, users still relying on basic
Setting Up SAP SuccessFactors with Identity Authentication and Identity Provisioning
Services
Handling Customer Migration Scenarios in Identity Authentication PUBLIC 9
authentication must authenticate using this service, and they will no longer be able use SAP
SuccessFactors directly for login.
3. Users in Onboarding Undergoing a Status Change (e.g., Employees, New Hires, Alumni)
• Scenario: Users may undergo a status change, such as transitioning from an employee to an alumni.
• Migration Behavior:
• New Hires: Onboarding customers can enable Identity Authentication for new hires by integrating with the
SCIM API and completing the upgrade from the OData V2 API if their migration to Identity Authentication
was prior to December 9, 2022. Once configured, both employees and new hires are authenticated using
Identity Authentication. For more details and prerequisites, refer to the Authenticating New Hires with
Identity Authentication in SAP Cloud Identity Services in the Related Information section.
• Existing Employees: For current employees, upgrade to/enable Identity Authentication. If your system is
still utilizing the OData V2 API, upgrading to the SCIM API is required to ensure consistent authentication
processes across all user types. This upgrade facilitates seamless synchronization and authentication via
Identity Authentication. For more information, refer to Initiating the Upgrade to Identity Authentication and
Upgrade from ODATA Identity Provisioning Connector to SCIM Connector with SAP SuccessFactors
HCM Suite in the Related Information section.
• Alumni: Once you've completed the steps in Enabling Alumni Access, you can initiate or schedule a
delta sync job in Identity Provisioning to update the former employee’s status to Alumni in Identity
Authentication. This will initiate an activation email that the alumni user can use to authenticate back
into SAP SuccessFactors with Identity Authentication so they can access important company materials
after leaving the organization. Refer to Configuring the Alumni Activation Email Template in Identity
Authentication.
Related Information
Authenticating New Hires with Identity Authentication in SAP Cloud Identity Services [page 76]
Upgrade from ODATA Identity Provisioning Connector to SCIM Connector with SAP SuccessFactors [page 130]
Initiating the Upgrade to Identity Authentication in SAP Cloud Identity Services [page 38]
Here are some of the important benefits of setting up your SAP SuccessFactors system to use the Identity
Authentication service.
• Connection to other SAP solutions. Using the Identity Authentication service as an identity provider is the
first step to enabling future integrations with other SAP solutions.
• More login options. The Identity Authentication service supports username and password login and SAML
2.0 SSO login, just like SAP SuccessFactors does now. It also supports two-factor/token authentication, Social
Sign On, SPNEGO, and some Corporate User Stores.
• More security. The Identity Authentication service supports SHA-256.
• Better user experience. The Identity Authentication service provides a better logon experience than the
current SAP SuccessFactors Partial SSO option.
• No password-specific URL required for first-time login.
• If user clears cookies, they need to enter email or username again.
• Conditional Authentication. You can set up the Identity Authentication service to direct users to either a
corporate identity provider or a password login option, based on conditional rules. You can use this feature to
replace the current SAP SuccessFactors Partial SSO and Multiple Asserting Party Selection features.
• Risk-Based Authentication. You can set up the Identity Authentication service to require different login
methods, such as password, two-factor authentication, or Social Sign On, based on risk-based rules.
• Stand-alone Identity Provider. As the Identity Authentication service is enhanced, you can use new features.
• Self-service. You can access common SSO settings from SAP SuccessFactors Admin Center and all other
configuration options directly in administration console of your Identity Authentication tenant.
• SuccessFactors customers get Identity Authentication as part of their license, and this enterprise-grade
Identity Access Management feature is included free of charge.
Single Sign-On (SSO) is a property of access control of multiple related, but independent software systems. With
this property, a user logs in once and gains access to all systems without being prompted to log in to each of them.
Single Sign-on allows users to access your SuccessFactors instance without entering their username and password
each time. Instead of manually logging in to the SAP SuccessFactors application, users are authenticated by your
Identity Provider (IdP) and then logged into SAP SuccessFactors automatically.
Single Sign-On can be enabled for all users of your system or for a partial subset of users (called "Partial SSO").
Most customers use the SAML 2.0 protocol to set up Single Sign-On for their instance, but we support a number of
other SSO options as well.
SAML 2.0
Security Assertion Markup Language (SAML) is an XML-based, open-standard SSO protocol for exchanging
authentication and authorization data between an identity provider (IdP) and a service provider (SP).
Remember
SAML 2.0 is the recommended method of configuring Single Sign-On for SAP SuccessFactors.
SAML 2.0 is the recommended method of configuring Single Sign-On for SAP SuccessFactors.
SSO generally takes place between two parties, the identity provider (IdP) and the service provider (SP). The
identity provider has information required to authenticate the users and generate SSO logins. The service provider
offers a service that is accessible using with SSO.
The SP must be able to accept IdP-generated SSO logins and identify the user who wants to log in. In this case, SAP
SuccessFactors is the service provider, or SP. You can use your own IdP to authenticate users and log them into
SuccessFactors.
The SAML2 specification provides a general framework to ensure SAML identity providers (IdP) and service
providers (SP) work together properly. Within that framework, service providers offer features that best support
their application and their customers. SAP SuccessFactors offers the following:
You can connect using either or both. The default setup is for IdP-initiated and this must be completed for all SSO
customers. Additional settings need to be configured to allow the optional SP-initiated logins.
The SP-initiated login option is designed to allow users to deep link to some place other than the default
landing page after an SSO login. For example, the SAP SuccessFactors application typically sends users to our
home page. With deep linking, they can land on their performance review or a course in SAP SuccessFactors
Learning or countless other locations within the application. When a user is not logged in and tries to access
SAP SuccessFactors, we send an SAML request to your identity provider URL. The response contains the login
information and landing page details in an additional value called RelayState.
If you do not support SP-initiated SAML2, we offer a generic deep link feature. This accomplishes the same result
(deep linking) as SP logins, but uses cookies. When a user is not logged in and tries to accessSAP SuccessFactors,
we send their browser to the IdP-initializing URL that you provided. This is typically the same URL that users use
to log in directly from their internal systems. The user goes through the IDP-initiated login process. After they are
logged in, we read a cookie that was stored with their initial destination, and place them there instead of on the
home page.
If you have both deep linking and SP-initiated logins enabled from a single IdP, we use SP-initiated rather than deep
linking.
Dynamic deep linking should work with all links sent out by the application itself. These include things sent in
system emails, course links generated by SAP SuccessFactors Learning administrators, exported JAM links, and so
on. We do not recommend copying the URLs directly from the browser and using them for bookmarks. There is no
guarantee that a URL in the browser will create a valid link, or that a link will be valid in the future.
If you use IdP-initiated logins, you can provide us with a RelayState value to send users somewhere other than the
home page. We provide a list of supported RelayState values if you plan to use this option.
Setting Up SAP SuccessFactors with Identity Authentication and Identity Provisioning
Services
Single Sign-On for SAP SuccessFactors PUBLIC 15
SP-Initiated Single Logout
You may want to perform some action in your home system when a user logs out of SAP SuccessFactors. If you
provide us with the destination URL, we can send a logout request when a user ends a SAP SuccessFactors session.
If you have multiple identity providers, we can set up asserting parties for each one. This includes separate values
for SAML issuer, signing certificate, and other settings. If one or more of the asserting parties is set to use
SP-initiated logins, one of them can be set to be the default asserting party.
If you have multiple asserting parties and use deep linking, we need to identify to which IdP to send users for
login information. If you have a default asserting party, we send them to that IdP. If not, we display a list of the
available asserting parties and ask the user to select the appropriate one. Your administrator can configure the text
identifying each available asserting party. After a user has logged on using a specific asserting party, we store a
cookie in their browser. As long as they use the same browser and don’t clear their cookies, they don't need to
select the asserting party again.
SSO Redirects
By default, the SAP SuccessFactors application shows users the login page when they log out, time out, or when
certain login issues occur, unless custom redirect pages are configured. You can host your own pages for these use
cases. If you provide us with the URL for each page, we configure our SSO system to send the users there instead of
the home page. We can redirect for the following use cases:
Logout When the user logs out, we send them to the customer-hosted page.
Timeout After a 30-minute inactivity timeout, we send the user to this page.
Note
For Identity Authentication and Identity Provisioning timeout information, refer to the Re-
lated Information section.
Invalid login If the SSO login fails, the application redirects users to a static invalid login page by default.
If a customer-hosted page is configured for this use case, the system redirects to that page
instead.
Invalid Login Path by External The SAP SuccessFactors HCM suite application requires a valid login path. If the user's login
Users path is inconsistent with the login method, we send the user to this page.
Missing credentials If the SAP SuccessFactors application receives an SSO login with no user information, we send
the user to this page.
Deep link Your IdP login link goes here if you plan to deep link, but are not using SP-initiated SAML.
You can allow some users to use SSO while others log in with passwords. No single user can have access to both
methods at the same time. We can provide a document detailing the steps to set up partial SSO.
SAML SSO users do not have access to the password management system and are never forced to change their
passwords. Passwords are not used as part of the SAML login process.
Users logging in with passwords are subject to all the password management rules and features that you have
enabled.
Related Information
The SAP SuccessFactors service provider is configured to accept a wide variety of SAML responses and assertions.
However, your IdP must adhere to the following rules:
All communication with the SAP SuccessFactors application must use HTTPS in the browser. SAML responses sent
to SAP SuccessFactors must use POST. URLs sent to deep link into the application and SAML requests do not need
to be POSTed.
User Identifier
SAP SuccessFactors accepts two values to identify the user logging in using SAML2. The most common is NameID.
We also support the UserName attribute. Whichever method is used, the value is compared with the UserName in
the SAP SuccessFactors application. If that user does not exist or does not have permission to log in, the user is
unable to access the application.
The system checks for the UserName attribute first. In the assertion, the SAP SuccessFactors application expects
something similar to the following:
Sample Code
<saml:AttributeStatement xmlns:saml="urn:oasis:names:tc:SAML:2.0:assertion"
Setting Up SAP SuccessFactors with Identity Authentication and Identity Provisioning
Services
Single Sign-On for SAP SuccessFactors PUBLIC 17
xmlns:xs="[Link]
<saml:Attribute Name="username"
NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"
xmlns:saml="urn:oasis:names:tc:SAML:2.0:assertion">
<saml:AttributeValue xmlns:xsi="[Link]
xsi:type="xs:string"> lhadley</saml:AttributeValue>
</saml:Attribute>
</saml:AttributeStatement>
If the UserName attribute is not found, the SAP SuccessFactors application looks for the NameID value. In the
assertion, theSAP SuccessFactors application expects something like the following:
Sample Code
<Subject><NameID Format="urn:oasis:names:tc:SAML:1.1:nameid-
format:unspecified">lhadley</NameID><SubjectConfirmation
Method="urn:oasis:names:tc:SAML:2.0:cm:bearer"><SubjectConfirmationData
InResponseTo="_f6e21384-e33b-4a5f-a532-e58ce3f0a5e2"
NotOnOrAfter="2014-10-21T[Link].599Z" Recipient="https://
[Link]/saml2/SAMLAssertionConsumer?
company=TestCompany"/></SubjectConfirmation></Subject>
Notice that in addition to NameID, there is nameid-format: unspecified. SAP SuccessFactors expects a nameid-
format. Typically, you send the value unspecified. SAP SuccessFactors accepts other common values like
persistent or transient. However, there is no support for these other options. Irrespective of the nameid-format
sent, SAP SuccessFactors simply compares the NameID from the login to the username in the application. The only
exception is the UserName attribute that is sent. In that case, the NameID is ignored entirely.
SAP SuccessFactors expects the SAML logins to be signed by your certificate. The signature can be on the
response, assertion, or both. To verify the signature, you need to provide SAP SuccessFactors with your X509
signing certificate. SAP SuccessFactors accepts both CA and self-signed certificates.
SAP SuccessFactors provides an X.509 certificate for you to encrypt assertion elements if desired. The same
certificate is used to sign SP-initiated logout requests.
If you use SP-initiated logins, we provide the X.509 certificate used to sign the SAML login requests.
IP Address Restrictions
SAP SuccessFactors allows you to restrict logins to specific IP addresses or ranges. This feature does not require
SSO. However, it applies to SSO logins if SSO is enabled.
In order to set up SAML2 between SAP SuccessFactors and your applications/identity provider (IdP), the below
sections list the information that would need to be exchanged. SAP SuccessFactors can provide and receive
Setting Up SAP SuccessFactors with Identity Authentication and Identity Provisioning
Services
18 PUBLIC Single Sign-On for SAP SuccessFactors
metadata files. SAP SuccessFactors does not provide an automated exchange of metadata files. To obtain an SAP
SuccessFactors metadata file, refer to Public API to Retrieve Customer SSO Service Provider Metadata in the
Related Information section.
The SAP SuccessFactors entity ID is unique for each SAP SuccessFactors customer instance.
You provide:
• If you are using IdP-initiated logout, SAP SuccessFactors needs your global logout service URL
• If you are enabling IP address restrictions, SAP SuccessFactors needs the list of IPs
• If you are using the SAP SuccessFactors redirect pages (highly recommended), SAP SuccessFactors needs the
URL for each
SAML2 requires you to send and SAP SuccessFactors to respect NotBefore and NotAfter values that define when
a login is valid. These values are always sent in GMT/UTC. SAP SuccessFactors syncs server time to public time
servers on a regular basis. You are expected to do the same. However, there still may be slight variances in the
clocks. SAP SuccessFactors asks you to allow a small window of NotBefore time to prevent login failures if server
time gets slightly out of sync.
RelayState
If you use IdP-initiated logins, you can specify a RelayState value to deep link your users to a specific page in the
application. RelayState is optional. RelayState must be a relative URL, for example /sf/admin, not an absolute
URL. You can see a list of examples that can be used as valid RelayState values on List of SAP SuccessFactors Deep
Links under the Deep Link column.
Public API to Retrieve Customer SSO Service Provider Metadata [page 117]
SAP SuccessFactors accepts a wide variety of formats and values in the SAML2 response. The following is a typical
example. Your provided responses may differ.
Sample Code
<samlp:Response ID="gf8b65pFRW3JOvrV9z8_fjCJJtO"
IssueInstant="2009-02-09T[Link].484Z" Version="2.0"
xmlns:ds="[Link]
xmlns:saml="urn:oasis:names:tc:SAML:2.0:assertion"
xmlns:samlp="urn:oasis:names:tc:SAML:2.0:protocol">
<saml:Issuer xmlns:saml="urn:oasis:names:tc:SAML:2.0:assertion">
[Link]</saml:Issuer>
<ds:Signature xmlns:ds="[Link]
<ds:SignedInfo>
<ds:CanonicalizationMethod Algorithm="[Link]
exc-c14n#" />
<ds:SignatureMethod Algorithm="[Link]
sha1" />
<ds:Reference URI="#gf8b65pFRW3JOvrV9z8_fjCJJtO">
<ds:Transforms>
<ds:Transform
Algorithm="[Link]
signature" />
<ds:Transform Algorithm="[Link]
c14n#">
<ec:InclusiveNamespaces PrefixList="ds saml samlp xs xsi"
xmlns:ec="[Link] />
</ds:Transform>
</ds:Transforms>
<ds:DigestMethod Algorithm="[Link]
xmldsig#sha1" />
<ds:DigestValue>8crrNj4pAptpLQKlAzbsS37tfOI=
</ds:DigestValue>
</ds:Reference>
</ds:SignedInfo>
<ds:SignatureValue>
bdmIryj5+K9tGsK7sO89j0UwBNQDRee8XpF/
aDY61ERrazaIC1NFwfXN6ETdz61gU5EKY5tJkaHR
YjYTTr8NG1JwSj8JCGePoabuh3KbjgNuE21nQ8JY0TcttPZGMysD4NOzkLIGOTKARp2BUVx7COJC
egN9yX+SNphxlWD2vMQ=</ds:SignatureValue>
</ds:Signature>
<samlp:Status xmlns:samlp="urn:oasis:names:tc:SAML:2.0:protocol">
<samlp:StatusCode Value="urn:oasis:names:tc:SAML:2.0:status:Success"
xmlns:samlp="urn:oasis:names:tc:SAML:2.0:protocol" />
</samlp:Status>
<saml:Assertion ID="xv5BP-.Sl_aNbpsNwMX259HTgxL"
IssueInstant="2009-02-09T[Link].500Z" Version="2.0"
xmlns:ds="[Link]
xmlns:saml="urn:oasis:names:tc:SAML:2.0:assertion">
<saml:Issuer
xmlns:saml="urn:oasis:names:tc:SAML:2.0:assertion">[Link]
</saml:Issuer>
Setting Up SAP SuccessFactors with Identity Authentication and Identity Provisioning
Services
20 PUBLIC Single Sign-On for SAP SuccessFactors
<saml:Subject xmlns:saml="urn:oasis:names:tc:SAML:2.0:assertion">
<saml:NameID Format="urn:oasis:names:tc:SAML:1.1:nameid-
format:unspecified"
xmlns:saml="urn:oasis:names:tc:SAML:2.0:assertion"> lhadley</
saml:NameID>
<saml:SubjectConfirmation
Method="urn:oasis:names:tc:SAML:2.0:cm:bearer"
xmlns:saml="urn:oasis:names:tc:SAML:2.0:assertion">
<saml:SubjectConfirmationData
InResponseTo="_F499B815F2BA7AB15F1207741929643"
NotOnOrAfter="2010-04-09T[Link].515Z"
Recipient=" [Link] /
saml2/SAMLAssertionConsumer" />
</saml:SubjectConfirmation>
</saml:Subject>
<saml:Conditions NotBefore="2009-02-09T[Link].500Z"
NotOnOrAfter="2009-12-09T[Link].500Z"
xmlns:saml="urn:oasis:names:tc:SAML:2.0:assertion">
<saml:AudienceRestriction
xmlns:saml="urn:oasis:names:tc:SAML:2.0:assertion">
<saml:Audience>[Link]
</saml:Audience>
</saml:AudienceRestriction>
</saml:Conditions>
<saml:AuthnStatement AuthnInstant="2009-02-09T[Link].500Z"
SessionIndex="xv5BP-.Sl_aNbpsNwMX259HTgxL"
xmlns:saml="urn:oasis:names:tc:SAML:2.0:assertion">
<saml:AuthnContext
xmlns:saml="urn:oasis:names:tc:SAML:2.0:assertion">
<saml:AuthnContextClassRef>
urn:oasis:names:tc:SAML:2.[Link]lasses:Password
</saml:AuthnContextClassRef>
</saml:AuthnContext>
</saml:AuthnStatement>
<saml:AttributeStatement
xmlns:saml="urn:oasis:names:tc:SAML:2.0:assertion"
xmlns:xs="[Link]
<saml:Attribute Name="password"
NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"
xmlns:saml="urn:oasis:names:tc:SAML:2.0:assertion">
<saml:AttributeValue xmlns:xsi="[Link]
instance"
xsi:type="xs:string"> lhadley</saml:AttributeValue>
</saml:Attribute>
</saml:AttributeStatement>
</saml:Assertion>
</samlp:Response>
Learn how to use the new Single Sign-On (SSO) configuration checks in the Check Tool for SAP SuccessFactors.
These checks assist with diagnosing, resolving, and ensuring the proper configuration and compliance of SSO
settings.
Prerequisites
Context
The new SSO configuration checks within the Check Tool help administrators identify their current authentication
setup by determining whether tenants are using basic authentication, directly integrating with a corporate Identity
Provider (IdP), or already utilizing Identity Authentication in SAP Cloud Identity Services.
These checks also validate that tenant SSO settings align with SAP SuccessFactors security and compliance
requirements, offering assurance that configurations meet recommended standards. Where adjustments are
necessary, the Check Tool provides guidance on migrating to Identity Authentication, enabling organizations to
stay ahead of security requirements and transition smoothly to SAP SuccessFactors preferred authentication
protocols.
Procedure
The Check Tool page opens displaying the results of the first tab System Health.
2. Under the Authentication / Single Sign-On (SSO) section, select the particular checks that you want to run.
You can also enter this section name in the search bar so that it gets displayed in the results table.
3. Choose Run Checks from the top right of the results table.
Setting Up SAP SuccessFactors with Identity Authentication and Identity Provisioning
Services
22 PUBLIC Performing Single Sign-On Configuration Checks in SAP SuccessFactors
Note
If the check you selected requires one or more prechecks (checks that need to be run successfully first),
the prechecks are run first even if you haven't selected them.
After you run checks in the check tool, it returns the results of the checks so that you can resolve the issues found.
The results of a check are displayed in the Result column. If you run the checks multiple times to see how you’re
resolving issues, you can select a previous result from the History dropdown list.
Note
To display the History dropdown list, select a check. On the details screen that opens on the right side of the
page, expand the header. The History dropdown list is directly below the check title.
Result Action
No issues found If the tool can’t find issues, you see a green check mark in the Result column.
Issues found If the tool finds issues, it reports the number of issues and a yellow warning icon or a red alarm
icon.
• The yellow icon indicates a low severity issue. The system proposes a solution.
• The red icon indicates a high severity issue. You must take action, which could include
creating a support ticket.
Pending migrations If the tool finds pending migrations that need to be completed by the user, you can see a yellow
warning icon or a red alarm icon in the Status column on the Migration tab.
Completed If the tool finds no issues with migration, or the migration has already been completed, you see a
green check mark in the Status column on the Migration tab.
Note
• Select the Export Results button to download the check results. Ensure you run the check before exporting
the check results. If not you can view only the first 100 check results.
• The downloaded check result table can display a maximum number of 10,000 rows.
When the check tool reports a serious issue that you can't solve, you might need to contact Technical Support. You
can create a support ticket from within the check tool.
Prerequisites
You've run the check tool. You can find the check tool by going to Admin Center Check Tool . You create the
ticket from the details page of the tool.
Procedure
The detail view opens to the right side of the screen with more information on the check and on how to solve
the issue.
2. On the Result tab, scroll down to the results table to look for the errors you want to report on.
You usually contact Technical Support for high severity issues not low severity issues.
3. On the Check Information tab, under Need Assistance?, copy the component ID.
Confirm whether Identity Authentication is already enabled for your SAP SuccessFactors tenant.
Context
Depending on when you've enabled Identity Authentication, you may already have received the new enhancements
that come with this upgrade. These enhancemntes include X.509 certificate-based authentication in conjunction
with the System for Cross-domain Identity Management (SCIM) API, which are the latest methods of
authentication and integration with Identity Authentication and Identity Provisioning. These features are enabled
automatically for upgrades to Identity Authentication that occur from December 9, 2022 onwards.
Complete the steps below to confirm if and when you've enabled this feature.
Procedure
4. In the Last Modified Date column next to the status, confirm whether the date is before or after December 9,
2022.
Note
Customers who enabled Identity Authentication as of November 29, 2024 or later will already have a
hybrid SAML/OpenID Connect application configured for their SAP SuccessFactors tenant. This hybrid
application supports both SAML and OpenID Connect authentication flows. If you need to register or
Setting Up SAP SuccessFactors with Identity Authentication and Identity Provisioning
Services
Checking to See if You Aready Have Identity Authentication Enabled PUBLIC 25
manage your OpenID Connect client application, please refer to Register Your Own Application to
Communicate with SAP SuccessFactors HCM Suite in the Related Information section.
Next Steps
If you've enabled Identity Authentication from December 9, 2022 or later, go to Getting Started with Identity
Authentication Already Enabled in the Related Information section for next steps.
If you've enabled Identity Authentication before December 9, 2022, or have not enabled it at all, go to Existing
Customers (Before December 9, 2022) Start Here.
Related Information
If you've already enabled Identity Authentication from December 9, 2022 onwards, you've already been set up
with X.509 certificate-based authentication, the Workforce SCIM API, as well as the the option to authenticate
both your Employees and New Hires with Identity Authentication because of the SCIM integration provided
(refer to Authenticating New Hires with Identity Authentication in SAP Cloud Identity Services in the Related
Information section).
Context
Note
For a list of commonly asked questions in 2H 2022 regarding the SAP SuccessFactors HCM suite to Identity
Authentication/Identity Provisioning integration, refer to our Frequently Asked Questions page.
Having your Identity Authentication tenant already enabled means that you don't need to complete the steps
to initiate the upgrade to Identity Authentication and have it activated. You should have already received your
welcome email called Access Information for your SAP SuccessFactors HCM suite, as well as an activation email
from the Identity Authentication service. Complete the below steps to login for the first time and access the Identity
Authentication and Identity Provisioning administration consoles.
Setting Up SAP SuccessFactors with Identity Authentication and Identity Provisioning
Services
26 PUBLIC Checking to See if You Aready Have Identity Authentication Enabled
Procedure
1. Follow the steps in the activation email sent to you from the Identity Authentication service.
2. Click on the SAP SuccessFactors HCM suite URL in the welcome email called Access Information for your
SAP SuccessFactors HCM suite.
3. On the login screen, enter the Identity Authentication username provided in the welcome email.
4. Enter the password you set up per the instructions in the Identity Authentication activation email..
You will then be redirected to the SAP SuccessFactors HCM suite homepage.
5. Next, you can click on either the Identity Authentication or Identity Provisioning URLs in the Access
Information for your SAP SuccessFactors HCM suite welcome email to access these administration consoles
and review their default configurations.
Note
To perform further configurations to each console as needed, refer to Identity Authentication Service
Administration Console Tasks and Identity Provisioning Service Administration Console Tasks in the
Related Information section.
Note
If you are a SAP SuccessFactors HCM suite user for an already existing Identity Authentication tenant
and you have no administrative privileges, follow the instructions in the Advanced Identity & Access
Management section of your welcome email to contact your Identity Authentication administrator to have
you added as a user in the administration console or perform further configurations as needed.
Related Information
SAP Cloud Identity Services - Identity Authentication Service Administration Console Tasks [page 108]
SAP Cloud Identity Services - Identity Provisioning Service Administration Console Tasks [page 126]
Authenticating New Hires with Identity Authentication in SAP Cloud Identity Services [page 76]
If you're an existing customer, depending on if and when you've completed the upgrade to Identity Authentication,
there are a few upgrades you'll need to make based on your scenario (to confirm whether you've upgraded
already and when, refer to Checking to See if You Already Have Identity Authentication Enabled in the Related
Information section).
If you haven't yet upgraded to the Identity Authentication service, refer to Initiating the Upgrade to Identity
Authentication in SAP Cloud Identity Services in the Related Information section to complete this upgrade.
If you've already completed this upgrade before December 9, 2022, it is possible that your Identity Authentication
tenant is still using the OData API for use with the Identity Provisioning service, and that you are using Basic
Authentication as your authentication method.
It is highly recommended that you upgrade from this API to the new SCIM API for use with Identity Provisioning,
along with upgrading from basic authentication to mutual Transport Layer Security (mTLS) (certificate-based
authentication) as this provides better security, better management of user data, and a more simplified experience
with your Identity Authentication service. To make both of these upgrades, complete the steps in Upgrade from
OData Identity Provisioning Connector to SCIM Connector with SAP SuccessFactors HCM suite in the Related
Information section.
If you're already using the SCIM API, but have never upgraded to mTLS, then perform this upgrade by following the
steps in Upgrade to X.509 Certificate-based Authentication for Incoming Calls to SAP SuccessFactors HCM
suite.
Related Information
Overview of the SAP SuccessFactors and Identity Authentication Service Integration (Video) [page 29]
Initiating the Upgrade to Identity Authentication in SAP Cloud Identity Services [page 38]
Upgrade from ODATA Identity Provisioning Connector to SCIM Connector with SAP SuccessFactors [page 130]
Upgrade to X.509 Certificate-Based Authentication for Incoming Calls [page 33]
Checking to See if You Aready Have Identity Authentication Enabled [page 25]
Scenarios in which existing customers would have Identity Authentication and Identity Provisioning automatically
enabled after December 9, 2022 are:
• If you're an existing customer with SAP SuccessFactors HCM suite tenants that have already completed the
upgrade to Identity Authentication, any additional (new) SAP SuccessFactors HCM suite tenants will have the
upgrade and activation of Identity Authentication with Identity Provisioning done for them automatically.
• If you're an existing customer with SAP SuccessFactors HCM suite production tenants that have not
completed the upgrade to Identity Authentication, then those tenants will not be automatically upgraded
and activated with Identity Authentication and Identity Provisioning.
• If you're an existing customer with no SAP SuccessFactors HCM suite production tenants available, then our
automation process will create a new tenant for you and enable it with Identity Authentication and Identity
Provisioning.
Related Information
Integrating SAP SuccessFactors with Identity Authentication involves the process described, at a high level, in the
image. Select an image to find the topics associated with each task.
Tip
If your company migrated to the Identity Authentication service, before April 24, 2020, you will need to make
changes to your Identity Authentication Transformations. The changes that you need to make are described in
detail in the guide linked below: IPS Transformations Document
Related Information
All SAP SuccessFactors systems can be set up to use Identity Authentication in SAP Cloud Identity Services.
The Identity Authentication service is a cloud solution for identity life-cycle management. It is used by SAP Cloud
solutions like the SAP SuccessFactors HCM suite, as well as for SAP Business Technology Platform applications
and on-premise applications. It provides services for authentication, single sign-on, and on-premising integration
as well as self-services such as registration or password reset for employees, customer partners, and consumers.
You can use Identity Authentication services like SAML 2.0 single sign-on, username and password login, two-
factor authentication, and other login options to control access yourSAP SuccessFactors system.
Setting Up SAP SuccessFactors with Identity Authentication and Identity Provisioning
Services
30 PUBLIC Existing Customers (Before December 9, 2022) Start Here
Step-by-Step Upgrade to Identity Authentication
Related Information
Benefits of Using Identity Authentication in SAP Cloud Identity Services [page 11]
Guidance on Migrating to Identity Authentication in SAP Cloud Identity Services [page 7]
When to Use SAP SuccessFactors with Identity Authentication [page 4]
Important Notes About Using SAP SuccessFactors with Identity Authentication [page 5]
Getting Started with Identity Authentication and SAP SuccessFactors [page 31]
Learn about the overall process to set up your SAP SuccessFactors system and how to use Identity Authentication
in SAP Cloud Identity Services.
Note
We are requesting for all systems to be migrated to Identity Authentication by June 2, 2025. For details about
this migration, refer to Guidance on Migration to Identity Authentication in SAP Cloud Identity Services in
the Related Information section.
Note
The below steps apply to SAP SuccessFactors HCM suite tenants created prior to December 9, 2022, If your
tenant was created after this, it means you already have Identity Authentication enabled. Instead, go to Getting
Started with Identity Authentication Already Enabled in the Related Information section for steps to log in
and access Identity Authentication and Identity Provisioning.
Note
Identity Authentication is included natively in all partner paid demo tenants (i.e. Company ID starts with
SFCPART) which is created from a template with “IAS” in the template description and version name. Selecting
one of these templates automatically ensures that Identity Authentication is provisioned along with the demo
tenant during the provisioning process, without the need to run any Identity Authentication process through the
Upgrade Center. Additionally any Identity Authentication Initiate Upgrade or Change tasks, if available in the
Upgrade Center, should not be run and is not supported by Technical Support.
Caution
You must sync ALL users to Identity Authentication service before you activate the service. User sync is
critical when using the following services and features:
• Conditional Authentication: To set up with rules that authenticate based on email, user type, or group.
• Stories in People Analytics, Internal Career Site, and other SAP SuccessFactors product areas:
User identifiers can change between product areas and Identity Authentication can only map these
identifiers correctly when your users are in the Identity Authentication service.
• Global Assignment & Concurrent Employment: when users log on from different sources, Identity
Authentication service needs to convert their identifiers so that the Identity Authentication service
understands them. That only happens when user sync has been done and the users are loaded into the
Identity Authentication service.
• Enablement of Partial SSO: If you intend to user partial sso, your users should exist in Identity
Authentication service.
• Two-factor Authentication: Your users need to exist in Identity Authentication service so that you can
take advantage of two-factor security features.
Do not manually create users in Identity Authentication, as all users must be synchronized from SAP
SuccessFactors or other integrated systems to ensure accurate and consistent user management. Manual
creation can result in synchronization issues, mismatched user data, and potential authentication failures.
Related Information
X.509 certificate-based authentication is now supported in SAP SuccessFactors for incoming calls.
Prerequisites
You have the Administrator Permissions Manage Security Center Access to X.509 Certificate Mapping
permission.
Context
Mutual Transport Layer Security (mTLS) establishes an encrypted TLS connection, in which both parties use X.509
certificates to authenticate and verify each other. mTLS prevents malicious third parties from imitating genuine
applications, and provides a more secure authentication option to its users.
When an application attempts to establish a connection with another application's secure web server, the mTLS
protocol protects their communications, and verifies that the incoming server truly belongs to the application being
called. The application making the call can trust the identity of the application it's calling, because the Certificate
Authority has created and issued an X.509 certificate to the application.
Setting Up SAP SuccessFactors with Identity Authentication and Identity Provisioning
Services
Existing Customers (Before December 9, 2022) Start Here PUBLIC 33
Your application's X.509 certificate can be uploaded to the Admin Center's Security Center for use in mTLS
authentication.
Note
As of now, the Security Center supports the use cases for incoming calls to SAP SuccessFactors from
Identity Authentication, Identity Provisioning, Employee Central Payroll, Business Technology Platform,
SAP Identity Management, and Business Data Cloud.
For information about your specific application's certificate (including how to obtain and set up notifications for
expiring X.509 certificates), refer to the Related Information section.
For Identity Authentication, certificate information is located in step 4 of Configure Authentication Provider To
Migrate User Passwords from SAP SuccessFactors Systems to Identity Authentication. Make sure to check
the Automatic Renewal checkbox option mentioned in this step to ensure that your certificate is regenerated
automatically.
Procedure
Field Description
Integration Name Select the name of your application from the drop-down
menu. The options available are:
• Employee Central Payroll
• Identity Authentication Service
• Identity Provisioning Service
• Business Technology Platform
• SAP Identity Management
• Business Data Cloud
Certificate File Upload the corresponding file with a certificate file extension
cer, pem, crt etc. and that follows the X.509 protocol.
Login Name The login name of a user that has permission to consume
the SAP SuccessFactors API for its respective application.
Note
If your Integration Name is Identity Authentication
Service or Identity Provisioning Service, this field is op-
tional, since a technical user is is already created in the
background for these applications.
4. Click Save.
Setting Up SAP SuccessFactors with Identity Authentication and Identity Provisioning
Services
34 PUBLIC Existing Customers (Before December 9, 2022) Start Here
Results
Related Information
Configure Authentication Provider To Migrate Passwords from SAP SuccessFactors to Identity Authentication
Identity Provisioning - Generate and Manage Certificates for Outbound Connection
Business Technology Platform - Use Destination Certificates
X.509 Client Certificates-Employee Central Payroll
The API user created during the upgrade process is called IPSADMIN. This user is intended to become your
API user after you've assigned the listed permissions to them. The user that you use to log in to the Identity
Provisioning service has separate credentials.
Context
Note
If your SAP SuccessFactors tenant was created after December 9, 2022, you are not using the IPSADMIN
API user, since your configuration is already enabled with a technical user in the background to communicate
between Identity Authentication and Identity Provisioning using Mutual Transport Layer Security (mTLS) in
conjunction with the System for Cross-domain Identity Management (SCIM) API, which are the latest methods
of authentication and integration with Identity Authentication and Identity Provisioning.
Also, if you have already initiated the upgrade to Identity Authentication after December 9, 2022, Identity
Authentication and Identity Provisioning will already be configured to use Mutual Transport Layer Security
(mTLS) in conjunction with the System for Cross-domain Identity Management (SCIM) API.
You do not need to complete the below steps to setup an API user.
Tip
If you have already completed the steps to initiate the upgrade to Identity Authentication before December 9,
2022, then instead of completing the below steps to set up the IPSADMIN API User, we highly recommend you
• You will not need to create and manage the settings for the IPSADMIN user, as mTLS will come with
a technical user automatically added that will communicate between Identity Authentication, Identity
Provisioning and your SAP SuccessFactors tenant.
• You will not need to complete the below steps to whitelist IP Addresses based on the regional tables below,
since the security of mTLS authentication eliminates the need to do this.
• You will be using the new SCIM API, which is a more preferred method to make user data more secure and
simplify the user experience by automating the user identity lifecycle management process.
• If you are using Onboarding, this enablement also provides you with the option to authenticate both your
Employees and New Hires with Identity Authentication because of the SCIM integration provided, as well
as perform the real-time sync of user accounts from SAP SuccessFactors to Identity Authentication using
Identity Provisioning (refer to Authenticating New Hires with Identity Authentication in SAP Cloud
Identity Services and Manage Real-Time Sync of New Hires from SAP SuccessFactors to Identity
Authentication with Identity Provisioning in the Related Information section).
To bypass the below steps and upgrade to mTLS and the SCIM API, go to Upgrade from OData Identity
Provisioning Connector to SCIM Connector with SAP SuccessFactors HCM suite.
Tip
After you receive your Identity Provisioning service tenant, there are two areas where you must reset
passwords:
• reset the password for the IPSADMIN user in your SAP SuccessFactors system
• reset the password in your Identity Provisioning tenant in the following location: Source Systems
Properties Password Edit Save .
Create an allowlist of IP Address ranges so that Identity Authentication API calls are accepted by SAP
SuccessFactors. For more details about Country/Region information, refer to the Regional Availability topic in
the Related Information section below.
Note
If your Identity Authentication and Identity Provisioning service are using the same Identity
Authentication environment (if they are, the url will have /ips appended to it, for example [Link]
[Link]/ips):
If they are not using the same environment (the url will formatted according to the Neo pattern, for
example:[Link]
Syncing users into the Identity Authentication service requires that the administrator is granted the necessary
role-based permissions. Before proceeding, ensure that your API User has the following permission. For new
instances, set a password for the IPSADMIN user.
Setting Up SAP SuccessFactors with Identity Authentication and Identity Provisioning
Services
36 PUBLIC Existing Customers (Before December 9, 2022) Start Here
Procedure
Caution
8. Enter the IP address ranges for Identity Provisioning into the IP Address Restrictions field. Refer to Regional
Availability (Identity Provisioning) in the Related Information section for these ranges.
9. Enter the IP address ranges for Identity Authentication into the IP Address Restrictions field. Refer to Regional
Availability (Identity Authentication) in the Related Information section for these ranges.
Note
The Country/Region designation for your administration console is displayed within brackets in the SAP
Identity Authentication Service [Country/Region] header of your console's web application screen.
Tip
For information about how to give Role-Based Permissions to a user, review the topic linked below: What
Are Role-Based Permissions.
You only need to reset the password if the user you created is being reused and already existed.
The user performing these steps needs access to ALL users in the instance. If your organization assigns
separate admins to distinct groups of users, you must ensure that this user has access to all those groups.
Results
You can use this user to configure the Identity Identity Provisioning service.
Related Information
Initiate integration of your organization's SAP SuccessFactors system with the Identity Authentication service so
that you can use it for identity management.
Prerequisites
Note
If your SAP SuccessFactors tenant was created after December 9, 2022, Identity Authentication and Identity
Provisioning have already been enabled and are using Mutual Transport Layer Security (mTLS) in conjunction
with the System for Cross-domain Identity Management (SCIM) API, which are the latest methods of
authentication and integration with Identity Authentication and Identity Provisioning. You do not need to
complete the below steps to upgrade to Identity Authentication.
This enablement also provides you the option to authenticate both your Employees and New Hires with Identity
Authentication because of the SCIM integration provided (refer to Authenticating New Hires with Identity
Authentication in SAP Cloud Identity Services in the Related Information section).
If you perform the below steps to initiate the upgrade to Identity Authentication after December 9, 2022,
Identity Authentication and Identity Provisioning will already be configured to use Mutual Transport Layer
Security (mTLS) in conjunction with the System for Cross-domain Identity Management (SCIM) API, which are
the latest methods of authentication and integration with Identity Authentication and Identity Provisioning.
Note
Identity Authentication is included natively in all partner paid demo tenants (i.e. Company ID starts with
SFCPART) which is created from a template with “IAS” in the template description and version name. Selecting
one of these templates automatically ensures that Identity Authentication is provisioned along with the demo
tenant during the provisioning process, without the need to run any Identity Authentication process through the
Upgrade Center. Additionally any Identity Authentication Initiate Upgrade or Change tasks, if available in the
Upgrade Center, should not be run and is not supported by Technical Support.
Context
Caution
Completing this task initiates the Identity Authentication service upgrade process, after configuring your
authentication methods as described in this guide, you must then activate the Identity Authentication service
to complete the migration.
This is a video overview of the steps to initiate the upgrade to the Identity Authentication service.
Procedure
Note
The Upgrade Center can be searched for, but is also available in the Release Center tile under See More.
2. Find the upgrade Initiate the SAP Cloud Identity Services Identity Authentication Service Integration and click
Learn More & Upgrade Now.
3. Click Upgrade Now.
Setting Up SAP SuccessFactors with Identity Authentication and Identity Provisioning
Services
Existing Customers (Before December 9, 2022) Start Here PUBLIC 39
4. Enter your S-User and password in the dialog and click Validate.
We match the information you entered against our records to make sure it’s correct. If you enter invalid
credentials or you aren’t part of the organization who owns the system you're working in, you can’t proceed.
Note
If you encounter validation errors when logging in, refer to Identity Authentication Upgrade Error when
Validating S-User Credentials: 2944990
5. Select a tenant from your list of displayed tenants or select Request New Tenant to the Identity Authentication
service.
If you’re a Partner-Managed Cloud (PMC) customer, you can only request a new tenant.
Caution
If your company is already using a productive tenant for Identity Authentication, we strongly recommend
that you reuse it and migrate with that productive SAP SuccessFactors tenant. Using one Identity
Authentication tenant for your SAP cloud applications is important for other integration scenarios between
these applications. Starting with this simplified configuration can help to avoid the need to migrate the
integrations and to redesign the landscape. If your company has a specific requirement (functional or legal)
where existing Identity Authentication usage or users should not be mixed with the usage and users of SAP
SuccessFactors, you can proceed to request an additional Identity Authentication tenant dedicated to SAP
SuccessFactors.
We do not recommend using the same Identity Authentication service tenant for multiple SAP
SuccessFactors tenants, as the Identity Authentication service will not be able to identify if multiple SAP
SuccessFactors tenants have the same login name of some users.
We recommend, for test environments, that you have at least one Identity Authentication tenant that
is shared with various SAP cloud applications so that you can test a production-like scenario. If you
have additional SAP SuccessFactors test instances that cannot be mapped to a test tenant with multiple
applications, then you can request a dedicated Identity Authentication tenant for these instances so that
they’re managed separately.
Note
The tenants available for upgrade are listed according to the tenants in your region. If the tenant that you
want to upgrade is located in a different region or you don't see the tenant that you want to upgrade, please
contact your implementation partner or Account Executive so that they can enable the Ignore region and
type restrictions for Identity Authentication Service integration (Warning: This feature should be turned on
only when an existing Identity Authentication tenant needs to be integrated). setting.
Caution
Although this option is available, we recommend you retain the default settings, which limit the
use of Identity Authentication to the appropriate region and corresponding tenant type of the SAP
SuccessFactors tenant (for example, ensuring that production Identity Authentication tenants are used
for production SAP SuccessFactors tenants, and test/preview Identity Authentication tenants are used
for test/preview SAP SuccessFactors tenants). Only select the Ignore region and type restrictions for
Identity Authentication Service integration (Warning: This feature should be turned on only when an existing
Identity Authentication tenant needs to be integrated). setting when your company absolutely needs this
configuration enabled, and you have evaluated and validated all the impacts and consequences.
Results
The integration process runs in the background and can take up to 24 hours to complete. After the upgrade
process completes, an email is sent with tenant details. You can monitor the progress of your upgrade using the
Identity Authentication monitoring tool.
Note
The monitoring tool can be found by searching for Monitoring Tool in the Tools tile, or by using the Admin
Center search bar.
If your organization did not have an Identity Authentication service tenant, we create one during the upgrade
process and you’re added as its administrator, based on your S-User information. You receive an e-mail notification
to register your new account.
If you provided the URL of an existing Identity Authentication service tenant, the SAP SuccessFactors system
you’re working in is added to the Applications section of the Identity Authentication service tenant. You aren’t
added as a new administrator. Current administrators can go there to complete the configuration.
Note
The Identity Authentication service is not enabled and used by your system yet. You still have to configure it
and then turn it on when you're ready.
After you receive notification that the process completed successfully, review default configuration settings in the
Identity Authentication service tenant and confirm that the user sync is functioning properly.
If the upgrade fails for some reason, use the Undo option in Upgrade Center, within 30 days, to rerun the upgrade
after you’ve resolved the cause of the failure. If you're not sure why the upgrade failed or how to fix it, contact SAP
Cloud Support.
Note
The Undo option in Upgrade Center only allows you rerun a failed upgrade. It can't undo a successful
integration.
Related Information
When you initiate your upgrade to the Identity Authentication service, and while the upgrade is processing, you can
track the status of your upgrade using the Monitoring Tool.
Upon initiating the upgrade, you're given a link to access the Monitoring Tool, but you can also access it by
searching for Monitoring Tool in the Admin Center Tools tile, or by using the Admin Center search bar.
• View the overall status of your Initiate and Change upgrades, and see which upgrades are complete or still need
to be activated.
• See detailed information for each upgrade, including the date the upgrade was initiated and completed.
• Access the Migration Process ID, along with URLs for your Identity Authentication and Identity Provisioning
tenants.
• Review additional guidance, such as how to contact administrators, access the Identity Authentication admin
console, and view related resources.
If you are reusing an Identity Authentication tenant, ensure that you have access to the admin user credentials.
Remember
• The Monitoring Tool will display the status and URL for the initial upgrade process, and will do the same for
the Identity Authentication change upgrade process, if it has been completed.
• Even if the initial upgrade process has succeeded, if the change upgrade process is run later and fails,the
Monitoring Tool will display the error for the failure on this same screen.
• It might not be able to display the execution details of upgrade processes completed a year or more ago.
Note
• If an error occurs during the upgrade, take note of the Migration Process ID so that Technical Support can
identify your issue.
• The Monitoring Tool only monitors the integration between SAP SuccessFactors and Identity
Authentication, and does not monitor the SAP Analytics Cloud (SAC) or Learning Management Systems
(LMS) integration process.
Related Information
Test your Identity Authentication service configuration before activating your migration.
Prerequisites
• You've initiated your Identity Authentication service migration in the Upgrade Center.
• You’ve set up your authentication configurations in the Identity Authentication in SAP Cloud Identity Services.
• You've set up your source and target configurations in the Identity Provisioning in SAP Cloud Identity Services.
• You have the corporate identity provider log on information.
Note
• If you're using a third-party provider, ensure that you have the credentials to log on to the corporate
IdP.
• If the Identity Authentication service is your corporate IdP, ensure that you have the login credentials
for your Identity Authentication user.
Context
This is a video overview of the steps to test your migration before activating the Identity Authentication service.
Setting Up SAP SuccessFactors with Identity Authentication and Identity Provisioning
Services
44 PUBLIC Existing Customers (Before December 9, 2022) Start Here
Restriction
After you've upgraded to the Identity Authentication service, you will not have the ability to turn on partial
SSO in SAP SuccessFactors company Provisioning. By default, partial SSO is disabled after activating Identity
Authentication. If needed, you can set up partial SSO in Identity Authentication.
After you've upgraded to the Identity Authentication service, you will not have the ability to enable multiple
SAML asserting parties in SAP SuccessFactors company Provisioning. By default, Identity Authentication
will be enabled as the single SAML asserting party in the SAP SuccessFactors provisioning setting after
activating Identity Authentication. If you need multiple asserting parties, you can accomplish this by setting up
conditional authentication.
Remember
As a customer, you don't have access to Provisioning. To complete tasks in Provisioning, contact your
implementation partner or Account Executive. For any non-implementation tasks, contact Technical Support.
Procedure
If you're using Onboarding to activate employees, refer to the following topic: Activating an Account and
Setting a New Password After Identity Authentication is Enabled.
Related Information
The Identity Authentication service is the Identity Provider and performs the user authentication method you
configure for your system, session management, and single sign-on for your integrated applications. This
integrated process requires the synchronization of users from the SAP SuccessFactors instance to the Identity
Authentication service.
When a new user is created in SAP SuccessFactors, they’re provisioned in Identity Authentication and the
provisioned user receives an activation email that they can use to set the password that they can use access
their SAP SuccessFactors application.
Tip
Successfully syncing your users to Identity Authentication requires that the SAP SuccessFactors users MUST
contain the following attributes:
• Last Name
• Unique Username
• Unique Email
These attributes are required in Identity Authentication. If you cannot ensure that all users have a unique email
address, you may need to generate “dummy” emails for them.
Caution
The [Link] in Identity Provisioning under the tabs Source Systems Properties , contains place
holder values called 'sf_username1_placeholder','sf_username2_placeholder'. Replacing these place holders
with a few users can help you to test user provisioning before performing the sync job that pulls in all of
your SAP SuccessFactors users into Identity Authentication. Test your selected users by substituting the
place holders with usernames from your SAP SuccessFactors system. After testing and ensuring that user
provisioning is working correctly, remove the placeholder users and replace them with the value Active. This
syncs all the active users in your system.
Default Transformation for SAP SuccessFactors as the Source System - OData API:.
Code Syntax
Code Syntax
{
"user": {
"mappings": [
{
"sourcePath": "$.schemas",
"preserveArrayWithSingleElement": true,
"targetPath": "$.schemas"
},
{
"sourcePath": "$.id",
"targetVariable": "entityIdSourceSystem"
},
{
"sourcePath": "$.userName",
"targetPath": "$.userName",
"correlationAttribute": true
},
{
"sourcePath": "$.userType",
"targetPath": "$.userType"
},
{
"sourcePath": "$.[Link]",
"optional": true,
"targetPath": "$.[Link]"
},
{
"sourcePath": "$.[Link]",
"optional": true,
"targetPath": "$.[Link]"
},
{
"sourcePath": "$.[Link]",
"optional": true,
"targetPath": "$.[Link]"
},
{
"sourcePath": "$.[Link]",
"optional": true,
"targetPath": "$.[Link]"
},
{
"sourcePath": "$.[Link]",
"optional": true,
"targetPath": "$.[Link]"
},
{
"sourcePath": "$.[Link]",
"optional": true,
"targetPath": "$.[Link]"
},
{
"sourcePath": "$.nickName",
"optional": true,
"targetPath": "$.nickName"
},
{
"sourcePath": "$.preferredLanguage",
"optional": true,
"targetPath": "$.preferredLanguage"
},
{
"sourcePath": "$.displayName",
"optional": true,
Setting Up SAP SuccessFactors with Identity Authentication and Identity Provisioning
Services
Existing Customers (Before December 9, 2022) Start Here PUBLIC 51
"targetPath": "$.displayName"
},
{
"sourcePath": "$.title",
"optional": true,
"targetPath": "$.title"
},
{
"sourcePath": "$.externalId",
"optional": true,
"targetPath": "$.externalId"
},
{
"sourcePath": "$.locale",
"optional": true,
"targetPath": "$.locale"
},
{
"sourcePath": "$.timezone",
"optional": true,
"targetPath": "$.timezone"
},
{
"sourcePath": "$['urn:ietf:params:scim:schemas:extension:sap:2.0:User']
['userUuid']",
"optional": true,
"targetPath": "$['urn:ietf:params:scim:schemas:extension:sap:2.0:User']
['userUuid']"
},
{
"sourcePath": "$
['urn:ietf:params:scim:schemas:extension:successfactors:2.0:User']
['perPersonUuid']",
"optional": true,
"targetPath": "$
['urn:ietf:params:scim:schemas:extension:successfactors:2.0:User']
['perPersonUuid']"
},
{
"sourcePath": "$
['urn:ietf:params:scim:schemas:extension:successfactors:2.0:User']
['loginMethod']",
"optional": true,
"targetPath": "$
['urn:ietf:params:scim:schemas:extension:successfactors:2.0:User']
['loginMethod']"
},
{
"sourcePath": "$
['urn:ietf:params:scim:schemas:extension:successfactors:2.0:User']
['personIdExternal']",
"optional": true,
"targetPath": "$
['urn:ietf:params:scim:schemas:extension:successfactors:2.0:User']
['personIdExternal']"
},
{
"sourcePath": "$
['urn:ietf:params:scim:schemas:extension:successfactors:2.0:User']
['customFields']",
"optional": true,
"targetPath": "$
['urn:ietf:params:scim:schemas:extension:successfactors:2.0:User']
['customFields']"
},
{
"sourcePath": "$
['urn:ietf:params:scim:schemas:extension:enterprise:2.0:User']['department']",
"sourcePath": "$['urn:ietf:params:scim:schemas:extension:enterprise:2.0:User']
['manager']['value']",
"optional": true,
"targetPath": "$['urn:ietf:params:scim:schemas:extension:enterprise:2.0:User']
['manager']['value']"
},
{
"sourcePath": "$['urn:ietf:params:scim:schemas:extension:enterprise:2.0:User']
['manager']['displayName']",
"optional": true,
"targetPath": "$['urn:ietf:params:scim:schemas:extension:enterprise:2.0:User']
['manager']['displayName']"
},
{
"sourcePath": "$['urn:ietf:params:scim:schemas:extension:enterprise:2.0:User']
['manager']['$ref']",
"optional": true,
"targetPath": "$['urn:ietf:params:scim:schemas:extension:enterprise:2.0:User']
['manager']['$ref']"
},
{
"sourcePath": "$.phoneNumbers",
"preserveArrayWithSingleElement": true,
"optional": true,
"targetPath": "$.phoneNumbers"
},
{
"sourcePath": "$.emails",
"preserveArrayWithSingleElement": true,
"optional": true,
"targetPath": "$.emails"
},
{
"sourcePath": "$.emails[?(@.primary== true)].value",
"optional": true,
"correlationAttribute": true
},
{
"sourcePath": "$.active",
"targetPath": "$.active"
},
{
"sourcePath": "$.groups",
"preserveArrayWithSingleElement": true,
"optional": true,
"targetPath": "$.groups",
"functions": [
{
"condition": "'%[Link]%' !== 'null'",
"function": "concatString",
Default Transformation for Identity Authentication as the Target System - Identity Authentication SCIM API
Version 1:
Code Syntax
{
"user": {
"condition": "($.[Link]() > 0) && ($.[Link] EMPTY false) &&
isValidEmail($.emails[0].value)",
"mappings": [
{
"sourcePath": "$.groups",
"preserveArrayWithSingleElement": true,
"optional": true,
"targetPath": "$.corporateGroups"
},
{
"sourceVariable": "entityIdTargetSystem",
"targetPath": "$.id"
},
{
"constant": "urn:ietf:params:scim:schemas:core:2.0:User",
"targetPath": "$.schemas[0]"
},
{
Setting Up SAP SuccessFactors with Identity Authentication and Identity Provisioning
Services
54 PUBLIC Existing Customers (Before December 9, 2022) Start Here
"constant": "urn:ietf:params:scim:schemas:extension:enterprise:2.0:User",
"targetPath": "$.schemas[1]"
},
{
"sourcePath": "$.userName",
"targetPath": "$.userName",
"optional": true
},
{
"sourcePath": "$.emails[*].value",
"preserveArrayWithSingleElement": true,
"targetPath": "$.emails[?(@.value)]"
},
{
"sourcePath": "$.userType",
"targetPath": "$.userType",
"optional": true
},
{
"sourcePath": "$.[Link]",
"targetPath": "$.[Link]",
"optional": true
},
{
"sourcePath": "$.[Link]",
"targetPath": "$.[Link]",
"optional": true
},
{
"sourcePath": "$.[Link]",
"targetPath": "$.[Link]",
"optional": true
},
{
"sourcePath": "$.[Link]",
"targetPath": "$.[Link]",
"optional": true
},
{
"sourcePath": "$.addresses",
"targetPath": "$.addresses",
"preserveArrayWithSingleElement": true,
"defaultValue": [],
"optional": true,
"functions": [
{
"function": "putIfAbsent",
"key": "type",
"defaultValue": "work"
},
{
"condition": "(@.type NIN ['work', 'home'])",
"function": "putIfPresent",
"key": "type",
"defaultValue": "work"
}
]
},
{
"sourcePath": "$.locale",
"targetPath": "$.locale",
"optional": true
},
{
"sourcePath": "$.phoneNumbers",
"targetPath": "$.phoneNumbers",
"preserveArrayWithSingleElement": true,
"optional": true
"sourcePath": "$['urn:ietf:params:scim:schemas:extension:enterprise:2.0:User']
['employeeNumber']",
"targetPath": "$['urn:ietf:params:scim:schemas:extension:enterprise:2.0:User']
['employeeNumber']",
"optional" : true
},
{
"sourcePath": "$
['urn:ietf:params:scim:schemas:extension:enterprise:2.0:User']['costCenter']",
"targetPath": "$
['urn:ietf:params:scim:schemas:extension:enterprise:2.0:User']['costCenter']",
"optional" : true
},
{
"sourcePath": "$
['urn:ietf:params:scim:schemas:extension:enterprise:2.0:User']['organization']",
"targetPath": "$
['urn:ietf:params:scim:schemas:extension:enterprise:2.0:User']['organization']",
"optional" : true
},
{
"sourcePath": "$
['urn:ietf:params:scim:schemas:extension:enterprise:2.0:User']['division']",
"targetPath": "$
['urn:ietf:params:scim:schemas:extension:enterprise:2.0:User']['division']",
"optional" : true
},
{
"sourcePath": "$
['urn:ietf:params:scim:schemas:extension:enterprise:2.0:User']['department']",
"targetPath": "$
['urn:ietf:params:scim:schemas:extension:enterprise:2.0:User']['department']",
"optional" : true
},
{
"sourcePath": "$['urn:ietf:params:scim:schemas:extension:enterprise:2.0:User']
['manager']['value']",
"targetPath": "$['urn:ietf:params:scim:schemas:extension:enterprise:2.0:User']
['manager']['value']",
"optional" : true,
"functions": [
{
"function": "resolveEntityIds"
}
]
},
{
"sourcePath": "$['urn:ietf:params:scim:schemas:extension:enterprise:2.0:User']
['manager']['displayName']",
"targetPath": "$['urn:ietf:params:scim:schemas:extension:enterprise:2.0:User']
['manager']['displayName']",
"optional" : true
},
{
"sourcePath": "$.active",
Default Transformation for Identity Authentication as the Target System - Identity Authentication SCIM API
Version 2:
Code Syntax
{
"user": {
"condition": "($.emails EMPTY false) && ($.userName EMPTY false) &&
isValidEmail($.emails[0].value)",
"mappings": [
{
"sourceVariable": "entityIdTargetSystem",
"targetPath": "$.id"
},
{
"constant":
["urn:ietf:params:scim:schemas:core:2.0:User","urn:ietf:params:scim:schemas:exten
sion:enterprise:2.0:User","urn:ietf:params:scim:schemas:extension:sap:2.0:User","
urn:sap:cloud:scim:schemas:extension:custom:2.0:User"],
"targetPath": "$.schemas"
},
{
"sourcePath": "$.userName",
"targetPath": "$.userName"
},
{
"sourcePath": "$.emails",
"preserveArrayWithSingleElement": true,
"targetPath": "$['urn:ietf:params:scim:schemas:extension:sap:2.0:User']
['emails']",
"scope": "createEntity",
"functions": [
{
"function": "putIfAbsent",
"key": "verified",
"defaultValue": true
}
]
},
{
"targetPath": "$['urn:ietf:params:scim:schemas:extension:sap:2.0:User']
['emails'][*]['type']",
"type": "remove"
},
{
Setting Up SAP SuccessFactors with Identity Authentication and Identity Provisioning
Services
58 PUBLIC Existing Customers (Before December 9, 2022) Start Here
"sourcePath": "$.emails[*].value",
"preserveArrayWithSingleElement": true,
"targetPath": "$.emails[?(@.value)]"
},
{
"sourcePath": "$.[Link]",
"targetPath": "$.[Link]",
"optional": true
},
{
"sourcePath": "$.[Link]",
"targetPath": "$.[Link]",
"optional": true
},
{
"sourcePath": "$.[Link]",
"targetPath": "$.[Link]",
"optional": true
},
{
"sourcePath": "$.[Link]",
"targetPath": "$.[Link]",
"optional": true
},
{
"sourcePath": "$.addresses",
"targetPath": "$.addresses",
"preserveArrayWithSingleElement": true,
"defaultValue": [],
"optional": true,
"functions": [
{
"function": "putIfAbsent",
"key": "type",
"defaultValue": "work"
},
{
"condition": "(@.type NIN ['work', 'home'])",
"function": "putIfPresent",
"key": "type",
"defaultValue": "work"
}
]
},
{
"sourcePath": "$.phoneNumbers",
"targetPath": "$.phoneNumbers",
"preserveArrayWithSingleElement": true,
"optional": true
},
{
"sourcePath": "$.displayName",
"targetPath": "$.displayName",
"optional": true
},
{
"sourcePath": "$.userType",
"targetPath": "$.userType",
"optional": true
},
{
"sourcePath": "$.locale",
"targetPath": "$.locale",
"optional": true
},
{
"sourcePath": "$.timezone",
"targetPath": "$.timezone",
"sourcePath": "$['urn:ietf:params:scim:schemas:extension:enterprise:2.0:User']
['employeeNumber']",
"targetPath": "$['urn:ietf:params:scim:schemas:extension:enterprise:2.0:User']
['employeeNumber']",
"optional" : true
},
{
"sourcePath": "$
['urn:ietf:params:scim:schemas:extension:enterprise:2.0:User']['costCenter']",
"targetPath": "$
['urn:ietf:params:scim:schemas:extension:enterprise:2.0:User']['costCenter']",
"optional" : true
},
{
"sourcePath": "$
['urn:ietf:params:scim:schemas:extension:enterprise:2.0:User']['organization']",
"targetPath": "$
['urn:ietf:params:scim:schemas:extension:enterprise:2.0:User']['organization']",
"optional" : true
},
{
"sourcePath": "$
['urn:ietf:params:scim:schemas:extension:enterprise:2.0:User']['division']",
"targetPath": "$
['urn:ietf:params:scim:schemas:extension:enterprise:2.0:User']['division']",
"optional" : true
},
{
"sourcePath": "$
['urn:ietf:params:scim:schemas:extension:enterprise:2.0:User']['department']",
"targetPath": "$
['urn:ietf:params:scim:schemas:extension:enterprise:2.0:User']['department']",
"optional" : true
},
{
"sourcePath": "$['urn:ietf:params:scim:schemas:extension:enterprise:2.0:User']
['manager']['value']",
"targetPath": "$['urn:ietf:params:scim:schemas:extension:enterprise:2.0:User']
['manager']['value']",
"optional" : true,
"functions": [
"sourcePath": "$['urn:ietf:params:scim:schemas:extension:enterprise:2.0:User']
['manager']['displayName']",
"targetPath": "$['urn:ietf:params:scim:schemas:extension:enterprise:2.0:User']
['manager']['displayName']",
"optional" : true
},
{
"constant": false,
"targetPath": "$['urn:ietf:params:scim:schemas:extension:sap:2.0:User']
['sendMail']",
"scope": "createEntity"
},
{
"constant": true,
"targetPath": "$['urn:ietf:params:scim:schemas:extension:sap:2.0:User']
['mailVerified']",
"scope": "createEntity"
},
{
"constant": "disabled",
"targetPath": "$['urn:ietf:params:scim:schemas:extension:sap:2.0:User']
['passwordDetails']['status']",
"scope": "createEntity"
},
{
"sourcePath": "$['urn:sap:cloud:scim:schemas:extension:custom:2.0:User']
['attributes']",
"preserveArrayWithSingleElement": true,
"optional": true,
"targetPath": "$['urn:sap:cloud:scim:schemas:extension:custom:2.0:User']
['attributes']"
},
{
"constant": "<your-initial-password>",
"targetPath": "$.password",
"scope": "createEntity",
"ignore": "true"
},
{
"constant": "<your-source-system-type-code>",
"targetPath": "$['urn:ietf:params:scim:schemas:extension:sap:2.0:User']
['sourceSystem']",
"scope": "createEntity",
"ignore": true
},
{
"constant": "<your-source-system-id>",
"targetPath": "$['urn:ietf:params:scim:schemas:extension:sap:2.0:User']
['sourceSystemId']",
"scope": "createEntity",
"ignore": true
}
]
},
"group": {
"mappings": [
{
"sourceVariable": "entityIdTargetSystem",
"targetPath": "$.id"
},
Tip
The default transformations for Identity Provisioning can also be found in their source document for both the
Source and Target systems:
Related Information
When a new SAP SuccessFactors HCM suite tenant is provisioned, or when the Initiate the SAP Cloud Identity
Services Identity Authentication Service Integration or Change SuccessFactors Identity Authentication Service
Integration tasks are run in the Upgrade Center, the HCM suite tenant will be automatically configured for
integration with the Identity Authentication tenant.
The following outlines the default configuration settings after this integration is completed:
1. In the SAP Cloud Identity Services admin console, under Applications & Resources Applications , an
application for the HCM suite tenant is created with the following attributes:
Name Value
Organization global
2. Under Single Sign-On SAML 2.0 Configuration , this particular SAP SuccessFactors application will have
the following SAML 2.0 attributes:
Binding HTTP-Redirect
Name Value
Binding HTTP-Redirect
Name Value
Name Value
• Under Encryption Certificate: the Subject DN and Validity values below should be exactly the same as the
corresponding values under the Signing Certificate section:
Name Value
Name Value
If the Identity Authentication application is already migrated to a SAML + OIDC hybrid setup, the following
configuration can be observed in the Identity Authentication app:
Setting Up SAP SuccessFactors with Identity Authentication and Identity Provisioning
Services
Existing Customers (Before December 9, 2022) Start Here PUBLIC 67
1. The banner on the Identity Authentication app displays the message, This application was created from a
source application. Some of the inherited configurations can't be changed.
3. In the Provided APIs section, the Allow all APIs for principal propagation checkbox is checked and grayed out.
Name Value
SAML Asserting Party Name Pattern is the Identity Authentication URL without "https":
[Link]
SAML Verifying Certificate Valid Period Should be the same as Identity Provider Certificate Validity
Period under the SAML 2.0 Configuration section for this
HCM suite tenant in the Identity Authentication admin con-
sole.
Name ID Format (used when IDP sends login response to Unspecified (this field is also grayed out and cannot be
SuccessFactors) modified)
Name Value
URL for a Deeplink IDP Login redirect Empty and grayed out
You can remap or (or change) your existing Identity Authentication tenant using the Upgrade Center.
Context
In the Upgrade Center, you can remap tenants that have already been initiated, activated, or configured with
Identity Authentication in SAP Cloud Identity Services. When you remap a tenant, your Identity Authentication
and Identity Provisioning configurations don’t automatically migrate - you must reconfigure them manually. In
the SAP SuccessFactors Upgrade Center, you can start this process by selecting Change SuccessFactors Identity
Authentication Integration .
Caution
• Only perform this action if you have a legitimate business reason why the currently integrated Identity
Authentication tenant cannot be used. Changing tenants may impact Single Sign-On (SSO) with other
integrated applications and could require additional configuration in those applications. Exercise extreme
caution.
• Before proceeding, it is strongly recommended to check the current Initiate Identity Authentication
upgrade status and the Identity Authentication/Identity Provisioning tenant information using the
Monitoring tool. This helps ensure that the current integrated Identity Authentication/Identity Provisioning
tenants cannot be reused. Refer to Monitoring Tool for the Upgrade to Identity Authentication in the
Related Information section.
• After completing the initial upgrade to Identity Authentication, each tenant can only perform the remap
(change) action from the Upgrade Center one time.
• Once the change is complete, and the remapped tenant is activated via the Activate SuccessFactors
Identity Authentication Service Integration task in the Upgrade Center, this will be the only tenant that can
be seen in your system.
• Initial upgrades or remapping tasks performed by the Upgrade Center cannot be undone.
• If you have requested an additional Identity Authentication tenant for an SAP SuccessFactors tenant, be
aware that its existence is tied to the associated SAP SuccessFactors tenant. Decommissioning the SAP
SuccessFactors tenant will also delete the additional Identity Authentication tenant, which may disrupt any
other applications relying on it.
If you perform the below steps to remap (or change) your existing Identity Authentication tenant using the
Upgrade Center after December 9, 2022, Identity Authentication and Identity Provisioning will be configured
to use Mutual Transport Layer Security (mTLS) in conjunction with the System for Cross-domain Identity
Management (SCIM) API, which are the latest methods of authentication and integration with Identity
Authentication and Identity Provisioning.
Note
Identity Authentication is included natively in all partner paid demo tenants (i.e. Company ID starts with
SFCPART) which is created from a template with “IAS” in the template description and version name. Selecting
one of these templates automatically ensures that Identity Authentication is provisioned along with the demo
tenant during the provisioning process, without the need to run any Identity Authentication process through the
Upgrade Center. Additionally any Identity Authentication Initiate Upgrade or Change tasks, if available in the
Upgrade Center, should not be run and is not supported by Technical Support.
Procedure
Note
If you encounter validation errors, refer to this Knowledge Base Article 2944990
5. Select a tenant from your list of displayed tenants or select request a new tenant to the Identity Authentication
service.
Note
The tenants available for remapping are listed according to the tenants in your region. If the tenant that you
want to remap is located in a different region or you don't see the tenant that you want to upgrade, first
check whether the tenant appears when searching for Identity Authentication tenants on the Cloud Identity
Serices-Tenants page based on your current customer ID.
If the tenant desired still does not appear but is confirmed to be associated with your customer ID, please
contact your implementation partner or Account Executive so that they can enable the Ignore region and
type restrictions for Identity Authentication Service integration (Warning: This feature should be turned on
only when an existing Identity Authentication tenant needs to be integrated). setting.
Setting Up SAP SuccessFactors with Identity Authentication and Identity Provisioning
Services
Additional Configurations for SAP SuccessFactors HCM suite with SAP Cloud Identity
74 PUBLIC Services
Caution
Although this option is available, we recommend you retain the default settings, which limit the
use of Identity Authentication to the appropriate region and corresponding tenant type of the SAP
SuccessFactors tenant (for example, ensuring that production Identity Authentication tenants are used
for production SAP SuccessFactors tenants, and test/preview Identity Authentication tenants are used
for test/preview SAP SuccessFactors tenants). Only select the Ignore region and type restrictions for
Identity Authentication Service integration (Warning: This feature should be turned on only when an existing
Identity Authentication tenant needs to be integrated). setting when your company absolutely needs this
configuration enabled, and you have evaluated and validated all the impacts and consequences.
6. Confirm your selection by choosing Yes when the confirmation dialog displays.
Results
Note
Additional tenants can be requested by following the same steps for Remapping an Identity Authentication
Tenant and selecting Request New Tenant instead of selecting an existing tenant from the list.
Caution
If you've already selected an additional tenant using this process, and later decide to switch tenants or request
another new tenant, the initial tenant may be deleted.
The integration process runs in the background and can take up to 24 hours to complete. After the upgrade
process completes, an email is sent with tenant details. You can monitor the progress of your upgrade using the
Identity Authentication Monitoring Tool.
Next Steps
When the upgrade completes, you can configure your new tenant.
Related Information
Onboarding customers can now select Identity Authentication in SAP Cloud Identity Services.
Prerequisites
• Onboarding is enabled with the SCIM API for integration based on the following:
• You're provisioned with a new SAP SuccessFactors tenant with Identity Authentication and Identity
Provisioning preconfigured.
• Or the upgrade to the Identity Authentication service is fully completed with the SCIM API.
• Or the manual upgrade from OData V2 to the SCIM API has been completed.
Note
For Onboarding customers performing the manual upgrade from OData V2 to the SCIM API, the
Provisioning Company Settings Onboardee setting must also be enabled.
Remember
As a customer, you don't have access to Provisioning. To complete tasks in Provisioning, contact
your implementation partner or Account Executive. For any non-implementation tasks, contact
Technical Support.
Note
If you're an existing customer with the Identity Authentication service using OData V2 enabled, then
the Settings tab under Admin Center Monitoring Tool for Identity Authentication / Identity
Provisioning Service Upgrade is currently unavailable. The ability to upgrade from OData V2 to System
for Cross-domain Identity Management (SCIM) is available as of January 20, 2023. Refer to Upgrade from
OData Identity Provisioning Connector to SCIM Connector with SAP SuccessFactors HCM suite in the
in the Related Information section.
Context
Onboarding customers can now select Identity Authentication for new hires using the Settings tab.
1. Search for Monitoring Tool in the Tools tile, or by using the Admin Center search bar.
2. Click the Settings tab.
Note
If you've enabled Onboarding, but have not yet initiated the upgrade to Identity Authentication, or the
upgrade is not yet complete, you will not see the Settings tab. Please initiate and complete the upgrade
first.
Caution
Make sure you've completed all prerequisites before selecting this option, or you risk experiencing issues
with integration functionality.
Note
If you have already initiated the upgrade to Identity Authentication, and the upgrade is complete, the
option to select Apply to both Employee and Onboardee will only display if your Onboarding integration is
using the SCIM API.
If your SuccessFactors tenant is provisioned with the Identity Authentication service already preconfigured,
then you will not see the option to select Apply to both Employee and Onboardee. Instead you will see
Employee and Onboardee Application Completed displayed and grayed out, since the option has already
been enabled by the tenant provisioning process automatically.
You will also see Employee and Onboardee Application Completed displayed and grayed out, if your existing
SAP SuccessFactors tenant has intitiated the upgrade to Identity Authentication after December 9, 2022
and the upgrade is complete.
Results
Going forward, both your employees and new hires will now be authenticated with the Identity Authentication
service.
Next Steps
Next, complete the steps in the Setting up Identity Authentication Service Support for New Hires Using System
for Cross-domain Identity Management (SCIM) API guide in the Related Information section.
If your organization also manages alumni users, see Enabling Alumni Access and Configuring the Alumni Activation
Email Template in Identity Authentication for guidance on how to set up alumni access and implement Identity
Authentication for these users.
Setting Up SAP SuccessFactors with Identity Authentication and Identity Provisioning
Services
Additional Configurations for SAP SuccessFactors HCM suite with SAP Cloud Identity
Services PUBLIC 77
Related Information
Initiating the Upgrade to Identity Authentication in SAP Cloud Identity Services [page 38]
Setting up Identity Authentication Service for New Hires Using System for Cross-domain Identity Management
(SCIM) API
Upgrade from ODATA Identity Provisioning Connector to SCIM Connector with SAP SuccessFactors [page 130]
You can enable or disable the real-time sync of user account changes from SAP SuccessFactors to Identity
Authentication using Identity Provisioning.
Prerequisites
• You have enabled Onboarding in Provisioning Company Settings Onboarding (including Internal Hire
Process)
Remember
As a customer, you don't have access to Provisioning. To complete tasks in Provisioning, contact your
implementation partner or Account Executive. For any non-implementation tasks, contact Technical
Support.
• The SAP SuccessFactors Source System in Identity Provisioning must be using [Link] = 2 (SCIM API).
• You've already configured SAP SuccessFactors as the Source system and Identity Authentication as
your Target system in the Identity Provisioning administration console. Refer to Setting Up the Identity
Provisioning Source and Target Systems in the Related Information section.
Note
If your Identity Authentication tenant was created after December 9, 2022, or your existing SAP
SuccessFactors tenant has upgraded to Identity Authentication after December 9, 2022, your source and
target systems have already been configured for you automatically, so you don't need to set them up
manually.
• You have the Administrator Permissions Manage Security Center Access to X.509 Certificates
permission and the Create, Edit & Delete box enabled.
• You have the Administrator Permissions Manage Identity Account and Group Manage Identity
Authentication/Identity Provisioning Real Time Sync permission.
• You have the Administrator Permissions Manage Integration Tools Access to Integration Service
Registration Center UI permission.
Setting Up SAP SuccessFactors with Identity Authentication and Identity Provisioning
Services
Additional Configurations for SAP SuccessFactors HCM suite with SAP Cloud Identity
78 PUBLIC Services
Context
Real-time synchronization allows for the immediate update of user account data without having to manually run or
wait for a scheduled job. This feature comes in handy for scenarios when updates to a user's information are made
for immediate system access.
Note
The steps below apply only to Identity Provisioning tenants running on the SAP Cloud Identity infrastructure
(you can recognize it by its URL as it uses the host of the corresponding Identity Authentication
tenant and follows the pattern [Link] or [Link]
id>.[Link]).
If you've completed the steps below and have since migrated your bundle or standalone tenant from the SAP
BTP, Neo environment to the SAP Cloud Identity infrastructure, you will need to complete them again to use
the real-time sync feature.
If your Identity Provisioning tenant is running on the SAP BTP, Neo environment, we recommend that you
migrate to the SAP Cloud Identity infrastructure. Refer to Migrate Identity Provisioning Bundle Tenants for
more information on how to migrate your bundle or standalone tenant.
Procedure
1. Navigate to the SAP SuccessFactors Admin Center Security Center X.509 Certificates screen.
2. Click Add.
3. Complete the following required fields:
Field Description
Certificate Authority (CA) Select either SAP Cloud Root CA or External CA.
Note
This field allows you to set the expiration date up to one
year in advance. Make sure to update the date again
before your certificate expires to avoid failure of the real-
time sync.
A tile with the configuration name of your newly generated certificate will appear on the left side of the screen.
5. Click on the tile for your certificate.
6. Click Download X.509 Certificates and save the certificate to your local file system.
7. Navigate to the administration console (the url for this console is found in your Access Information
for your welcome email and has the following format: [Link] ID>.[Link]/
admin).
12. Under the Configure Authorizations section, set the Access Real-Time Provisioning API permission to ON
13. Save your changes.
14. Navigate to the SAP SuccessFactors Admin Center Integration Services Registration Center screen.
15. Complete the following fields:
Field Description
Note
The <system-id> is the ID of the SAP SuccessFactors
source system you've added in the Identity Provisioning
console and is displayed at the end of the system URL.
Authentication Key Select the configuration name of the X.509 certificate for
SAP SuccessFactors from the drop-down menu. This is the
Configuration Name that is tied to either the SAP-Cloud
Root CA or External CA certificates, as these are currently
the only Certificate Authorities supported.
Note
You can view the details of your X.509 certificates, as
well as the Configuration Name and Certificate Authority
17. Navigate to the SAP SuccessFactors Admin Center Manage Identity Authentication/Identity Provisioning
Real Time Sync screen.
18. Set Enable Real Time Sync to ON.
You've successfully enabled the real-time user sync for new hires into Identity Authentication.
Note
• How can I check wether the New Hire is synced to Identity Authentication?
The extension status indicates whether the new hire record is ready to be synced to Identity
Authentication:
• 0-Active: The new hire is synced to Identity Authentication.
• 1-Inactive: The new hire is an inactive external user and will not be synced to Identity
Authentication.
• 2-Pending: The user would not be synced to Identity Authentication though they are an active user.
This is applicable only for new hires. Employees would toggle between 0 and 1.
When the new hire is required to complete a personal data collection page, we set the status to 0
(Active) so that the user is synced to Identity Authentication and gets an Identity Authentication
Activation email. So in this case, the new hire will be notified only when their inputs are required.
• How do I distinguish between an Employee and a New Hire in Identity Authentication?
We have a new user type called Onboardee in Identity Authentication. This distinguishes the new hire
from the employee.
Note
As of 2H 2022, real-time sync for Identity Authentication is supported for new hires and not for
employees. Employees would be synced using the schedule job.
• If Identity Authentication is enabled, will all the external users be using Identity Authentication for
login by default, or can we select a set of users that have Identity Authentication enabled?
All external users should use Identity Authentication for login.
• How do I check whether a new hire is enabled with Identity Authentication?
Related Information
Setting Up the Identity Provisioning Source and Target Systems [page 128]
Integration Service Registration Center
Generating X509 Certificates
Manage Identity Authentication/Identity Provisioning Real Time Sync
While the default transformations work well when using password-based logins, you may want to further control
how data is read and received in Identity Authentication by updating the Identity Provisioning transformations.
You can edit transformations to remove test/dummy emails, define your sendmail settings and to define the
password status attribute.
Note
If your bundle or standalone tenant is running on the SAP BTP Neo environment, we recommend that
you migrate them to the SAP Cloud Identity infrastructure. Sharing the same infrastructure with Identity
Authentication brings a number of benefits as described in Tenant Infrastructure.
When updating your transformations, review both the Source and Target transformations in the console.
These transformation areas have different configurations that you can update. Select the application that matches
your SAP SuccessFactors instance (Note, for customers with multiple SAP SuccessFactors Instances using the
same Identity Authentication. Typically, you will only sync users from one SAP SuccessFactors instance to the
Identity Authentication service . No need to import the same people multiple times). Select the Transformations
button. This shows you how data gathered from SAP SuccessFactors is transformed while being read into Identity
Provisioning service. Typical edits you might make to your source transformations include fixing blank/duplicate
emails, setting passwords, setting groups.
Note
By default, Identity Provisioning provides default transformations for your SAP SuccessFactors Source and
Target systems, however, these are not the same transformations that are provided by the SAP SuccessFactors
Upgrade Center.
Please utilize the transformations listed below that were created by the Upgrade Center, as these are the most
current.
Note
To review the default transformations provided by Identity Provisioning, refer to Default Configuration for
Identity Provisioning.
Note
If you've migrated to Identity Authentication before April 24th,2020, the transformations for your Source and
Target systems are different. You can review the guide that describes how to configure these transformations
on Identity Provisioning Transformations Before April 24th, 2020 .
Default transformation for SAP SuccessFactors as the Source System created by the Upgrade Center -
Workforce SCIM API.
Code Syntax
{
"user": {
"mappings": [
{
"sourcePath": "$.schemas",
"targetPath": "$.schemas",
"preserveArrayWithSingleElement": true
},
{
"sourcePath": "$.id",
"targetVariable": "entityIdSourceSystem"
},
{
"sourcePath": "$.userName",
"targetPath": "$.userName",
"correlationAttribute": true
},
{
"sourcePath": "$.active",
"targetPath": "$.active"
},
{
"sourcePath": "$.userType",
"targetPath": "$.userType"
},
{
"sourcePath": "$.[Link]",
"targetPath": "$.[Link]",
"optional": true
},
{
"sourcePath": "$.[Link]",
"targetPath": "$.[Link]",
"optional": true
Setting Up SAP SuccessFactors with Identity Authentication and Identity Provisioning
Services
Additional Configurations for SAP SuccessFactors HCM suite with SAP Cloud Identity
84 PUBLIC Services
},
{
"sourcePath": "$.[Link]",
"targetPath": "$.[Link]",
"optional": true
},
{
"sourcePath": "$.[Link]",
"targetPath": "$.[Link]",
"optional": true
},
{
"sourcePath": "$.[Link]",
"targetPath": "$.[Link]",
"optional": true
},
{
"sourcePath": "$.[Link]",
"targetPath": "$.[Link]",
"optional": true
},
{
"sourcePath": "$.nickName",
"targetPath": "$.nickName",
"optional": true
},
{
"sourcePath": "$.title",
"targetPath": "$.title",
"optional": true
},
{
"sourcePath": "$.displayName",
"targetPath": "$.displayName",
"optional": true
},
{
"sourcePath": "$.emails",
"targetPath": "$.emails",
"optional": true,
"preserveArrayWithSingleElement": true
},
{
"sourcePath": "$.emails[?(@.primary== true)].value",
"optional": true,
"correlationAttribute": true
},
{
"sourcePath": "$.phoneNumbers",
"targetPath": "$.phoneNumbers",
"optional": true,
"preserveArrayWithSingleElement": true
},
{
"sourcePath": "$.preferredLanguage",
"targetPath": "$.preferredLanguage",
"optional": true
},
{
"sourcePath": "$.locale",
"targetPath": "$.locale",
"optional": true
},
{
"sourcePath": "$.timezone",
"targetPath": "$.timezone",
"optional": true
},
Setting Up SAP SuccessFactors with Identity Authentication and Identity Provisioning
Services
Additional Configurations for SAP SuccessFactors HCM suite with SAP Cloud Identity
Services PUBLIC 85
{
"sourcePath": "$.externalId",
"targetPath": "$.externalId",
"optional": true
},
{
"sourcePath": "$.groups",
"targetPath": "$.groups",
"optional": true,
"preserveArrayWithSingleElement": true
},
{
"sourcePath": "$['urn:ietf:params:scim:schemas:extension:enterprise:2.0:User']
['employeeNumber']",
"targetPath": "$['urn:ietf:params:scim:schemas:extension:enterprise:2.0:User']
['employeeNumber']",
"optional": true
},
{
"sourcePath": "$
['urn:ietf:params:scim:schemas:extension:enterprise:2.0:User']['department']",
"targetPath": "$
['urn:ietf:params:scim:schemas:extension:enterprise:2.0:User']['department']",
"optional": true
},
{
"sourcePath": "$
['urn:ietf:params:scim:schemas:extension:enterprise:2.0:User']['division']",
"targetPath": "$
['urn:ietf:params:scim:schemas:extension:enterprise:2.0:User']['division']",
"optional": true
},
{
"sourcePath": "$['urn:ietf:params:scim:schemas:extension:enterprise:2.0:User']
['manager']['value']",
"targetPath": "$['urn:ietf:params:scim:schemas:extension:enterprise:2.0:User']
['manager']['value']",
"optional": true
},
{
"sourcePath": "$['urn:ietf:params:scim:schemas:extension:enterprise:2.0:User']
['manager']['displayName']",
"targetPath": "$['urn:ietf:params:scim:schemas:extension:enterprise:2.0:User']
['manager']['displayName']",
"optional": true
},
{
"sourcePath": "$['urn:ietf:params:scim:schemas:extension:enterprise:2.0:User']
['manager']['$ref']",
"targetPath": "$['urn:ietf:params:scim:schemas:extension:enterprise:2.0:User']
['manager']['$ref']",
"optional": true
},
{
"sourcePath": "$
['urn:ietf:params:scim:schemas:extension:sap:2.0:User']['userUuid']",
"targetPath": "$
['urn:ietf:params:scim:schemas:extension:sap:2.0:User']['userUuid']",
"optional": true
},
Setting Up SAP SuccessFactors with Identity Authentication and Identity Provisioning
Services
Additional Configurations for SAP SuccessFactors HCM suite with SAP Cloud Identity
86 PUBLIC Services
{
"sourcePath": "$
['urn:ietf:params:scim:schemas:extension:sap:2.0:User']['groupDomains']",
"targetPath": "$
['urn:ietf:params:scim:schemas:extension:sap:2.0:User']['groupDomains']",
"optional": true,
"preserveArrayWithSingleElement": true
},
{
"sourcePath": "$
['urn:ietf:params:scim:schemas:extension:successfactors:2.0:User']
['perPersonUuid']",
"targetPath": "$
['urn:ietf:params:scim:schemas:extension:successfactors:2.0:User']
['perPersonUuid']",
"optional": true
},
{
"sourcePath": "$
['urn:ietf:params:scim:schemas:extension:successfactors:2.0:User']
['personIdExternal']",
"targetPath": "$
['urn:ietf:params:scim:schemas:extension:successfactors:2.0:User']
['personIdExternal']",
"optional": true
},
{
"sourcePath": "$
['urn:ietf:params:scim:schemas:extension:successfactors:2.0:User']
['loginMethod']",
"targetPath": "$
['urn:ietf:params:scim:schemas:extension:successfactors:2.0:User']
['loginMethod']",
"optional": true
},
{
"sourcePath": "$
['urn:ietf:params:scim:schemas:extension:successfactors:2.0:User']['isDraft']",
"targetPath": "$
['urn:ietf:params:scim:schemas:extension:successfactors:2.0:User']['isDraft']",
"optional": true
},
{
"sourcePath": "$
['urn:ietf:params:scim:schemas:extension:successfactors:2.0:User']
['customFields']",
"targetPath": "$
['urn:ietf:params:scim:schemas:extension:successfactors:2.0:User']
['customFields']",
"optional": true
},
{
"targetPath": "$
['urn:sap:cloud:scim:schemas:extension:[Link].0:User']
['hasEmbeddedAnalyticsPermission']",
"constant": false
},
{
"targetPath": "$
['urn:sap:cloud:scim:schemas:extension:[Link].0:User']
['hasEmbeddedAnalyticsPermission']",
"condition": "$['urn:ietf:params:scim:schemas:extension:sap:2.0:User']
['groupDomains'][?(@.value == 'embeddedAnalyticsAccessPermission')] empty false",
"constant": true
}
]
},
Setting Up SAP SuccessFactors with Identity Authentication and Identity Provisioning
Services
Additional Configurations for SAP SuccessFactors HCM suite with SAP Cloud Identity
Services PUBLIC 87
"group": {
"ignore": true,
"mappings": [
{
"sourcePath": "$.id",
"targetPath": "$.id",
"targetVariable": "entityIdSourceSystem"
},
{
"sourcePath": "$.schemas",
"targetPath": "$.schemas"
},
{
"sourcePath": "$.displayName",
"targetPath": "$.displayName"
},
{
"sourcePath": "$.members",
"targetPath": "$.members",
"optional": true,
"preserveArrayWithSingleElement": true
}
]
}
}
Default Transformation for Identity Authentication as the Target System created by the Upgrade Center -
Identity Authentication SCIM API Version 1.
Code Syntax
{
"user": {
"condition": "($.emails EMPTY false) && ($.[Link] EMPTY false)",
"mappings": [
{
"targetPath": "$.id",
"sourceVariable": "entityIdTargetSystem"
},
{
"targetPath": "$.schemas[0]",
"constant": "urn:ietf:params:scim:schemas:core:2.0:User"
},
{
"targetPath": "$.schemas[1]",
"constant":
"urn:ietf:params:scim:schemas:extension:enterprise:2.0:User"
},
{
"targetPath": "$.schemas[2]",
"constant":
"urn:sap:cloud:scim:schemas:extension:custom:2.0:User"
},
{
"sourcePath": "$.active",
"targetPath": "$.active",
"optional": true
},
{
"sourcePath": "$.userName",
"targetPath": "$.userName",
"optional": true
},
{
"sourcePath": "$.emails[*].value",
"targetPath": "$.emails[?(@.value)]",
Setting Up SAP SuccessFactors with Identity Authentication and Identity Provisioning
Services
Additional Configurations for SAP SuccessFactors HCM suite with SAP Cloud Identity
88 PUBLIC Services
"preserveArrayWithSingleElement": true
},
{
"sourcePath": "$.userType",
"targetPath": "$.userType",
"optional": true
},
{
"sourcePath": "$.[Link]",
"targetPath": "$.[Link]",
"optional": true
},
{
"sourcePath": "$.[Link]",
"targetPath": "$.[Link]",
"optional": true
},
{
"sourcePath": "$.[Link]",
"targetPath": "$.[Link]"
},
{
"sourcePath": "$.[Link]",
"targetPath": "$.[Link]",
"optional": true,
"ignore": true
},
{
"sourcePath": "$.addresses",
"targetPath": "$.addresses",
"optional": true,
"preserveArrayWithSingleElement": true
},
{
"sourcePath": "$.locale",
"targetPath": "$.locale",
"optional": true,
"ignore": true
},
{
"sourcePath": "$.phoneNumbers",
"targetPath": "$.phoneNumbers",
"optional": true,
"preserveArrayWithSingleElement": true
},
{
"sourcePath": "$.telephoneVerified",
"targetPath": "$.telephoneVerified",
"optional": true
},
{
"sourcePath": "$.displayName",
"targetPath": "$.displayName",
"optional": true
},
{
"sourcePath": "$.timezone",
"targetPath": "$.timeZone",
"optional": true
},
{
"sourcePath": "$['urn:ietf:params:scim:schemas:extension:enterprise:2.0:User']
['employeeNumber']",
"targetPath": "$['urn:ietf:params:scim:schemas:extension:enterprise:2.0:User']
['employeeNumber']",
"optional": true
Setting Up SAP SuccessFactors with Identity Authentication and Identity Provisioning
Services
Additional Configurations for SAP SuccessFactors HCM suite with SAP Cloud Identity
Services PUBLIC 89
},
{
"sourcePath": "$
['urn:ietf:params:scim:schemas:extension:enterprise:2.0:User']['costCenter']",
"targetPath": "$
['urn:ietf:params:scim:schemas:extension:enterprise:2.0:User']['costCenter']",
"optional": true
},
{
"sourcePath": "$
['urn:ietf:params:scim:schemas:extension:enterprise:2.0:User']['organization']",
"targetPath": "$
['urn:ietf:params:scim:schemas:extension:enterprise:2.0:User']['organization']",
"optional": true
},
{
"sourcePath": "$
['urn:ietf:params:scim:schemas:extension:enterprise:2.0:User']['division']",
"targetPath": "$
['urn:ietf:params:scim:schemas:extension:enterprise:2.0:User']['division']",
"optional": true
},
{
"sourcePath": "$
['urn:ietf:params:scim:schemas:extension:enterprise:2.0:User']['department']",
"targetPath": "$
['urn:ietf:params:scim:schemas:extension:enterprise:2.0:User']['department']",
"optional": true,
"ignore": true
},
{
"sourcePath": "$['urn:ietf:params:scim:schemas:extension:enterprise:2.0:User']
['manager']['value']",
"targetPath": "$['urn:ietf:params:scim:schemas:extension:enterprise:2.0:User']
['manager']['value']",
"optional": true,
"functions": [
{
"function": "resolveEntityIds"
}
]
},
{
"sourcePath": "$
['urn:ietf:params:scim:schemas:extension:successfactors:2.0:User']
['perPersonUuid']",
"targetPath": "$['urn:sap:cloud:scim:schemas:extension:custom:2.0:User']
['attributes'][0]['value']",
"optional": true
},
{
"targetPath": "$['urn:sap:cloud:scim:schemas:extension:custom:2.0:User']
['attributes'][0]['name']",
"condition": "$['urn:ietf:params:scim:schemas:extension:successfactors:2.0:User']
['perPersonUuid'] EMPTY false",
"constant": "customAttribute1"
},
{
"targetPath": "$.applicationId",
"constant": "%[Link]%",
"scope": "createEntity"
},
{
Setting Up SAP SuccessFactors with Identity Authentication and Identity Provisioning
Services
Additional Configurations for SAP SuccessFactors HCM suite with SAP Cloud Identity
90 PUBLIC Services
"targetPath": "$.sendMail",
"constant": "false",
"scope": "createEntity"
},
{
"targetPath": "$.sendMail",
"condition": "$.userType == 'ONBOARDEE'",
"constant": "true",
"scope": "createEntity"
},
{
"targetPath": "$.emailTemplateSetId",
"condition": "$.userType == 'ONBOARDEE'",
"ignore": true,
"constant": "%[Link]%",
"scope": "createEntity"
},
{
"targetPath": "$.mailVerified",
"constant": "true",
"scope": "createEntity"
},
{
"targetPath": "$.mailVerified",
"condition": "$.userType == 'ONBOARDEE'",
"constant": "false",
"scope": "createEntity"
},
{
"targetPath": "$.passwordStatus",
"constant": "disabled",
"scope": "createEntity"
},
{
"targetPath": "$.passwordStatus",
"condition": "$.userType == 'ONBOARDEE'",
"constant": "enabled",
"scope": "createEntity"
},
{
"targetPath": "$.password",
"ignore": true,
"constant": "%[Link]%",
"scope": "createEntity"
},
{
"targetPath": "$.sourceSystem",
"condition": "$['urn:ietf:params:scim:schemas:extension:successfactors:2.0:User']
['loginMethod'] == 'PWD'",
"ignore": true,
"constant": "%[Link]%",
"scope": "createEntity"
},
{
"targetPath": "$.sourceSystemId",
"condition": "$['urn:ietf:params:scim:schemas:extension:successfactors:2.0:User']
['loginMethod'] == 'PWD'",
"ignore": true,
"constant": "%[Link]%",
"scope": "createEntity"
}
]
},
"group": {
"mappings": [
{
Setting Up SAP SuccessFactors with Identity Authentication and Identity Provisioning
Services
Additional Configurations for SAP SuccessFactors HCM suite with SAP Cloud Identity
Services PUBLIC 91
"targetPath": "$.id",
"sourceVariable": "entityIdTargetSystem"
},
{
"sourcePath": "$.displayName",
"targetPath": "$.displayName"
},
{
"sourcePath": "$.displayName",
"targetPath": "$
['urn:sap:cloud:scim:schemas:extension:custom:2.0:Group']['name']",
"scope": "createEntity",
"functions": [
{
"function": "replaceAllString",
"regex": "[\\s\\p{Punct}]",
"replacement": "_"
}
]
},
{
"sourcePath": "$
['urn:sap:cloud:scim:schemas:extension:custom:2.0:Group']['name']",
"targetPath": "$
['urn:sap:cloud:scim:schemas:extension:custom:2.0:Group']['name']",
"optional": true,
"scope": "createEntity"
},
{
"sourcePath": "$
['urn:sap:cloud:scim:schemas:extension:custom:2.0:Group']['description']",
"targetPath": "$
['urn:sap:cloud:scim:schemas:extension:custom:2.0:Group']['description']",
"optional": true
},
{
"sourcePath": "$.members[*].value",
"targetPath": "$.members[?(@.value)]",
"optional": true,
"preserveArrayWithSingleElement": true,
"functions": [
{
"function": "resolveEntityIds"
}
]
}
]
}
}
Note
After editing your transformations, run an sync job in the Identity Provisioning service so that your changes are
loaded into your integration.
Configure password migration from your SAP SuccessFactors instance to your Identity Authentication tenant.
Prerequisites
• You’ve provisioned the users from SAP SuccessFactors to the Identity Authentication service.
• Users provisioned to Identity Authentication have the sourceSystem attribute with value 100, and the
sourceSystemId with value equal to theIdentity Authentication SAP SuccessFactors company ID.
• Configure your IP address ranges for both your service and Identity Provisioning service. Find the IP address
ranges listed in the Setting Up an API User for Sync Jobs in SAP SuccessFactors topic. See the Related
Information section below.
Context
Configure your SAP SuccessFactors passwords (authentication provider) to integrate with the Identity
Authentication service (target system) so that your users will not need to create new passwords once the
integration is complete.
Procedure
1. Configure SAP SuccessFactors instance as a password authentication provider in your Identity Authentication
tenant as it is described in the Configure Authentication Provider To Migrate User Passwords from SAP
SuccessFactors Systems to Identity Authentication topic in the Related Information section below.
Remember
When completing the configuration in step 1 above, once you navigate to SAP Cloud Identity Services
Identity Providers Authentication Providers Create Configuration :
• If you choose the X.509 certificate as your Authentication Type, make sure the Password Validation URL
field contains .cert right after the subdomain part of the regular URL according to the following pattern:
[Link]
• You'll also need to upload that certificate into SAP SuccessFactors to register Identity Authentication
for incoming calls using X.509 certificate-based authentication. Refer to Upgrade to X.509
Certificate-Based Authentication for Incoming Calls for the steps to complete the upload.
2. Modify the Identity Provisioning configuration responsible for writing users in Identity Authentication. Go to
Target Systems (your Identity Authentication target system configuration) Transformations tab. In
the Users Mappings section, include the following elements to map the sourceSystemId (where the
SFCompanyID is your instance company ID).
Setting Up SAP SuccessFactors with Identity Authentication and Identity Provisioning
Services
Additional Configurations for SAP SuccessFactors HCM suite with SAP Cloud Identity
Services PUBLIC 93
Options Sample Code
{
"constant": "100",
"targetPath": "$.sourceSystem",
"scope": "createEntity"
}
You also need to update the following elements, so the users don't receive activation emails:
Sample Code
{
"constant": "enabled",
"targetPath": "$.passwordStatus",
"scope": "createEntity"
},
{
"constant": "false",
"targetPath": "$.sendMail",
"scope": "createEntity"
},
{
"constant": "true",
"targetPath": "$.mailVerified",
"scope": "createEntity"
},
You also need to update the following elements, so the users don't receive activation emails:
Sample Code
{
"constant": "enabled",
"targetPath":
"$['urn:ietf:params:scim:schemas:extension:sap:2.0:User']
['passwordDetails']['status']"
},
{
"constant": false,
"targetPath": "$
['urn:ietf:params:scim:schemas:extension:sap:2.0:User']['sendMail']",
"scope": "createEntity"
},
{
"constant": true,
"targetPath":
"$['urn:ietf:params:scim:schemas:extension:sap:2.0:User']
['mailVerified']",
"scope": "createEntity"
},
Note
• To determine the API version you are using, refer to Identity Provisioning Service in the Neo
Environment - Identity Authentication.
• For both examples above, if you have users that were already synced into
Identity Authentication, you'll need to remove the "scope": "createEntity"
transformation from beneath either the "targetPath": "$.passwordStatus" or "targetPath":
"$['urn:ietf:params:scim:schemas:extension:sap:2.0:User']['passwordDetails']['status']" elements
(depending on which SCIM API Version you are using), and then run the Read job. Once the job is
complete, you can then add "scope": "createEntity" back to the respective password mapping.
This ensures that on the next provisioning jobs, Identity Provisioning will always update the password
status of your users, even if they get locked in Identity Authentication. It also ensures that the migrated
passwords will be set first in Identity Authentication when a user logs in for the first time to one of
their assigned applications (ex. SAP SuccessFactors or User Profile). For more information refer to
Passwords are Migrated from SAP SuccessFactors .
Related Information
If you have users with duplicated dummy emails, you need to implement the below transformation change to be
able to sync those users.
Context
The following code sets email addresses to username + @[Link]. This guarantees that the email is
unique. You are not required to use sap-test .de. However, we encourage you to use [Link]. This test email
address does not route to an actual email server. If you use your own email domain, the server will need to reject all
the emails.
Procedure
Sample Code
{
"sourcePath": "$.email",
"targetPath": "$.emails[0].value"
},
5. Add the dummy email transformation code below underneath the above email transformation:
Note
The following code below looks for emails in the format no-email@[Link]. Replace this email with your
own dummy email addresses. You can add multiple conditions by using the || (OR) operator.
Sample Code
{
"condition": "($.email == 'no-email@[Link]')",
"sourcePath": "$.[Link]",
"targetPath": "$.emails[0].value",
"functions": [
{
"type": "concatString",
"suffix": "@[Link]"
}
]
},
Enable the SendMail transformation code if you want users receive email notifications when they’re created in
Identity Authentication.
Enter the following code on the Identity Provisioning Administration Console Target Systems Your Identity
Authentication Target System Transformations tab.
Sample Code
"constant": "true",
"targetPath": "$.sendMail",
"scope": "createEntity"
Sample Code
"constant": "false",
"targetPath": "$.sendMail",
"scope": "createEntity"
When users first log in with their username and password, when enabled, the Identity Authentication Service does
a one-time verification that the password entered matches the existing SAP SuccessFactors Password.
Enter the following code on the Identity Provisioning Administration Console Target Systems Your Identity
Authentication Target System Transformations tab.
Sample Code
"constant": "enabled",
"targetPath": "$.passwordStatus",
"scope": "createEntity"
Set to disabled if your users are receiving welcome emails and resetting their passwords before first login.
Sample Code
"constant": "disabled",
"targetPath": "$.passwordStatus",
"scope": "createEntity"
Use the PreferredLanguage transformation code if you want to set the language to be used for the activation
email you send to your users.
You can use the following transformation configuration to set the preferred language in the Identity Provisioning
Administration Console Source Systems Select your Source System Transformations .
Sample Code
Example
If you want to transfer the value from your SAP SuccessFactors system, add the following code in the User
and Mappings section:
Sample Code
{
"sourcePath": "$.preferredLanguage",
"optional": true,
"targetPath": "$.locale"
},
Example
Setting the constant to a specific locale is useful if all your activation emails are for only one language. (See the
link below for details on all supported locales.) If you want to set a constant value for all users, add the following
code in the User and Mappings section:
Sample Code
{
"constant": "es_ES",
"targetPath": "$.locale"
}
Remember
Unless you define another default locale for your company, U.S. English is the default locale for all users. If no
translation is present, text appears in the company's default locale. Refer to the Related Information link below
for the SAP SuccessFactors Languages and Locales topic in the Managing Languages and UI Labels guide.
Related Information
We recommend that you choose one of the recommended options for assigning an initial password:
• Option 1: You can use the password that's initially set up during the user sync in the Identity Provisioning
service
• Option 2: You can use the SAP SuccessFactors user attribute value as a password
• Option 3: You can set an initial password by combining last name with an internal userID, something that only
the employee aware of.
You can use the following transformation configuration to set the initial password to the SAP SuccessFactors
Employee ID attribute under SAP Cloud Identity Services Identity Provisioning Source Systems (select your
SAP SuccessFactors source system) Transformations Switch to JSON Editor(icon) Edit .
Note
To perform this operation when the OData API is in use in Identity Provisioning, use the elements below:
Sample Code
Example
In the user mappings section of the JSON, add the following code:
Sample Code
{
"sourcePath": "$.empId",
"targetPath": "$['urn:sap:cloud:scim:schemas:extension:sfsf:2.0:User']
['empId']"
}
Sample Code
Example
In Target Systems (your Identity Authentication target system) Switch to JSON Editor (icon) Edit ,
under the user mappings section of the JSON, add the following code:
{
"constant": "false",
"targetPath": "$.sendMail",
"scope": "createEntity"
},
{
"constant": "true",
Setting Up SAP SuccessFactors with Identity Authentication and Identity Provisioning
Services
Additional Configurations for SAP SuccessFactors HCM suite with SAP Cloud Identity
Services PUBLIC 99
"targetPath": "$.mailVerified",
"scope": "createEntity"
},
{
"constant": "initial",
"targetPath": "$.passwordStatus",
"scope": "createEntity"
}
{
"sourcePath": "$['urn:sap:cloud:scim:schemas:extension:sfsf:2.0:User']
['empId']",
"targetPath": "$.password",
"scope": "createEntity"
}
Tip
You can use a different SAP SuccessFactors user attribute by changing the attribute name empId to the name
of the attribute that you want to use but you must use the name of the attribute as it's defined in the SAP
SuccessFactors OData API or Workforce SCIM API, depending on which one you are using. Additionally, ensure
that this attribute is part of the list in [Link] property.
To determine the API version you are using, check the [Link] parameter in the Identity Provisioning
Source Systems Properties tab. Based on the parameter value:
• 1 = OData API
• 2 = SCIM API
Note
To perform this operation when the SCIM API is in use in Identity Provisioning, use the elements below:
Sample Code
In Source Systems (your SAP SuccessFactors source system) Transformations Switch to JSON Editor
(icon) Edit , under the user mappings section of the JSON, add the following code:
{
"sourcePath": "$['urn:ietf:params:scim:schemas:extension:enterprise:2.0:User']
['employeeNumber']",
"targetPath": "$['urn:ietf:params:scim:schemas:extension:enterprise:2.0:User']
['employeeNumber']"
}
Sample Code
In Target Systems (your Identity Authentication target system) Transformations Switch to JSON Editor
(icon) Edit , under the user mappings section, add the following code:
{
"constant": "false",
"targetPath": "$.sendMail",
"scope": "createEntity"
},
Setting Up SAP SuccessFactors with Identity Authentication and Identity Provisioning
Services
Additional Configurations for SAP SuccessFactors HCM suite with SAP Cloud Identity
100 PUBLIC Services
{
"constant": "true",
"targetPath": "$.mailVerified",
"scope": "createEntity"
},
{
"constant": "initial",
"targetPath": "$.passwordStatus",
"scope": "createEntity"
},
{
"sourcePath": "$['urn:ietf:params:scim:schemas:extension:enterprise:2.0:User']
['employeeNumber']",
"targetPath": "$.password",
"scope": "createEntity"
}
You can configure the Identity Provisioning transformation to set the user's initial password by combining multiple
SAP SuccessFactors user attributes, such as their last name and employee number. This method increases
password uniqueness and lowers the risk of using easily guessed passwords.
Before you begin, ensure that the attributes you want to use (for example, familyName and employeeNumber) are
included in the [Link] property of your source system configuration.
The following example demonstrates how to create an initial password by concatenating the user's last name and
employee number.
Example
In Target Systems (your Identity Authentication target system) Transformations Switch to JSON Editor
(icon) Edit , under the user mappings section of the JSON, add the following code:
Note
To perform this operation when the OData API is in use in Identity Provisioning, use the elements below:
Sample Code
{
"sourcePath": "$.empId",
"targetVariable": "employeeId"
},
{
"sourcePath": "$.lastName",
"targetPath": "$.password",
"functions": [
{
"type": "concatString",
"suffix": "${employeeId}"
}
],
"scope": "createEntity"
Setting Up SAP SuccessFactors with Identity Authentication and Identity Provisioning
Services
Additional Configurations for SAP SuccessFactors HCM suite with SAP Cloud Identity
Services PUBLIC 101
}
Note
To perform this operation when the SCIM API is in use in Identity Provisioning, use the elements below:
Sample Code
{
"sourcePath": "$['urn:ietf:params:scim:schemas:extension:enterprise:2.0:User']
['employeeNumber']",
"targetVariable": "empNum"
},
{
"sourcePath": "$.[Link]",
"targetPath": "$.password",
"functions": [
{
"type": "concatString",
"suffix": "${empNum}"
}
],
"scope": "createEntity"
}
Migrate an SAP SuccessFactors Instance where SSO is configured with SAML-based Corporate Identity Provider
(IDP).
After migration, users who log in using SSO will be redirected through the SAP Cloud Identity Services - Identity
Authentication service tenant to the Corporate IDP to have the same user experience. If there are also password-
based log in users (Partial SSO is enabled), they'll start using the Identity Authentication tenant for authentication.
Using the new Identity Authentication solution integrated with SAP SuccessFactors application you can configure
delegated authentication to an existing Corporate Identity Provider (using SAML proxy approach). In doing this,
the user accesses the SAP SuccessFactors application and will be redirected through the Identity Authentication
service to the Corporate IDP, which will provide SSO authentication. Using this method allows you to keep your
current user experience but allows you to also benefit from the advanced security features provided by Identity
Authentication service, such as 2-factor authentication. Concurrently, you can use the Identity Authentication
service tenant for authentication of users that are currently using password-based logins and are not part of
the corporate environment, such as for partners, third parties, and consultants. In addition, you can configure
Risk-Based authentication rules in Identity Authentication, so that under different conditions, access to the SAP
SuccessFactors application could be denied, or second factor of authentication could be requested.
Setup Identity Provisioning Transformation rules for the scenario in which your Identity Authentication service
tenant is integrated with only one Corporate Identity Provider (IdP) and SuccessFactors is only accessed through
the IdP.
Prerequisites
Establishing a trust between the Corporate Identity Provider (IdP) and your Identity Authentication service tenant
is a separate step that you need to complete. Refer to Configure Trust with Corporate Identity Provider in the
Related Information section.
Procedure
1. In the Identity Provisioning configuration responsible for writing users in Identity Authentication, ensure that
the transformation rules follow the sample below. Go to the Identity Provisioning Administration Target
Systems (your Identity Authentication target system configuration) Transformations tab.
2. In the Users Mappings section, make sure the transformation follows the pattern below, to have
sendMail as false so that emails are not sent when users are created.
Sample Code
{
"constant": "false",
"targetPath": "$.sendMail",
"scope": "createEntity"
},
{
"constant": "true",
"targetPath": "$.mailVerified",
"scope": "createEntity"
}
Related Information
Migrate your SAP SuccessFactors instance when some of your users have SSO-based login and you have external
users with SAP SuccessFactors credentials for application access.
At this final step, you should have delegated authentication configured to your Corporate Identity Provider (IdP)
for the SSO-based login users (Corporate Users). While your password-based login users (External Users) use the
Identity Authentication service tenant for authentication. You have two options to configure this setup:
Option A: Define the Corporate Identity Provider as Default Authentication IdP for the SAP SuccessFactors
Application
As prerequisite for both options you should have established SAML trust between the Identity Authentication
tenant and the Corporate IDP.
Using this option, your corporate users can use the SAP SuccessFactors application URL to access the instance.
They're redirected automatically through Identity Authentication to the Corporate IdP. In addition, your external
users can use a special link to Identity Authentication (for IdP-Initiated authentication flow) to log in with Identity
Authentication credentials and to be redirected to the SAP SuccessFactors application.
When you upgrade to Identity Authentication, the flag for partial SSO is disabled, by default. You can use partial
SSO by sending users in your system through the Identity Authentication Service.
Related Information
Using this option, all users (corporate and external) can use the SAP SuccessFactors application URL to access the
instance and based on conditional authentication rules some of them (corporate users) will be redirected to the
Corporate IDP and others (externals) will authenticate in Identity Authentication with username and password.
1. Configure in Identity Authentication conditional authentication rules for the SAP SuccessFactors application
based on user group, user type or IP-range.
2. (optional) If you wish to use rules, based on user group or user type, modify the Identity Provisioning
transformations to ensure that the corporate and external users can have been assigned different user groups
or user types.
To differentiate the users in the Identity Provisioning transformation you can use SAP SuccessFactors user
attributes, such as loginMethod user but you must first ensure that this attribute can be used in the Identity
Authentication Target system configuration.
During user provisioning, you can assign different user types as listed:
Tip
You can use a different SAP SuccessFactors user attribute by changing the attribute name empId to the name
of the attribute that you want to use but you must use the name of the attribute as it's defined in the SAP
SuccessFactors OData API or SCIM API, depending on which one you are using. Additionally, ensure that this
attribute is part of the list in [Link] property.
The default Target SAP SuccessFactors system configuration in Identity Provisioning defines that all users are of
type employee using the following element:
Sample Code
{
"constant": "employee",
"targetPath": "$.userType"
},
Note
The below elements will only work when the Identity Authentication SCIM API Version 1 is in use in Identity
Provisioning. They will not work when the Identity Authentication SCIM API Version 2 is in use.
To assign user groups when the Identity Authentication SCIM API Version 2 is in use, refer to Enabling Group
Assignment.
To determine the API version you are using, refer to Identity Provisioning Service in the Neo Environment-
Identity Authentication.
Sample Code
{
"condition": "$.[Link] =='PWD'",
"constant": "partner",
"targetPath": "$.userType"
},
External and Internal users can be assigned to an Identity Authentication user group, which can be used for
conditional authentication rules.
Note
The user group should exist already in the Identity Authentication tenant.
With the following element added in the Identity Authentication Target system configuration in Identity
Provisioning, you will have assigned all users with loginMethod - PWD to a dedicated Display Name group in Identity
Authentication:
Remember
Make sure that the constant value matches the group Display Name that you've created in SAP Cloud
Identity Services Groups Display Name . The group ID must not be used as the value. The example below
is what would be entered if the group Display Name was Password Login Users.
Sample Code
{
"condition": "$
['urn:sap:cloud:scim:schemas:extension:sfsf:2.0:User']['loginMethod'] == 'PWD'",
"constant": "Password Login Users",
"targetPath": "$.groups[0].value"
},
You can change the redirect URL for your users when you update the transformation code in your SAP Cloud
Identity Services - Identity Provisioning service.
By default, user provisioning, in the Identity Provisioning service, replicates all SAP SuccessFactors active users
in your system. For new users, who are created in SAP SuccessFactors, you must also create them in the Identity
Authentication service so that they receive the activation email that will allow them to set a password and to access
the SAP SuccessFactors application. With the default configurations to your Identity Provisioning service, any
newly created users are redirected to the Identity Authentication service's User Profile page after they activate their
account and reset their password. This URL, [Link]
can be customized by adding the following code to your Identity Provisioning's Target System's Transformation.
Identity Provisioning Administration Target Systems {your Identity Authentication target system configuration}
Transformations User Mappings
In the Users Mappings section, include the following element if you are using the Identity Authentication API
Version 1:
Sample Code
{
"constant": "[Link]
"targetPath": "$.targetUrl",
"scope": "createEntity"
}
Sample Code
{
"constant": " [Link]
"targetPath": "$
['urn:ietf:params:scim:schemas:extension:sap:2.0:User']['targetUrl']",
"scope": "createEntity"
}
In addition to updating the transformation, ensure that the following attributes contain the following values:
Related Information
The SAP Cloud Identity Services - Identity Authentication service provides you with secure authentication and
single sign-on for users in the cloud.
The Identity Authentication service provides you with simple and secure cloud-based access to business
processes, applications, and data. It simplifies your user experience through state-of-the-art authentication
mechanisms, secure single sign-on, on-premise integration, and convenient self-service options. The Identity
Authentication service functions as both a Service Provider (a resource a user is logging in to) and as an Identity
Provider (an Identity Management tool that can authenticate a user and send a logon to a Service Provider).
Note
If your Identity Authentication tenant was created before December 9, 2022, we highly recommend that
you first upgrade to Mutual Transport Layer Security (mTLS) authentication between Identity Authentication
and SAP SuccessFactors before completing any console tasks, as this is our most secure method of
authentication.. As the Identity Authentication Administrator, an email is sent to you with a link to log on to
the administration console.
To complete this upgrade, refer to Upgrade to X.509 Certificate-Based Authentication for Incoming Calls
The Identity Authentication service Administrator system is created when you initiate the upgrade process in the
SAP SuccessFactors Upgrade Center
Caution
. As the IdentIf you haven’t received an email with a link to your Identity Provisioning system within
approximately two hours, contact SAP Cloud Support.
Note
In the Identity Authentication Applications configuration, there is a setting to choose Signing Options within
the SAML 2.0 Configuration. After our 1H 2021 Production Release, SHA-256 will be selected as the signing
mechanism for SAP SuccessFactors HCM suite, SAP Analytics Cloud (People Analytics Report Stories), and
Internal Career Site applications for better security. Please don’t change the setting back to SHA-1. This change
will get rolled out in a phased manner, on your behalf, after the 1H 2021 Production Release.
The Identity Authentication service gives you access to the following login methods. Configuring these login
methods are optional and depends on how you want your users to log into their SAP SuccessFactors systems.
Configure password policy settings. If the default standard password policy About Password Policies in the Identity
Authentication service
doesn't meet your requirements, you
can:
Set up single sign-on (SSO). If you want some or all users to access Process to Set Up Single Sign-On with
your system using single sign-on (SSO), Identity Authentication [page 114]
you need to set it up.
Create user groups If needed, you can set up authentication About User Groups in the Identity Au-
thentication service
filtering so that different groups of users
are authenticated differently. Create user
groups so that you can apply different
authentication rules for each group. User
groups can be assigned manually or dur-
ing the user sync with Identity Provision-
ing service.
Configure conditional authentication By default, conditional authentication is About Conditional Authentication in the
Identity Authentication service
configured to send all users to Identity
Authentication-based logon. To set up
single sign-on, you need to configure
conditional authentication rules to send
users to your corporate identity provider
(IdP).
Configure risk-based authentication By default, risk-based authentication is About Risk-Based Authentication in the
Identity Authentication service
configured to send all users with Iden-
tity Authentication-based logon to user-
name/password logon.
Enable two-factor authentication If needed, you can choose to enable About Two-Factor Authentication in Iden-
tity Authentication service
two-factor authentication as part of your
password-based logins.
Configure email templates You can change the default email tem- About Email Notification Templates in
Identity Authentication service
plates used to generate email notifica-
tions for events such as new users or
password reset.
Branding and theming You can change the default colors and About Branding in Identity Authentica-
tion
theming used on Identity Authentication
pages such as the logon and password
reset pages.
Related Information
As a tenant administrator, you can create a new user in the administration console for Identity Authentication
service.
Prerequisites
You’re authorized as an admin with the Manage Users access in the Identity Authentication Service.
Setting Up SAP SuccessFactors with Identity Authentication and Identity Provisioning
Services
Additional Configurations for SAP SuccessFactors HCM suite with SAP Cloud Identity
110 PUBLIC Services
Note
Typically, you'll use the sync job in the Identity Provisioning Administration Console to add users to the system
but you can add individual users to the Identity Authentication Service as well.
Procedure
1. Log on to the Identity Authentication Service using the link from your registration email.
2. Select User Management
3. Select Add User.
4. Enter First Name, Last Name, and Email Address.
5. Enter Login Name. This log on name must match the exact username of the user in the SAP SuccessFactors,
including case, unless Non Case Sensitive Usernames is selected in the Admin Center Manage SAML SSO
Settings page.
6. Select the Employee as the User Type.
7. Select one of the following options:
Option Description
Send activation e-mail The user receives an e-mail with instructions how to activate the user account.
Set initial password The tenant administrator sets the password for the user.
Note
The user is prompted to reset the password during the first authentication.
Results
The new admin can access the SAP SuccessFactors instance using Identity Authentication service.
As a tenant administrator, optionally, you can create new user groups in the tenant using the administration
console for Identity Authentication Service. You may want to do this if you intend to use multiple methods of
authentication for your users.
Prerequisites
Your user is authorized with the Manage Groups access in the Identity Authentication Service.
Context
You may want to create groups and assign users according to the logon method you want each group to use.
Watch the video to learn how and when to create user groups in Identity Authentication.
Procedure
While you can add users to your groups individually, you can add users in bulk using Identity Provisioning
Transformations.
8. Select User Groups.
9. Choose Assign Groups.
10. Select the groups you want to add the user to.
11. Save your changes.
All SAP Cloud Identity Services - Identity Authentication instances are preconfigured with password-based logins
by default. If you intend to use password or two-factor logins, review and update your password policy settings.
If the default standard password policy doesn't meet your requirements, you can:
Note
If your organization uses single sign-on (SSO) or other nonpassword logon options, such as social sign-on,
these password policy settings are ignored.
Related Information
You can set up two-factor authentication if you intend to use multiple layers of authentication for your users.
If you intend to use two-factor authentication, setup password policies and additional two-factor settings. You'll
need to sort your users using risk-based authentication and to register their token generator. We support SAP
Authenticator, Google Authenticator, and other apps that follow the same standard.
Related Information
You can use email templates and branding themes to support your company's themes.
Email Templates
The SAP Cloud Identity Services - Identity Authentication service has email templates for new users, password
resets, etc. You’ll want to review these and customize to meet your needs. In addition, you’ll want to be sure to NOT
enable the internal SuccessFactors version of these emails. That includes the Welcome Message when importing
new users. There are predefined email templates for user and administrator-related emails. You can also create
a custom template set. Unless you have another way to communicate the initial logon URL to your users, we
recommend you add a basic logon URL to the New User email.
The Identity Authentication service supports basic settings for themes and branding. You can add logos, change
colors etc. to the login page and others in Identity Authentication. You will want to review and set them up to meet
your needs. SAP Help has more information about Themes and Branding.
Related Information
Learn what you need to do to set up single sign-on (SSO) for your SAP SuccessFactors system so that it uses the
SAP Cloud Identity Services - Identity Authentication service.
Related Information
Setting up your corporate IDP in SAP Cloud Identity Services - Identity Authentication service requires that you
create a link to your corporate IDP. When you create the IDP, you must also and upload your metadata file so that
the metadata exchange occurs between the SAP SuccessFactors Identity Authentication and the company IDP.
Prerequisites
You’ve received the customer metadata file from your company's Corporate IDP team.
Context
Watch the video or follow the procedure to configure third party Corporate IDP.
Procedure
1. Log on to the Identity Authentication Service using the link from your registration email.
2. Go to Identity Providers.
3. Go to Corporate Identity Providers.
4. Choose Add.
Setting Up SAP SuccessFactors with Identity Authentication and Identity Provisioning
Services
Additional Configurations for SAP SuccessFactors HCM suite with SAP Cloud Identity
Services PUBLIC 115
5. Provide a unique name for your corporate IDP and save your changes.
6. Choose SAML 2.0 Configuration.
7. Browse for the metadata from your corporate IDP.
You should have received the metadata file from your company's corporate identity team.
8. Import the metadata.
9. Select the SAML 2.0 Compliant as your identity provider type by clicking Identity Provider Type from your
Identity Provider screen.
Results
When you've uploaded your metadata file, the fields for Name (Issuer), Single Logout Endpoint , and Certificate are
automatically populated.
The metadata file that you upload should be given to your company's corporate identity provider team in order to
complete your identity authentication setup process.
Procedure
1. Log on to the Identity Authentication Service using the link from your registration email.
2. Go to Applications and Resources.
3. Go to Tenant Settings.
4. Go to SAML 2.0 Configuration.
5. Select Download MetaData File and save the file.
6. Give this file to your corporate identity provider team so that they can import this file into your corporate
identity provider. This enables a connection to your Identity Authentication service.
7. Set up the Identity Provider to send: Name ID Format Unspecified
Note
The value in the Name ID should match the SAP SuccessFactors Username.
When you upgrade to Identity Authentication, the flag for partial SSO is disabled, by default. You can use partial
SSO by sending users in your system through the Identity Authentication Service.
Context
Procedure
The setting only appears if, by default you have the Identity Provider (SSO) set up, if you don't have Single
Sign-on, you do not need this feature.
If you are using Authentication Rules, you selected Identity Authentication as the Default Authenticating
Identity Provider and you must change the Default Authenticating Identity Provider your SSO. After you've
done this, the section Allow Identity Authentication Users Log displays.
7. Choose Save.
8. Copy the URL below the checkbox and provide that for your non-SSO users to log in.
The URL look similar to the following: [Link] Authentication tenant URL>/saml2/idp/
sso?sp=<SF entity ID>&idp=[Link] Authentication tenant URL>
9. If on step 5, you changed the Default Authenticating Identity Provider to your SSO, you can change back and the
URL will still work.
The SSO SAML signing certificate provided by SAP SuccessFactors HCM suite to other applications such as IDPs
like Identity Authentication is due to expire on June 2, 2025. The SAP SuccessFactors HCM suite public API allows
applications to retrieve the SAML Service Provider metadata for their company which also includes the renewed
signing certifcate. When certificate expiration is detected, the API is called by the client to get the new certificate
and update the SAML setting in the application.
Setting Up SAP SuccessFactors with Identity Authentication and Identity Provisioning
Services
Additional Configurations for SAP SuccessFactors HCM suite with SAP Cloud Identity
Services PUBLIC 117
GET SAML Service Provider Metadata
Request
Operation Query
Response
Sample Code
<md:EntityDescriptor xmlns:md="urn:oasis:names:tc:SAML:2.0:metadata"
xmlns:ds="[Link]
xmlns:saml="urn:oasis:names:tc:SAML:2.0:assertion" entityID="https://
[Link]/<company_id>">
<md:SPSSODescriptor AuthnRequestsSigned="true"
protocolSupportEnumeration="urn:oasis:names:tc:SAML:2.0:protocol">
<md:KeyDescriptor>
<ds:KeyInfo>
<ds:X509Data>
<ds:X509Certificate>MIICDTCCAXagAwIBAgIETAl/
KDANBgkqhkiG9w0BAQUFADBLMQswCQYDVQQGEwJVUzEbMBkGA1UEChMSU3VjY2Vzc2ZhY3RvcnMuY29tM
QwwCgYDVQQLEwNPcHMxETAPBgNVBAMTCFNGIEFkbWluMB4XDTEwMDYwNDIyMzMxMloXDTI1MDYwMjIyMz
MxMlowSzELMAkGA1UEBhMCVVMxGzAZBgNVBAoTElN1Y2Nlc3NmYWN0b3JzLmNvbTEMMAoGA1UECxMDT3B
zMREwDwYDVQQDEwhTRiBBZG1pbjCBnzANBgkqhkiG9w0BAQEFAAOBjQAwgYkCgYEAkS3xlwL9v/
5kHmfnW0fy2JzIDvHKK4TmkZYHN+JHBLRRzNtlGo1f4yUseMjVn4RF1W11uEqnBySokXv5FYoPd1guJ1X
t3u2Xnj52l/
lG4S7ichsPwF3ddDk+pWbKF29Ixt0iBN+keknSRyNGdh9jtOekCg6xq4i4YndwKCucABUCAwEAATANBgk
qhkiG9w0BAQUFAAOBgQBzhTmtBbnXpT1aTWDa3PRUx8fWTx/
oPjL7xP+WeoTJZmeY4N1c6Q3aZ+u+MhxvmhyDTGo43pyyFVBQjiFzrZUEAAPUrLr7M0e4kGULhxE1p2jn
BNfzmVYK397+QPHD2kN/BIzVcMBFsrS+fpdDGWnzj1hjuGLNO/XuPO9eSBRkZA==</
ds:X509Certificate>
</ds:X509Data>
</ds:KeyInfo>
</md:KeyDescriptor>
<md:SingleLogoutService
Binding="urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect"
Location="[Link]
company=<company_id>&RelayState=sf" ResponseLocation="https://
[Link]/saml2/LogoutServiceHTTPRedirectResponse?
company=<company_id>"/>
<md:AssertionConsumerService Binding="urn:oasis:names:tc:SAML:2.0:bindings:HTTP-
POST" Location="[Link]
SAMLAssertionConsumer?company=<company_id>" index="0" isDefault="true"/>
</md:SPSSODescriptor>
<md:Organization>
<md:OrganizationName xml:lang="en">SuccessFactors</md:OrganizationName>
<md:OrganizationURL xml:lang="en">[Link]
md:OrganizationURL>
</md:Organization>
</md:EntityDescriptor>
Note
Remember
After you've renewed your SSO signing certificate, go to the Admin Center Manage SAML SSO Settings
page and select the SSO Certificate Renewed checkbox to record your certificate renewal in the SAP
SuccessFactors HCM suite.
The SSO SAML signing certificate provided by SAP SuccessFactors HCM suite to other applications such as IDPs
like Identity Authentication is due to expire on June 2, 2025. The SAP SuccessFactors HCM suite public API allows
applications to retrieve the renewed signing certifcate, without the additional SAML metadata. When certificate
expiration is detected, the API is called by the client to get the new certificate and update the SAML setting in the
application.
Request
Operation Query
Response
Sample Code
----BEGIN CERTIFICATE-----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 Up SAP SuccessFactors with Identity Authentication and Identity Provisioning
Services
Additional Configurations for SAP SuccessFactors HCM suite with SAP Cloud Identity
Services PUBLIC 119
A4IBgQAuk89TS/voBA2my983KOU7Ey3fbw5pllfuD8YAkmCNNwH6KCjx/QbQGnK445+XtSqbZGXz
m275sBqlqB+gSOGpj9Bt9wU7iiecCK1JI215N3YhZrRO/lVfcxOh9L45rxOx3cHbHNJMV3Xg5jIl
6pwFUGaBw9DakVN15lwEIH+xplmaWLKqmX/do5KWVAnjSDdrFztjWPEw4En/2Te2xldEvDi0J3Je
m2E96dgKPcf/Y7A722DFu78aP/TDqr4kk2a950EbEF4Jhtxp71cN1IdxypD2MU3St8hFySaChFUl
S9Z26nfqjLhRWed3cJ+ZGq7V+o4fOdd4qjmlwhgK0fHRDCetXKhvaiVurFwqEdw7aTC0KdCv5wqX
wBrYtcmXa7JZ3Ug+Bod5J9OLfOXiWasCfoN9/6/0/hBxuyGCkZpkeAT6f0nNklWvaedz9ooAyPwU
hTnrOUwNe2fbStAqJrgzp1q6JHvrazHUKBDMMrBx6xw/OYKtFrJl7nO6JZnkWDI=
-----END CERTIFICATE-----
Note
Remember
After you've renewed your SSO signing certificate, go to the Admin Center Manage SAML SSO Settings
page and select the SSO Certificate Renewed checkbox to record your certificate renewal in the SAP
SuccessFactors HCM suite.
Caution
Ensure that the new SAP SuccessFactors SSO certificate is updated in your corporate IDP before selecting the
SSO Certificate Renewed checkbox. Selecting the checkbox activates the new certificate for SSO integration. If
the corporate IDP is not updated first, SSO will fail for all affected users.
Set up your application to commnicate with SAP SuccessFactors HCM suite using the OpenID Connect (OIDC)
authentication protocol.
Prerequisites
• You have the Administrator Permissions Manage Security Manage SAML SSO Settings permission.
• You have the Administrator Permissions Manage Security Manage Application Security Feature
Settings permission.
• You already have an SAP SuccessFactors HCM suite OIDC or hybrid SAML/OIDC application set up in Identity
Authentication.
Tip
To confirm that the application is correctly set up in Identity Authentication, go to the Appliations page
in the Identity Authentication administration console and select your SAP SuccessFactors application. If a
banner appears that says “This application was created from a source application. Some of the inherited
Setting Up SAP SuccessFactors with Identity Authentication and Identity Provisioning
Services
Additional Configurations for SAP SuccessFactors HCM suite with SAP Cloud Identity
120 PUBLIC Services
configurations can't be changed.”, the setup is complete. If the banner is missing, contact Technical
Support for assistance.
Context
The OIDC protocol is one of the most popular and widespread methods of authentication across the web,
mobile, and on-premise spaces. With this feature, HCM suite integrations can use OAuth and OIDC with Identity
Authentication as the central authentication provider.
Follow the steps below to set up your other application to communicate with SAP SuccessFactors HCM suite using
the OIDC protocol.
Procedure
Field Notes
Home URL (Optional) Users are redirected to the Home URL after acti-
vating their accounts, when they are created via a CSV file
import or the user registration service of Identity Authenti-
cation.
Type (Optional)
Remember
Newly created applications with an assigned parent ap-
plication will inherit all the configurations from the pa-
rent except for the Client ID and Secrets. The inher-
ited configurations will be marked as such.
Remember
Newly created applications with an assigned parent ap-
plication will inherit the protocol from the parent. To
change the protocol, first create the new application and
then edit it.
5. Choose +Create.
Once the application has been created, the system displays the message Application <name of application>
created.
The newly created application appears on the list with the applications on the left.
6. With your new application selected on the left panel, navigate to Provided APIs and make sure that Allow all
APIs for principal propogation is enabled. If it's not, check this box and click Save.
Create a Custom Applicaton Type Which Will Be Used to Sync Your OIDC OAuth Client Application to your SAP
SuccessFactors HCM suite OIDC or Hybrid SAML/OIDC Application:
For SAP applications that have already integrated with SAP SuccessFactors, a predefined Application Type is
already pre-configured within the application. Typically, you won't need to create a new Application Type if the
existing one already meets your integration needs.
If you need to create your own custom Application Type, you may do so by following steps 12-14 below. Keep in
mind that each Application Type can only be linked to one OIDC OAuth client application.
12. Navigate to the Admin Center Security Center Manage OIDC OAuth Client Application Application
Type tab.
13. On the Register a New Application Type dialog box, enter your application's name in the Application Type Name
field.
Field Description
Application Map Name (Required) The unique name of your OIDC OAuth client appli-
cation in SAP SuccessFactors
Bind to User (Optional) When left unchecked, the default technical user as-
sosicated with this application will be used (a technical user
is a specialized user account created for integrating SAP Suc-
cessFactors applications with other products and solutions).
Note
If using the technical user, ensure the
sf_technical_access value is selected in the API Field
drop-down during the dependency definition step (Step
9). This ensures proper configuration for system-to-sys-
tem communication.
When you enable this option, a specific user willl be used based
on the User ID you enter into the next field.
Caution
Generally, keep “Bind to User” unchecked to use the de-
fault technical user. Choose this option only if you require
an advanced user and are sure of your choice.
Results
You've now registered your application to commuicate with SAP SuccessFactors HCM suite with OpenID Connect
using Identity Authentication.
Setting Up SAP SuccessFactors with Identity Authentication and Identity Provisioning
Services
Additional Configurations for SAP SuccessFactors HCM suite with SAP Cloud Identity
Services PUBLIC 125
10.9 SAP Cloud Identity Services - Identity Provisioning
Service Administration Console Tasks
The SAP Cloud Identity Services - Identity Provisioning service allows you to manage the transfer of user data
from Source Systems (SAP SuccessFactors) to Target Systems (Identity Authentication service). You can use this
service to define how your data is read from the Identity Provisioning service into the Identity Authentication
service.
Note
If your bundle or standalone tenant is running on the SAP BTP Neo environment, we recommend that
you migrate them to the SAP Cloud Identity infrastructure. Sharing the same infrastructure with Identity
Authentication brings a number of benefits as described in Tenant Infrastructure.
Your Identity Provisioning service system is created when you initiate your upgrade to Identity Authentication, in
the SAP SuccessFactors Upgrade Center and the identity provisioning administrator receives an email with the link
to the Identity Provisioning Administration console.
Remember
If your SAP SuccessFactors tenant was created after December 9, 2022, Identity Authentication and Identity
Provisioning have already been enabled. You do not need to complete the steps to upgrade and to Identity
Authentication.
Caution
If you haven't received an email with a link to your identity provisioning system within two hours, contact
customer support.
The Identity Provisioning service contains access to your Source Systems and Target Systems and ensures the
synchronization of the entities between the two systems or multiple target systems.
You can configure the required provisioning entities in order to ensure proper synchronization between source
and target systems. You can also use proxy systems for indirect connections between a system supported by the
Identity Provisioning service and an external application that uses a SCIM 2.0 API to consume identities from the
proxy system. For example, you can use Identity Provisioning service as an external consuming application.
Properties help you to customize the way your identities are read from a source system or provisioned to the target
one. They can also filter which entities and attributes to be read or skipped during the provisioning job.
For every system supported by the Identity Provisioning service, there’s an initial (default) transformation logic that
converts the system-specific JSON representation of the entities from/to one common JSON. You can keep the
default transformation, or modify the mapping rules to reflect the current setup of entities from your source or
target system.
• Source – а system, where the company is currently managing the corporate identities
• Target – а system that needs to be populated with corporate users and other entities.
After upgrading to the Identity Authentication service in the SAP SuccessFactors Upgrade Center, you'll need to
perform some configurations in the Identity Provisioning console.
Remember
If your SAP SuccessFactors tenant was created after December 9, 2022, Identity Authentication and Identity
Provisioning have already been enabled. You do not need to complete the steps to upgrade to Identity
Authentication.
• Review and Edit the Settings Populated During the Upgrade Process.
• Configure Transformations to control how your data is read into the Identity Authentication service.
• Create a password for the API user (IPSADMIN).
Note
This IPSADMIN user is created during the upgrade process. As such, you must create a password for this
user and grant them the permissions required to perform integration tasks in your SAP SuccessFactors.
Remember
If your SAP SuccessFactors tenant was created after December 9, 2022, you are not using the IPSADMIN
API user, since your configuration is already enabled with a technical user in the background to
communicate between Identity Authentication and Identity Provisioning using mTLS and the SCIM API.
Note
Access to the Identity Provisioning console is managed in the Identity Authentication administration console
in the Administrators section (previously, in the Neo environment, this was controlled in the Identity
Provisioning console itself). For more information please refer to Manage Authorizations in SAP Cloud
Identity Infrastructure under Related Information below.
Related Information
Initiating the Identity Authentication upgrade automatically configures most of your Identity Provisioning settings
but some settings made need edits to ensure that your connections are properly set and your tests sync runs
properly.
Prerequisites
Context
Note
If your SAP SuccessFactors tenant was created after December 9, 2022, you are not using the IPSADMIN
API user, since your configuration is already enabled with a technical user in the background to communicate
between Identity Authentication and Identity Provisioning using Mutual Transport Layer Security (mTLS) in
conjunction with the System for Cross-domain Identity Management (SCIM) API, which are the latest methods
of authentication and integration with Identity Authentication and Identity Provisioning.
Also, if you have already initiated the upgrade to Identity Authentication after December 9, 2022, Identity
Authentication and Identity Provisioning will already be configured to use Mutual Transport Layer Security
(mTLS) in conjunction with the System for Cross-domain Identity Management (SCIM) API.
If you have manually upgraded to Mutual Transport Layer Security (mTLS) as your authentication method, a
technical user will also be created for you in the background for communication between SAP SuccessFactors
and Identity Authentication and Identity Provisioning.
For more information on upgrading to mTLS authentication as well as upgrading to the SCIM API, refer to
Upgrade to X.509 Certificate-Based Authentication for Incoming Calls and Upgrade from OData Identity
Provisioning Connector to SCIM Connector with SAP SuccessFactors HCM suite in the Related Information
section.
When you initiate the Identity Authentication upgrade, that process creates and configures your Identity
Provisioning Source and Target systems.
Procedure
If your instance name is not displayed in the source system that you selected, select a different source system
until you find the instance that contains the name of your instance in the User field.
6. Enter the password you set for your API user in the Password field.
7. Review and edit the types of users you want to sync in the [Link] field
Caution
If you change this filter AFTER running the user sync, any users not found using the new filter is deleted
from the Identity Authentication Service.
8. Ensure that the value in Source Systems Details System Name and the value in Source Properties
User contain the same instance name.
9. Go to Target Systems.
10. Select the source that reflects the name of your SAP SuccessFactors instance.
11. Ensure that the URL in Properties matches the URL to your Identity Authentication Service.
The URL is listed in the Identity Authentication email you received after upgrading your system.
12. From the Target System, in the Details tab, ensure that the Source Systems value matches the value from the
Source System, noted in Step 8.
If the source is not listed, choose Edit and select your source from the list.
Caution
Use the dropdown list to check on your source. DO NOT uncheck any existing sources.
Results
If you've reviewed or configured your Identity Authentication settings and you've completed your Identity
Provisioning configurations, you can set up your sync jobs as described in the topic: Running and Scheduling
Jobs
Setting Up SAP SuccessFactors with Identity Authentication and Identity Provisioning
Services
Additional Configurations for SAP SuccessFactors HCM suite with SAP Cloud Identity
Services PUBLIC 129
10.9.2 Upgrade from ODATA Identity Provisioning Connector to
SCIM Connector with SAP SuccessFactors
Existing Identity Authentication customers can now switch from the ODATA API to the SCIM API for use with
Identity Provisioning.
Prerequisites
You have the Administrator Permissions Manage Security Center Access to X.509 Certificate Mapping
permission.
Context
The System for Cross-domain Identity Management (SCIM) API is a preferred method to make user data more
secure and simplify the user experience by automating the user identity lifecycle management process. The below
steps set up communication between Identity Provisioning and SAP SuccessFactors HCM suite and configure the
authentication method.
Note
If you’re an existing Identity Authentication customer, and would like to enable Onboarding to authenticate your
users with Identity Authentication and Identity Provisioning, switching to the SCIM API is required.
Caution
Do not start the upgrade procedure if your SAP SuccessFactors instance was recently refreshed and the post-
refresh activities have not been completed. Performing the upgrade before Identity Provisioning successfully
syncs after the instance refresh can cause provisioning issues with integrated systems such as Identity
Authentication and SAP Analytics Cloud.
Caution
Before starting the upgrade, cancel all active Identity Provisioning user sync jobs with SAP SuccessFactors as
the source system. This will prevent conflicts and ensure the new SCIM API configuration works correctly.
Procedure
1. Tip
Steps 1–7 walk you through setting up Mutual Transport Layer Security (mTLS) as your authentication
method between Identity Provisioning and SAP SuccessFactors.
Setting Up SAP SuccessFactors with Identity Authentication and Identity Provisioning
Services
Additional Configurations for SAP SuccessFactors HCM suite with SAP Cloud Identity
130 PUBLIC Services
If you're currently not using this method of authentication, it’s highly recommended that you upgrade to
mTLS first before proceeding with steps 8 and beyond.
4. If there's no active certificate, click Generate and Download. If there's already an active certificate, just click
Download.
5. Navigate to the SAP SuccessFactors Admin Center Security Center X.509 Public Certificate Mapping
tab and choose Add.
6. Register your X.509 public certificate for mTLS communication by providing the required information and
upload the certificate file. Make sure you select Identity Provisioning Service in the Integration Name field.
8. Note
The below steps configure SAP SuccessFactors as a Source System to use the SCIM API and are
configured in your Identity Provisioning administration console.
Note
The following properties are mandatory unless specified as Optional in the Property Name column.
Possible values:
(Optional) [Link] The possible values of this property depend on the API ver-
sion which your SAP SuccessFactors system consumes.
(Optional) [Link] This property filters SAP SuccessFactors inactive users from
a particular date on. It is an optional property which does not
appear by default at system creation. It accepts a value in
the yyyy-MM-dd format. For example: 2023-07-17.
[Link]=active eq true
[Link]=active eq false
Note
When you filter by [Link] = ac-
tive eq false along with the property
[Link], the users that
match the two critera will be read twice.
(Optional) [Link] The possible values of this property depend on the API ver-
sion which your SAP SuccessFactors system consumes.
To learn what additional properties are relevant to SAP SuccessFactors, refer to List of Properties. You can use
the main search, or filter properties by the Name or System Type columns.
The below steps allow you to view and update the transformations for the SCIM API.
By default, Identity Provisioning provides default transformations for your SAP SuccessFactors Source
and Target systems, however, these are not the same transformations that are provided by the SAP
SuccessFactors Upgrade Center.
You'll need to therefore update these default transformations to the Source and Target transformations
provided in the steps below.
From the SAP Cloud Identity Services Identity Provisioning Source Systems page, ensure you have the
desired SAP SuccessFactors tenant record selected from the list of source systems.
12. Click on the Transformations tab to view the default transformation provided by Identity Provisioning for
your SAP SuccessFactors source system.
13. Click Edit to update the source transformation for the SCIM API to the following:
Default transformation for SCIM API for SAP SuccessFactors Source System:
Code Syntax
{
"user": {
"mappings": [
{
"sourcePath": "$.schemas",
"targetPath": "$.schemas",
"preserveArrayWithSingleElement": true
},
{
"sourcePath": "$.id",
"targetVariable": "entityIdSourceSystem"
},
{
"sourcePath": "$.userName",
"targetPath": "$.userName",
"correlationAttribute": true
},
{
"sourcePath": "$.active",
"targetPath": "$.active"
Setting Up SAP SuccessFactors with Identity Authentication and Identity Provisioning
Services
Additional Configurations for SAP SuccessFactors HCM suite with SAP Cloud Identity
136 PUBLIC Services
},
{
"sourcePath": "$.userType",
"targetPath": "$.userType"
},
{
"sourcePath": "$.[Link]",
"targetPath": "$.[Link]",
"optional": true
},
{
"sourcePath": "$.[Link]",
"targetPath": "$.[Link]",
"optional": true
},
{
"sourcePath": "$.[Link]",
"targetPath": "$.[Link]",
"optional": true
},
{
"sourcePath": "$.[Link]",
"targetPath": "$.[Link]",
"optional": true
},
{
"sourcePath": "$.[Link]",
"targetPath": "$.[Link]",
"optional": true
},
{
"sourcePath": "$.[Link]",
"targetPath": "$.[Link]",
"optional": true
},
{
"sourcePath": "$.nickName",
"targetPath": "$.nickName",
"optional": true
},
{
"sourcePath": "$.title",
"targetPath": "$.title",
"optional": true
},
{
"sourcePath": "$.displayName",
"targetPath": "$.displayName",
"optional": true
},
{
"sourcePath": "$.emails",
"targetPath": "$.emails",
"optional": true,
"preserveArrayWithSingleElement": true
},
{
"sourcePath": "$.emails[?(@.primary== true)].value",
"optional": true,
"correlationAttribute": true
},
{
"sourcePath": "$.phoneNumbers",
"targetPath": "$.phoneNumbers",
"optional": true,
"preserveArrayWithSingleElement": true
},
{
Setting Up SAP SuccessFactors with Identity Authentication and Identity Provisioning
Services
Additional Configurations for SAP SuccessFactors HCM suite with SAP Cloud Identity
Services PUBLIC 137
"sourcePath": "$.preferredLanguage",
"targetPath": "$.preferredLanguage",
"optional": true
},
{
"sourcePath": "$.locale",
"targetPath": "$.locale",
"optional": true
},
{
"sourcePath": "$.timezone",
"targetPath": "$.timezone",
"optional": true
},
{
"sourcePath": "$.externalId",
"targetPath": "$.externalId",
"optional": true
},
{
"sourcePath": "$.groups",
"targetPath": "$.groups",
"optional": true,
"preserveArrayWithSingleElement": true
},
{
"sourcePath": "$['urn:ietf:params:scim:schemas:extension:enterprise:2.0:User']
['employeeNumber']",
"targetPath": "$['urn:ietf:params:scim:schemas:extension:enterprise:2.0:User']
['employeeNumber']",
"optional": true
},
{
"sourcePath": "$
['urn:ietf:params:scim:schemas:extension:enterprise:2.0:User']['department']",
"targetPath": "$
['urn:ietf:params:scim:schemas:extension:enterprise:2.0:User']['department']",
"optional": true
},
{
"sourcePath": "$
['urn:ietf:params:scim:schemas:extension:enterprise:2.0:User']['division']",
"targetPath": "$
['urn:ietf:params:scim:schemas:extension:enterprise:2.0:User']['division']",
"optional": true
},
{
"sourcePath": "$['urn:ietf:params:scim:schemas:extension:enterprise:2.0:User']
['manager']['value']",
"targetPath": "$['urn:ietf:params:scim:schemas:extension:enterprise:2.0:User']
['manager']['value']",
"optional": true
},
{
"sourcePath": "$['urn:ietf:params:scim:schemas:extension:enterprise:2.0:User']
['manager']['displayName']",
"targetPath": "$['urn:ietf:params:scim:schemas:extension:enterprise:2.0:User']
['manager']['displayName']",
"optional": true
},
{
"targetPath": "$['urn:ietf:params:scim:schemas:extension:enterprise:2.0:User']
['manager']['$ref']",
"optional": true
},
{
"sourcePath": "$
['urn:ietf:params:scim:schemas:extension:sap:2.0:User']['userUuid']",
"targetPath": "$
['urn:ietf:params:scim:schemas:extension:sap:2.0:User']['userUuid']",
"optional": true
},
{
"sourcePath": "$
['urn:ietf:params:scim:schemas:extension:sap:2.0:User']['groupDomains']",
"targetPath": "$
['urn:ietf:params:scim:schemas:extension:sap:2.0:User']['groupDomains']",
"optional": true,
"preserveArrayWithSingleElement": true
},
{
"sourcePath":
"$['urn:ietf:params:scim:schemas:extension:successfactors:2.0:User']
['perPersonUuid']",
"targetPath":
"$['urn:ietf:params:scim:schemas:extension:successfactors:2.0:User']
['perPersonUuid']",
"optional": true
},
{
"sourcePath":
"$['urn:ietf:params:scim:schemas:extension:successfactors:2.0:User']
['personIdExternal']",
"targetPath":
"$['urn:ietf:params:scim:schemas:extension:successfactors:2.0:User']
['personIdExternal']",
"optional": true
},
{
"sourcePath":
"$['urn:ietf:params:scim:schemas:extension:successfactors:2.0:User']
['loginMethod']",
"targetPath":
"$['urn:ietf:params:scim:schemas:extension:successfactors:2.0:User']
['loginMethod']",
"optional": true
},
{
"sourcePath":
"$['urn:ietf:params:scim:schemas:extension:successfactors:2.0:User']
['isDraft']",
"targetPath":
"$['urn:ietf:params:scim:schemas:extension:successfactors:2.0:User']
['isDraft']",
"optional": true
},
{
"sourcePath":
"$['urn:ietf:params:scim:schemas:extension:successfactors:2.0:User']
['customFields']",
"targetPath":
"$['urn:ietf:params:scim:schemas:extension:successfactors:2.0:User']
['customFields']",
"optional": true
},
Setting Up SAP SuccessFactors with Identity Authentication and Identity Provisioning
Services
Additional Configurations for SAP SuccessFactors HCM suite with SAP Cloud Identity
Services PUBLIC 139
{
"targetPath":
"$['urn:sap:cloud:scim:schemas:extension:[Link].0:User']
['hasEmbeddedAnalyticsPermission']",
"constant": false
},
{
"targetPath":
"$['urn:sap:cloud:scim:schemas:extension:[Link].0:User']
['hasEmbeddedAnalyticsPermission']",
"condition": "$['urn:ietf:params:scim:schemas:extension:sap:2.0:User']
['groupDomains'][?(@.value == 'embeddedAnalyticsAccessPermission')] empty
false",
"constant": true
}
]
},
"group": {
"ignore": true,
"mappings": [
{
"sourcePath": "$.id",
"targetPath": "$.id",
"targetVariable": "entityIdSourceSystem"
},
{
"sourcePath": "$.schemas",
"targetPath": "$.schemas"
},
{
"sourcePath": "$.displayName",
"targetPath": "$.displayName"
},
{
"sourcePath": "$.members",
"targetPath": "$.members",
"optional": true,
"preserveArrayWithSingleElement": true
}
]
}
}
14. Go to SAP Cloud Identity Services Identity Provisioning Target Systems (your Identity Authentication
target system) .
Setting Up SAP SuccessFactors with Identity Authentication and Identity Provisioning
Services
Additional Configurations for SAP SuccessFactors HCM suite with SAP Cloud Identity
140 PUBLIC Services
15. Click on the Transformations tab to view the default transformation provided by Identity Provisioning for your
Identity Authentication target system.
16. Click Edit to update the target transformation for the SCIM API to the following:
Default transformation for SCIM API for the Identity Authentication Target System:
Code Syntax
{
"user": {
"condition": "($.emails EMPTY false) && ($.[Link] EMPTY
false)",
"mappings": [
{
"targetPath": "$.id",
"sourceVariable": "entityIdTargetSystem"
},
{
"targetPath": "$.schemas[0]",
"constant": "urn:ietf:params:scim:schemas:core:2.0:User"
},
{
"targetPath": "$.schemas[1]",
"constant":
"urn:ietf:params:scim:schemas:extension:enterprise:2.0:User"
},
{
"targetPath": "$.schemas[2]",
"constant":
"urn:sap:cloud:scim:schemas:extension:custom:2.0:User"
},
{
"sourcePath": "$.active",
"targetPath": "$.active",
"optional": true
},
{
"sourcePath": "$.userName",
"targetPath": "$.userName",
"optional": true
},
{
"sourcePath": "$.emails[*].value",
"targetPath": "$.emails[?(@.value)]",
"preserveArrayWithSingleElement": true
},
{
"sourcePath": "$.userType",
"targetPath": "$.userType",
"optional": true
},
{
"sourcePath": "$.[Link]",
"targetPath": "$.[Link]",
"optional": true
},
{
"sourcePath": "$.[Link]",
"targetPath": "$.[Link]",
"optional": true
},
{
"sourcePath": "$.[Link]",
"targetPath": "$.[Link]"
},
{
Setting Up SAP SuccessFactors with Identity Authentication and Identity Provisioning
Services
Additional Configurations for SAP SuccessFactors HCM suite with SAP Cloud Identity
Services PUBLIC 141
"sourcePath": "$.[Link]",
"targetPath": "$.[Link]",
"optional": true,
"ignore": true
},
{
"sourcePath": "$.addresses",
"targetPath": "$.addresses",
"optional": true,
"preserveArrayWithSingleElement": true
},
{
"sourcePath": "$.locale",
"targetPath": "$.locale",
"optional": true,
"ignore": true
},
{
"sourcePath": "$.phoneNumbers",
"targetPath": "$.phoneNumbers",
"optional": true,
"preserveArrayWithSingleElement": true
},
{
"sourcePath": "$.telephoneVerified",
"targetPath": "$.telephoneVerified",
"optional": true
},
{
"sourcePath": "$.displayName",
"targetPath": "$.displayName",
"optional": true
},
{
"sourcePath": "$.timezone",
"targetPath": "$.timeZone",
"optional": true
},
{
"sourcePath": "$['urn:ietf:params:scim:schemas:extension:enterprise:2.0:User']
['employeeNumber']",
"targetPath": "$['urn:ietf:params:scim:schemas:extension:enterprise:2.0:User']
['employeeNumber']",
"optional": true
},
{
"sourcePath": "$
['urn:ietf:params:scim:schemas:extension:enterprise:2.0:User']['costCenter']",
"targetPath": "$
['urn:ietf:params:scim:schemas:extension:enterprise:2.0:User']['costCenter']",
"optional": true
},
{
"sourcePath": "$['urn:ietf:params:scim:schemas:extension:enterprise:2.0:User']
['organization']",
"targetPath": "$['urn:ietf:params:scim:schemas:extension:enterprise:2.0:User']
['organization']",
"optional": true
},
{
"sourcePath": "$
['urn:ietf:params:scim:schemas:extension:enterprise:2.0:User']['division']",
"targetPath": "$
['urn:ietf:params:scim:schemas:extension:enterprise:2.0:User']['division']",
Setting Up SAP SuccessFactors with Identity Authentication and Identity Provisioning
Services
Additional Configurations for SAP SuccessFactors HCM suite with SAP Cloud Identity
142 PUBLIC Services
"optional": true
},
{
"sourcePath": "$
['urn:ietf:params:scim:schemas:extension:enterprise:2.0:User']['department']",
"targetPath": "$
['urn:ietf:params:scim:schemas:extension:enterprise:2.0:User']['department']",
"optional": true,
"ignore": true
},
{
"sourcePath": "$['urn:ietf:params:scim:schemas:extension:enterprise:2.0:User']
['manager']['value']",
"targetPath": "$['urn:ietf:params:scim:schemas:extension:enterprise:2.0:User']
['manager']['value']",
"optional": true,
"functions": [
{
"function": "resolveEntityIds"
}
]
},
{
"sourcePath":
"$['urn:ietf:params:scim:schemas:extension:successfactors:2.0:User']
['perPersonUuid']",
"targetPath": "$['urn:sap:cloud:scim:schemas:extension:custom:2.0:User']
['attributes'][0]['value']",
"optional": true
},
{
"targetPath": "$['urn:sap:cloud:scim:schemas:extension:custom:2.0:User']
['attributes'][0]['name']",
"condition":
"$['urn:ietf:params:scim:schemas:extension:successfactors:2.0:User']
['perPersonUuid'] EMPTY false",
"constant": "customAttribute1"
},
{
"targetPath": "$.applicationId",
"constant": "%[Link]%",
"scope": "createEntity"
},
{
"targetPath": "$.sendMail",
"constant": "false",
"scope": "createEntity"
},
{
"targetPath": "$.sendMail",
"condition": "$.userType == 'ONBOARDEE'",
"constant": "true",
"scope": "createEntity"
},
{
"targetPath": "$.emailTemplateSetId",
"condition": "$.userType == 'ONBOARDEE'",
"ignore": true,
"constant": "%[Link]%",
"scope": "createEntity"
},
{
"targetPath": "$.mailVerified",
"constant": "true",
Setting Up SAP SuccessFactors with Identity Authentication and Identity Provisioning
Services
Additional Configurations for SAP SuccessFactors HCM suite with SAP Cloud Identity
Services PUBLIC 143
"scope": "createEntity"
},
{
"targetPath": "$.mailVerified",
"condition": "$.userType == 'ONBOARDEE'",
"constant": "false",
"scope": "createEntity"
},
{
"targetPath": "$.passwordStatus",
"constant": "disabled",
"scope": "createEntity"
},
{
"targetPath": "$.passwordStatus",
"condition": "$.userType == 'ONBOARDEE'",
"constant": "enabled",
"scope": "createEntity"
},
{
"targetPath": "$.password",
"ignore": true,
"constant": "%[Link]%",
"scope": "createEntity"
},
{
"targetPath": "$.sourceSystem",
"condition":
"$['urn:ietf:params:scim:schemas:extension:successfactors:2.0:User']
['loginMethod'] == 'PWD'",
"ignore": true,
"constant": "%[Link]%",
"scope": "createEntity"
},
{
"targetPath": "$.sourceSystemId",
"condition":
"$['urn:ietf:params:scim:schemas:extension:successfactors:2.0:User']
['loginMethod'] == 'PWD'",
"ignore": true,
"constant": "%[Link]%",
"scope": "createEntity"
}
]
},
"group": {
"mappings": [
{
"targetPath": "$.id",
"sourceVariable": "entityIdTargetSystem"
},
{
"sourcePath": "$.displayName",
"targetPath": "$.displayName"
},
{
"sourcePath": "$.displayName",
"targetPath": "$
['urn:sap:cloud:scim:schemas:extension:custom:2.0:Group']['name']",
"scope": "createEntity",
"functions": [
{
"function": "replaceAllString",
"regex": "[\\s\\p{Punct}]",
"replacement": "_"
}
]
},
Setting Up SAP SuccessFactors with Identity Authentication and Identity Provisioning
Services
Additional Configurations for SAP SuccessFactors HCM suite with SAP Cloud Identity
144 PUBLIC Services
{
"sourcePath": "$
['urn:sap:cloud:scim:schemas:extension:custom:2.0:Group']['name']",
"targetPath": "$
['urn:sap:cloud:scim:schemas:extension:custom:2.0:Group']['name']",
"optional": true,
"scope": "createEntity"
},
{
"sourcePath": "$
['urn:sap:cloud:scim:schemas:extension:custom:2.0:Group']['description']",
"targetPath": "$
['urn:sap:cloud:scim:schemas:extension:custom:2.0:Group']['description']",
"optional": true
},
{
"sourcePath": "$.members[*].value",
"targetPath": "$.members[?(@.value)]",
"optional": true,
"preserveArrayWithSingleElement": true,
"functions": [
{
"function": "resolveEntityIds"
}
]
}
]
}
}
17. Reset Identity Provisioning for the current SAP SuccessFactors tenant Source System by following the steps in
Reset Identity Provisioning System.
Note
For the relevant target systems (e.g. Identity Authentication and SAP Analytics Cloud) that
would use the user data from SAP SuccessFactors – the following property should be added
([Link] with value true) in order to allow Identity Provisioning to further delete
users created before the reset is done.
18. Go to Identity Provisioning Source Systems Jobs (your SAP SuccessFactors source system) and
resume your scheduled sync jobs, or run a new Read Job, if you did not have one scheduled.
Note
Please note that the sync job after the Reset will always be a full sync that covers all the users from the
source. It takes more time.
Related Information
Setting Up SAP SuccessFactors as a Source System with Identity Provisioning with SCIM API Option
Mapping Between SCIM User and OData User
When changes occur to your users data, a sync job synchronizes the changes to your system. Run sync jobs to load
users into your Identity Authentication service, after editing the transformations (how data reads into the Identity
Authentication service), anytime changes occur in your data.
Prerequisites
Ensure that you've performed the tasks in: Setting up the Identity Provisioning Source and Target System.
Note
If you have both SAP SuccessFactors and People Analytics, you'll want to configure both before running the
user Re-Sync job.
Context
It's important that you set up user sync so that your users exist in the Identity Authentication service. User sync is
critical when using the following services and features:
Caution
• Conditional Authentication: To set up with rules that authenticate based on email, user type, or group.
• People Analytics, Internal Career Site and other SAP SuccessFactors product areas: User identifiers
can change between product areas and the Identity Authentication service can only map these identifiers
correctly when your users are in Identity Authentication.
• Global Assignment & Concurrent Employment: when users log on from different sources, Identity
Authentication needs to convert their identifiers so that Identity Authentication understands them. That
only happens when user sync has been done and the users are loaded into Identity Authentication.
• Enablement of Partial SSO: If you intend to user partial sso,your users should exist in Identity
Authentication.
• Two-factor Authentication: Your users need to exist in Identity Authentication so that you can take
advantage of two-factor security features.
Run a provisioning job manually, or set a time interval for automatic (scheduled) jobs. Also, you can choose
whether to run a complete read job or a synchronized one. The sync job reads and provisions only the new and
updated entities.
If you have a large user population, this may take a long time. The jobs process is set up with basic transformations
that load data for all users fromSAP SuccessFactors to the Identity Authentication tenant. You may want to modify
these transformations before running the full reload or Resync Job. Common changes include syncing passwords
for migrating users and replacing blank or dummy email addresses with unique ones. Once the initial user load is
completed, you will need to enable the job to run on a schedule.
Setting Up SAP SuccessFactors with Identity Authentication and Identity Provisioning
Services
Additional Configurations for SAP SuccessFactors HCM suite with SAP Cloud Identity
146 PUBLIC Services
Procedure
Caution
The full reload deletes any users that were previously loaded by this job but are not found in the current
data. The read job deletes users if there’s a change to the [Link] setting, as suggested should be done
for testing. If you test with one user and then test with another, the first will be deleted. Users manually
added to the Identity Authentication tenant will never be deleted by the jobs process (an exception to this is
if you set the property [Link] = true in the target system. For more information see
Manage Deleted Entities under Related Information below).
Tip
By default, only active users are synced to the Identity Authentication Service, so when an employee is
deactivated or deleted in SAP SuccessFactors, the user will be deleted with the next Resync Job (full
sync). However, you can decide to provision all the users (both active and inactive), so that once a user is
deactivated in SAP SuccessFactors, they will also be deactivated in the Identity Authentication Service with
the next sync, either by a Run Job (delta sync) or Resync Job (full sync). The full sync job keeps your source
and target systems synchronized. To run a scheduled sync between your source and target systems, we
recommend that you enforce full reads from time to time. To achieve this, you need to set up the following
source system property: [Link].
For example, [Link]=10 results in alternating full reads after every 10 delta reads
are performed. This property only impacts scheduled runs; manually triggered runs are ignored.
Tip
To ensure that inactive users are continually deleted in a timely manner, we suggest that you keep the
following in mind:
• Make sure to use the system property [Link] = status eq 'active'. This way when a user becomes
inactive, they will no longer be read by the Identity Provisioning job, and any record missing from the
read will be deleted.
• In the Resync Job, use the property [Link] = 1 to ensure that the job does a full read of
active users each time a delta read is performed, and deletes the inactive users. Alternatively, you may
also run the Resync Job manually for a full read of active users.
• Ensure that your job run is free of errors. If the particular error does not allow Identity Provisioning to
properly calculate the entities that are no longer present in the source system, the delete operation will
be skipped.
Setting Up SAP SuccessFactors with Identity Authentication and Identity Provisioning
Services
Additional Configurations for SAP SuccessFactors HCM suite with SAP Cloud Identity
Services PUBLIC 147
• Note that the same job that provisions a user in Identity Provisioning is also the one that is used to
delete that same user. If a user from a previous job is made inactive, and a new job is created or the
existing job is reset, it will not affect the users from the previous job, and they will not be deleted.
• If you create conditions within the Identity Provisioning Target or Source transformations, while they
will cause unprovisioned users to be skipped that don't meet these conditions, users that have already
been provisioned, but also do not meet these conditions will get deleted.
Tip
You can download the execution logs for all running jobs by navigating to Job Logs Down arrow icon (at
the top-right of the screen) Download button on the Download Execution Logs for All Jobs modal. This
feature also allows you to download all the execution logs in real-time while the jobs are still running.
Related Information
Use the Manage SAML SSO Settings (SAML 2.0 Single Sign-On) page in Admin Center to configure and maintain
Identity Authentication SAML Single Sign-On (SSO) settings. This feature supports Identity Authentication in both
proxy Identity Provider (IDP) and primary IDP scenarios. It enables customer admins to self-service core SAML
SSO settings such as redirect URLs, identity provider metadata, and certificate renewals.
The Manage SAML SSO Settings screen provides a centralized interface for configuring SAML 2.0-based SSO
between SAP SuccessFactors and SAP Cloud Identity Services – Identity Authentication. It supports the following
actions:
Remember
This screen reflects Identity Authentication corporate identity provider configurations from the Identity
Authentication tenant, but only if your SAP SuccessFactors company’s SAML Issuer is set correctly in
Provisioning. To view assertion records for a specific company, you must log in to SAP SuccessFactors using
Setting Up SAP SuccessFactors with Identity Authentication and Identity Provisioning
Services
Additional Configurations for SAP SuccessFactors HCM suite with SAP Cloud Identity
148 PUBLIC Services
that company's Company ID, and ensure the SAML Issuer in Provisioning matches the Identity Authentication
tenant.
The Single Sign-On Configuration section displays corporate identity providers pulled from the Identity
Authentication tenant, matching entries in SAP Cloud Identity Services Identity Providers Corporate Identity
Providers . Admins can edit existing entries.
Trust All Identity Providers Identity Authentication setting that allows IDP-initiated login
from any configured corporate IDP or assertion party.
SSO Certificate Renewed Checkbox that confirms the admin has adopted the renewed
SSO certificate from SAP SuccessFactors. Required to help
prevent issues due to expired certificates.
Caution
Ensure that the new SAP SuccessFactors SSO certificate
is updated in your corporate IDP before selecting the SSO
Certificate Renewed checkbox. Selecting the checkbox ac-
tivates the new certificate for SSO integration. If the cor-
porate IDP is not updated first, SSO will fail for all affected
users.
Remember
For integration with Identity Authentication, this setting
must be enabled, as the service only supports case-insen-
sitive usernames.
Note
If your system doesn't contain usernames that only dif-
fer by upper or lowercase letters (e.g., "[Link]" vs.
"[Link]"), SAP SuccessFactors will automatically turn on
the case-insensitive setting for you.
Set Non-SAML Redirect Pages Used for users who log in directly via the Identity Authentica-
tion login screen using credentials, rather than through an ex-
ternal corporate identity provider.
Note
These settings are only applicable when Identity Authenti-
cation is acting as the main corporate IDP.
Advanced Settings Opens the SAP Cloud Identity Services Identity Authentication
admin console login page for further configuration of SAML
settings and user attributes.
Download Service Provider Metadata Downloads Identity Authentication service provider metadata
for use when setting up trust in the SAP Cloud Identity Services
Identity Authentication admin console.
The following columns appear on the Manage SAML SSO Settings (SAML 2.0 Single Sign-On) page. They help
identify and route authentication through the correct identity provider configuration:
Default Issuer Designates this corporate IDP as the fallback for authentica-
tion requests that don't explicitly match another configured
Issuer. Useful when multiple IDPs are present, and a default
route is needed.
When you edit a corporate identity provider from the Manage SAML SSO Settings screen, a configuration view
opens with additional sections:
• Base Configuration Settings: Displays the same SAML Asserting Party Name and SAML Issuer information on
the main screen.
• Enable Additional Settings: Allows you to configure redirect URLs that determine where users are sent after
specific login-related events. These settings help improve the user experience by guiding users to appropriate
landing pages when authentication issues occur:
Note
These settings are only applicable when Identity Authentication is acting as proxy to the real corporate IDP.
Redirect URL when logout Specifies where to redirect users after a logout.
Redirect URL when session timeout Defines the landing page users see when their session expires
due to inactivity.
Redirect URL for Invalid Login URL used when login fails due to incorrect credentials or unex-
pected authentication issues. Helps deliver a clear message or
next steps.
Redirect URL for an Invalid Login Path by External Users Used for scenarios where an external user attempts to log in
via an invalid path (e.g., not authorized or misrouted). Directs
them to a dedicated page explaining the issue.
Navigate from the SAP SuccessFactors SAML 2.0 Single Sign On page to the Identity Authentication administration
console so that you can configure advanced SAML SSO settings.
Prerequisites
• You have an Identity Authentication service tenant and SAML trust is set up between it and your SAP
SuccessFactors system.
• You have the Manage SAML SSO Settings permission.
Procedure
The Identity Authentication administration console opens in a new tab in your browser.
Related Information
Configure your corporate identity provider with service provider metadata from the SAP Cloud Identity Services -
Identity Authentication service.
Prerequisites
Context
This is the first step in the process of setting up single sign-on for SAP SuccessFactors with Identity Authentication
service. In this step, you are setting up Identity Authentication as the service provider that is configured in your
corporate identity provider. Configuration is done by the administrator of your corporate identity provider.
Procedure
For information about how to do this, consult documentation of your corporate identity provider.
3. (Optional) If you are using IdP-initiated SSO, add the sp=<sp_name> parameter to the assertion consumer
service (ACS) endpoint URL in your corporate identity provider, replacing the sp_name with the Entity ID of
your Identity Authentication service tenant.
This parameter is needed for Identity Authentication to know where to redirect the user to after successful
authentication.
Tip
The ACS endpoint URL should have the following format: [Link] current ACS endpoint
URL>?sp=<sp_name>.
How to request the Entity ID of the service provider from the tenant administrator of Identity
Authentication.
4. Configure your corporate identity provider to send the Name-ID and NameIDFormat that are expected by SAP
SuccessFactors:
Name-ID: username
NameIDFormat: unspecified
Note
If it is not possible to send this information to SAP SuccessFactors and the attributes should be modified by
Identity Authentication, you should enable Identity Federation.
Remember
When enabling Identity Federation with SAP SuccessFactors, make sure that you've also enabled the Use
Identity Authentication user store option. This step is necessary to ensure that the data for users stored in
the Identity Authentication user store are taken and their attributes are sent to the application.
5. Use the following fields in the SAML Single Sign On Edit icon Enable Additional Settings section to
redirect URLs based on different scenarios:
Remember
The following fields are only applicable when Identity Authentication is enabled and acting as a proxy IdP
for your Corporate IdP.
Field Description
Redirect URL when logout Enter the URL of the page users should see when they logout
of the service provider.
Redirect URL when session timeout Enter the redirect URL when the session times out.
Redirect URL for Invalid Login Enter the URL for Invalid Login URL redirect.
Redirect URL for Invalid Manager Enter the URL for Invalid Manager URL redirect.
Next Steps
Proceed to add your corporate identity provider (IdP) as an asserting party to the Identity Authentication service.
Add your corporate identity provider (IdP) as an asserting party to the SAP Cloud Identity Services - Identity
Authentication service.
Prerequisites
Note
We are requesting for all systems to be migrated to SAP Cloud Identity Services-Identity Authentication by
June 2, 2025. For details about this migration refer to Migration to SAP Cloud Identity Services-Identity
Authentication
• You have configured your corporate identity provider with service provider metadata from the Identity
Authentication service.
• You have SAML metadata for your corporate identity provider. If you do not have this, contact the administrator
of your corporate identity provider.
Context
This is a necessary step in the process of setting up single sign-on for SAP SuccessFactors with the Identity
Authentication service. In this step, your corporate identity provider is the asserting party that is configured in
Identity Authentication.
You can complete this task from the Identity Authentication administration console. Refer to Configure Trust with
SAML 2.0 Coprporate Identity Provider in the Related Information section.
Restriction
It is important that Identity Authentication is the only SAML asserting party that is enabled after you’ve
activated your upgrade to Identity Authentication. If you add more than one asserting party, that’s not Identity
Setting Up SAP SuccessFactors with Identity Authentication and Identity Provisioning
Services
Additional Configurations for SAP SuccessFactors HCM suite with SAP Cloud Identity
Services PUBLIC 155
Authentication, we recommend that you do not enable it. If you enable multiple asserting parties, you will not
be able to upgrade to People Analytics.
Next Steps
Configure user groups and authentication rules in the Identity Authentication administration console to determine
which users are sent to single-sign on.
If you choose, you can also configure additional SSO configuration options.
Related Information
Opening the Identity Authentication Administration Console in SAP Cloud Identity Services [page 152]
Configure Trust with SAML 2.0 Corporate Identity Provider
Additional single sign-on options can be configured in the SAP Cloud Identity Services - Identity Authentication
administration console.
Here are some common use cases and links to relevant documentation.
Set up authentication rules for sending users to corporate IdP Conditional Authentication
or for multiple asserting party selection.
Set up authentication rules for sending users to two-factor/to- Risk Based Authentication
ken authentication, password-based login, or other login op-
tions.
Have the Identity Authentication service send a different value Name ID Settings
to SAP SuccessFactors than it used to authenticate the user.
For example, Identity Authentication can contain a login using
an email address but send SAP SuccessFactors the login name
for that user.
Add asserting parties using Metadata Import in the Identity Configure Trust with Corporate IdP
Authentication Administration Console, instead of using the
SAP SuccessFactors SAML 2.0 Single Sign On page.
Related Information
Opening the Identity Authentication Administration Console in SAP Cloud Identity Services [page 152]
Setting Up SAP SuccessFactors with Identity Authentication and Identity Provisioning
Services
Additional Configurations for SAP SuccessFactors HCM suite with SAP Cloud Identity
156 PUBLIC Services
10.10.3 Single Sign-On without SAP Cloud Identity Services -
Identity Authentication
To configure single sign-on without SAP Cloud Identity Services - Identity Authentication, using other
authentication services or identity providers, use the Provisioning application.
Remember
As a customer, you don't have access to Provisioning. To complete tasks in Provisioning, contact your
implementation partner or Account Executive. For any non-implementation tasks, contact Technical Support.
Caution
We strongly advise against using the Business Execution Suite Provisioning platform as the identity provider
by which you authenticate to SAP SuccessFactors, as this method of authentication is not supported by
engineering or Technical Support, and is planned to be deprecated in the future.
Please also note that on this platorm, applications in the Application Name field that fall under the Other
Application category are also not supported by engineering or Technical Support.
To avoid authentication issues, we recommend that you use SAP Cloud Identity Services - Identity
Authentication as your solution for authentication instead.
Caution
Please note that any direct integration between SAP SuccessFactors and corporate identity providers (IDP)
will be deprecated. Customers currently using corporate IDP directly with SAP SuccessFactors are required to
migrate to Identity Authentication, with this service acting as a proxy to the corporate IDP.
Additionally, the creation of new corporate IDP to SAP SuccessFactors direct integrations in Provisioning is no
longer supported. To ensure compliance and proper integration, please integrate with Identity Authentication
first, and then connect your corporate IDP to Identity Authentication as a proxy.
Learn about changes to the documentation for setting up SAP SuccessFactors with SAP Cloud Identity Services -
Identity Authentication service and Identity Provisioning service in recent releases.
1H 2025
Changed We added a note to the Prerequisites sec- Register Your Own Application to Com-
tion with guidance on how to confirm if municate with SAP SuccessFactors HCM
your SAP SuccessFactors appplication is Suite with OpenID Connect [page 120]
already set up with OpenID Connect.
Changed We added cautions to warn against per- Upgrade from ODATA Identity Provision-
forming the upgrade to the SCIM connec- ing Connector to SCIM Connector with
tor if SAP SuccessFactors post refresh SAP SuccessFactors [page 130]
activities haven't been completed, or ex-
isting user sync jobs are still running.
Changed • We updated the path to the "Access Upgrade from ODATA Identity Provision-
to X.509 Certificate Mapping" per- ing Connector to SCIM Connector with
mission. SAP SuccessFactors [page 130]
Changed We added a reference to enabling Alumni Authenticating New Hires with Identity
access and configuring the Identity Au- Authentication in SAP Cloud Identity
thentication email template. Services [page 76]
New We added a new topic to cover the dif- Handling Customer Migration Scenarios
ferent migration sceanrios in Identity Au- in Identity Authentication [page 9]
thentication
Changed We added a Caution note to remind users Public API to Retrieve New Customer
to update their SAP SuccessFactors SSO SSO Certificate [page 119]
Certificate before checking the SSO Cer-
tificate Renewed box on the Manage
SAML SSO Settings page.
Changed We updated the Monitoring Tool details Monitoring Tool for the Upgrade to Iden-
to reflect the new changes to the UI. tity Authentication [page 42]
Changed We added a waring about the depreca- Single Sign-On without SAP Cloud Iden-
tion of corporate IDP direct integration tity Services - Identity Authentication
with SAP SuccessFactors. [page 157]
2H 2024
Changed We updated the "Information Exchanged SAP SuccessFactors SAML 2.0 Technical
to Set Up SAML2" section and refer- Details [page 17]
enced a topic for the API to retrieve the
SAP SuccessFactors metadata file.
Changed We added a topic "Default Tenant Config- Default Tenant Configurations for HCM
urations for HCM Suite and Identity Au- Suite and Identity Authentication [page
thentication". 63]
Changed We updated the "Caution" note to warn Default Configuration of Identity Authen-
against manual user creation in Identity tication with SAP SuccessFactors [page
Authentication. 48]
1H 2024
New We created a new topic "Existing Cus- Existing Customers (Before December 9,
tomers (Before December 9,2022) Start 2022) Start Here [page 28]
Here".
New We created a new topic "Checking to See Checking to See if You Aready Have Iden-
If You Already Have Identity Authentica- tity Authentication Enabled [page 25]
tion Enabled".
Change We added a Remember note to clarify Monitoring Tool for the Upgrade to Iden-
how the Monitoring Tool displays the sta- tity Authentication [page 42]
tus and URL for the Upgrade and Change
processes.
Change We added the path for the transformation Define SendMail Transformation [page
code. 97]
Change We've added the default transformations Default Configuration of Identity Authen-
for provided by Identity Provisioning tication with SAP SuccessFactors [page
for SAP SuccessFactors and Identity Au- 48]
thentication
February 6, 2024
Changed We fixed an invalid character ” in the Group Users Based on Login Method
sample code for "loginMethod" and up- [page 105]
dated it to correctly display as ".
Changed We added to the last sentence of the Upgrade to X.509 Certificate-Based Au-
note, a reminder to check the "Automatic thentication for Incoming Calls [page 33]
Renewal" feature to ensure certificate au-
tomatic regeneration.
January 9, 2024
Changed We updated the section "Relay State" SAP SuccessFactors SAML 2.0 Technical
and added a link to examples of valid Re- Details [page 17]
layState values.
Changed We added transformations code for SAP Upgrade from ODATA Identity Provision-
SuccessFactors, as they are different ing Connector to SCIM Connector with
from the default transformations pro- SAP SuccessFactors [page 130]
vided by Identity Provisioning Service.
2H 2023
November 9, 2023
Changed We removed the note under "step 6" and Manage Real-Time Sync of New Hires
added a note advising that the real-time from SAP SuccessFactors to Identity Au-
sync instructions pertain to tenants un- thentication with Identity Provisioning
der the "SAP Cloud Identity Services" en- [page 78]
vironment.
November 8, 2023
Changed We added SCIM API examples for setting Set Up Default Passwords Using Trans-
up default passwords. formations [page 99]
Changed We updated the Identity Authentication Overview of the SAP SuccessFactors and
overview video. Identity Authentication Service Integra-
tion (Video) [page 29]
Changed We added an FAQ section to the Manage Manage Real-Time Sync of New Hires
Real-time Sync of New Hires from SAP from SAP SuccessFactors to Identity Au-
SuccessFactors to Identity Authentica- thentication with Identity Provisioning
tion with Identity Provisioning topic. [page 78]
Changed We added a topic with public API infor- Public API to Retrieve Customer SSO
mation to retrieve service provider meta- Service Provider Metadata [page 117]
data.
Changed We have moved the Change History to Overview of the SAP SuccessFactors and
the end of the guide. Identity Authentication Service Integra-
tion (Video) [page 29]
1H 2023
Change Added note that real-time sync steps Manage Real-Time Sync of New Hires
need to be redone if you've upgraded from SAP SuccessFactors to Identity Au-
from the SAP BTP, Neo environment to thentication with Identity Provisioning
the SAP Cloud Identity infrastructure. [page 78]
Change Added note that its possible to download Running and Scheduling Jobs (User
job execution logs while the jobs are still Sync) [page 146]
running.
Change Added note to Valid Until field as a re- Manage Real-Time Sync of New Hires
minder to extend the expiration date be- from SAP SuccessFactors to Identity Au-
fore the certificate expires. thentication with Identity Provisioning
[page 78]
Change Updated note to point to new Identity Group Users Based on Login Method
Provisioning documentation on adding [page 105]
user groups when the SCIM API Version 2
is in use.
Change • Updated note to include information Migrating Passwords from SAP Success-
about how to update the Password Factors to Identity Authentication in SAP
Validation URL field when using Cloud Identity Services [page 93]
X.509 certificate authentication. Step-by-Step Upgrade of SAP Success-
• Updated the Identity Authentication Factors to Identity Authentication (Video)
Upgrade Video.
[page 30]
Change Updated step 5 referencing login names Adding Users to the SAP Cloud Identity
needing to be an exact match to the Services - Identity Authentication Service
username including case, to include the [page 110]
exception for when Non Case Usernames
is selected in the Manage SAML SSO
Settings page.
Change Added to Tip to advise that default trans- Configure Transformations in Identity
formations in Identity Provisioning can be Provisioning [page 83]
viewed in the Identity Provisioning help
guide, with link to the guide.
Change Added to Tip to advise that default trans- Configure Transformations in Identity
formations in Identity Provisioning can be Provisioning [page 83]
viewed in the Identity Provisioning help
guide, with link to the guide.
January 3, 2023
Change Added note recommending the upgrade Setting Up an API User for Sync Jobs
to mTLS authentication and SCIM API in- in SAP SuccessFactors (Basic Authenti-
tegration as an easier alternative to set- cation Method) [page 35]
ting up the IPSADMIN user.
2H 2022
Change Added note advising that mTLS authen- Remapping an Identity Authentication
tication and SCIM API integration are au- Tenant [page 73]
tomatically applied to remapped Identity
Authentication tenants.
New Created new topic Scenarios for Exist- Scenarios for Existing Customers with
ing Customers with Identity Authenti- Identity Authentication Automatically En-
cation Already Enabled abled [page 29]
December 6, 2022
Change Added notes advising that new cus- Initiating the Upgrade to Identity Authen-
tomers after December 3, 2022 will al- tication in SAP Cloud Identity Services
ready have Identity Authentication/Iden- [page 38]
tity Provisioning enabled with mTLS and
SCIM API integration, with an option to
also authenticate employees and new
hires with Identity Authentication.
December 1, 2022
New Added new topic Manage Real-Time Manage Real-Time Sync of New Hires
Sync of New Hires from SAP Success- from SAP SuccessFactors to Identity Au-
Factors to Identity Authentication with thentication with Identity Provisioning
Identity Provisioning [page 78]
Change Added note recommending the upgrade SAP Cloud Identity Services - Identity Au-
to mTLS authentication between Identity thentication Service Administration Con-
Authentication and SAP SuccessFactors. sole Tasks [page 108]
Change Added reminders that new customers SAP Cloud Identity Services - Identity
after December 3, 2022 already have Provisioning Service Administration Con-
Identity Authentication and Identity Pro- sole Tasks [page 126]
visioning enabled and do not need to
complete manual upgrade steps to ob-
tain Identity Authentication or use IP-
SADMIN user with Identity Provisioning.
Change Added note pointing customers with Getting Started with Identity Authentica-
newly created SAP SuccessFactors HCM tion and SAP SuccessFactors [page 31]
suite tenants to instructions to get
started.
New Added new topic Getting Started with Getting Started with Identity Authentica-
Identity Authentication Aready Enabled tion Already Enabled [page 26]
with SAP SuccessFactors HCM suite
Change Added note with reminder to enable the Configure Your Corporate Identity Pro-
Identity Authentication user store when vider [page 153]
setting up Identity Federation
Change Added description of URL redirect fields Configure Your Corporate Identity Pro-
in the Manage SAML SSO Settings vider [page 153]
Change Added note linking to KBA for trouble- Initiating the Upgrade to Identity Authen-
shooting S-User validation errors. tication in SAP Cloud Identity Services
[page 38]
August 3, 2022
Change Added note advising of scenarios when Monitoring Tool for the Upgrade to Iden-
time stamps and More Information sec- tity Authentication [page 42]
tion on the Monitoring Tool will not dis-
play data.
August 1, 2022
Change Removed steps to add Corporate IDP as Adding an Asserting Party [page 155]
an asserting party from Manage SAML
SSO Settings page, as this option has
been deprecated.
New Added topic Upgrade to X.509 Certifi- Upgrade to X.509 Certificate-Based Au-
cate-Based (mTLS) Authentication in thentication for Incoming Calls [page 33]
SAP SuccessFactors
New Added topic Authenticating New Hires Authenticating New Hires with Identity
with SAP Cloud Identity Services - Authentication in SAP Cloud Identity
Identity Authentication Services [page 76]
1H 2022
Change Added missing comma and quotation Group Users Based on Login Method
mark to JSON code samples [page 105]
June 4, 2022
Change Added note to topic Setting Up an API Setting Up an API User for Sync Jobs
User for Sync Jobs in SAP SuccessFac- in SAP SuccessFactors (Basic Authenti-
tors advising which IP ranges to check cation Method) [page 35]
based on whether Identity Authentication
and Identity Provisioning infrastrucures
are using the same environment.
Change Updated topic Monitoring Tool for the Monitoring Tool for the Upgrade to Iden-
Upgrade to SAP Cloud Identity Services- tity Authentication [page 42]
Identity Authentication
Change Updated topic Initiating the Upgrade to Initiating the Upgrade to Identity Authen-
SAP Cloud Identity Services - Identity Au- tication in SAP Cloud Identity Services
thentication Service [page 38]
Februrary 3, 2022
Change Updated the topic Initiating the Upgrade Initiating the Upgrade to Identity Authen-
to SAP Cloud Identity Services - Identity tication in SAP Cloud Identity Services
Authentication Service [page 38]
Change Updated the topic Testing and Activating Testing and Activating the Upgrade to
the Upgrade to SAP Cloud Platform Iden- Identity Authentication [page 44]
tity Services - Identity Authentication
2H 2021
1H 2021
Note
Refer to the Related Information links below to view all updates to these products:
Change This topic was removed, but the content Partial Single Sign-On (SSO) Login Using
was added to an existing topic within the a Single Corporate Identity Provider (IdP)
same guide. [page 104]
Change A KBA has been added in the Option A Partial Single Sign-On (SSO) Login Using
section. a Single Corporate Identity Provider (IdP)
[page 104]
June 4, 2021
Added A note is added to describe a change SAP Cloud Identity Services - Identity Au-
that will be rolled out, after the 1H 2021 thentication Service Administration Con-
Production Release. The SAML 2.0 Con- sole Tasks [page 108]
figuration Signing Option will be set to
SHA-256.
New A new topic to provide details about set- Define PreferredLanguage Transforma-
ting a preferred language for activation tion [page 98]
emails sent to your users.
2H 2020
Changed You can use the monitoring tool track the Monitoring Tool for the Upgrade to Iden-
progress of your upgrade. tity Authentication [page 42]Monitoring
Tool for the Upgrade to SAP Cloud Plat-
form Identity Authentication
Changed Added information around setting up Set Up Default Passwords Using Trans-
a default password transformation for formations [page 99]Set Up Default
nonemail users. Passwords Using Transformations
Changed We've enhanced the process for upgrad- Initiating the Upgrade to Identity Authen-
ing your tenants. When you upgrade, you tication in SAP Cloud Identity Services
can select the tenant to upgrade to. [page 38]Initiating the Upgrade to SAP
Cloud Platform Identity Authentication
Related Information
Hyperlinks
Some links are classified by an icon and/or a mouseover text. These links provide additional information.
About the icons:
• Links with the icon : You are entering a Web site that is not hosted by SAP. By using such links, you agree (unless expressly stated otherwise in your agreements
with SAP) to this:
• The content of the linked-to site is not SAP documentation. You may not infer any product claims against SAP based on this information.
• SAP does not agree or disagree with the content on the linked-to site, nor does SAP warrant the availability and correctness. SAP shall not be liable for any
damages caused by the use of such content unless damages have been caused by SAP's gross negligence or willful misconduct.
• Links with the icon : You are leaving the documentation for that particular SAP product or service and are entering an SAP-hosted Web site. By using such links,
you agree that (unless expressly stated otherwise in your agreements with SAP) you may not infer any product claims against SAP based on this information.
Example Code
Any software coding and/or code snippets are examples. They are not for productive use. The example code is only intended to better explain and visualize the syntax and
phrasing rules. SAP does not warrant the correctness and completeness of the example code. SAP shall not be liable for errors or damages caused by the use of example
code unless damages have been caused by SAP's gross negligence or willful misconduct.
Bias-Free Language
SAP supports a culture of diversity and inclusion. Whenever possible, we use unbiased language in our documentation to refer to people of all cultures, ethnicities, genders,
and abilities.
SAP and other SAP products and services mentioned herein as well as
their respective logos are trademarks or registered trademarks of SAP
SE (or an SAP affiliate company) in Germany and other countries. All
other product and service names mentioned are the trademarks of their
respective companies.