Blog

Managing SAP's automated access termination process

Managing SAP's automated access termination process
Chris Harmour
Written By Chris Harmour
written

18 Feb, 2019 — 3 min read

Managing SAP's automated access termination process

Table of contents

Managing SAP's automated access termination process
2:09

Companies across the globe all face similar issues when it comes to effectively managing the termination of access to IT applications when an employee/contractor has the left the organisation. 

It is not uncommon to find terminated users who are inconsistently managed across the environment, for example; a terminated user who is both valid and unlocked; a user who is locked but is valid; a user who is unlocked but is invalid; or a user who is assigned to the group terminated but is neither locked or valid.

Often the system that manages employment status and validity (employee source of truth) is independent of the systems performing access management, which can cause a disconnect in the termination process if the two systems are not integrated. This regularly leads to ongoing audit issues and a lot of manual effort to manage.

The video below illustrates a use case of an organisation who is looking for an automated way to address this concern in their IT landscape.

The companies Active Directory system is the source of truth for employees and the subsequent network account disablement of users is independent of the SAP account disablement process, which often leads to an inconsistent treatment of user access and terminated user accounts left open.

The company leverages their SAP GRC Access Control tool and integrates this with their ITSM tool ServiceNow to automate the termination of users, based on AD account termination events to provide a consistent and automated way of managing the user termination process.

So that's a quick overview to help you manage this process effectively.

How integrating SAP IDM and SAP GRC can help your business twitter banner

About Turnkey

Turnkey Consulting is helping to make the world a safer place to do business by specialising its expertise across Integrated Risk Management, Identity and Access Management, and Cyber and Application Security. We provide business consulting, technology implementation and managed services to help customers safeguard their application environments - protecting critical ERPs (such as SAP, Oracle and MS Dynamics) and wider enterprise systems.

Security insights, delivered.

Join 10,000+ risk professionals. Get the latest trends, guides, and case studies sent directly to your inbox.

By subscribing, you agree to our Privacy Policy and provide consent to receive updates.

Related posts

April 15, 2026

Five questions to guide your move to GRC for HANA 1.0

March 18, 2026

The Next Generation of GRC: What It Means for SAP Customers

March 13, 2026

Missed TAC CCR 2026? Here are the 3 big takeaways