• Download a trial
  • Sales
  • Support
  • Login
logo
  • Home
  • Products
  • Solutions
  • Partners
  • About Us
  • Consulting
  • Resources
Request a Quote
  • Workforce Identity
  • Customer Identity
  • Comparison
  • Subscriptions

All Features

Overview of all features in Workforce Identity

User Onboarding and Offboarding

Automate joiner, mover, leaver processes

Access Request

Access requests with multi-step approvals

User Access Reviews

Save time with user access reviews

Self-Service Portal

Self-service portal for all end user activities

Segregation of Duties

Detect and remediate SoD violations

Password Management

Enforce password policies and enable synchronization

Single Sign-On (SSO)

Enable SSO using standards - SAML, oAuth, OIDC

Authentication and MFA

Improve security with adaptive authentication and MFA

3rd Party IdP Integration

Integrate with your existing identity provider

Integration API

Use the REST API to add identity into your applications

Connector Library

Integrate on-premise and SaaS applications

Modern Architecture

Microservice architecture that supports deployment using RPM, Kubernetes or OpenShift

Workforce Identity Concepts

All Features

Overview of all features in Customer IAM

Authentication and MFA

Improve security with adaptive authentication and MFA 

Single Sign-On (SSO)

Enable SSO using standards - SAML, oAuth, OIDC

Password Management

Enforce password policies and enable synchronization

Modern Architecture

Microservice architecture that supports deployment using RPM, Kubernetes or OpenShift

Customer Identity Concepts

Community vs Enterprise

Summary of the differences between the Community and Enterprise editions

Subscription Benefits

Overview of the benefits provided by an OpenIAM subscription

  • Integrations
  • Verticals
  • Workforce Use Cases
  • CIAM Use Cases
  • Compliance
  • Data Breach Mitigation

Active Directory

Azure (O365)

SAP

Workday

AWS

Linux Server

LDAP

Microsoft SQL Server

Google Cloud

Windows Server

Oracle EBS

ServiceNow

SAP Fiori

Oracle Fusion

Entra ID

Salesforce

Keycloak

Custom Applications

Education

Manage identity for students, staff and alumni

Financial Services

Address the compliance and security challenges of the financial sector

Manufacturing

Identity Governance That Works in Practice

CIAM for Regulated Industries

NIS2

Achieve compliance with the EU directive for cybersecurity frameworks.

DORA

Comply with the Digital Operational Resilience Act for the EU.

HIPAA

For healthcare organizations seeking HIPAA compliance.

PCI DSS

Compliance with the Payment Card Industry Data Security Standard

SOC 2

Solutions for organizations subject to SOC 2 audits

GDPR

Take advantage of OpenIAM to comply with the General Data Protection Regulation

Social Engineering Attacks

  • Partners

Current Partners

Our Current Partners

Partner Registration

  • About Us

About OpenIAM

Learn about OpenIAM

Press Releases

References to OpenIAM press releases

OpenIAM in the Media

References to OpenIAM in the media

Careers

Learn about open positions at OpenIAM.

  • Consulting

Proof of Value

Customized engagement to confirm defined proof of value objectives

Jump Start

Customized engagement to rapidly deliver a solution into production

Solution Implementation

Engagement with the objective to deliver a complete IAM solution based on customer requirements

  • Resources

Videos

Collection of videos describing how OpenIAM can be used to solve common use cases

Community Portal

Collaborative community portal to learn more about OpenIAM

CE Documentation

Documentation for the Community Edition

Blog

Musings on identity penned by the OpenIAM team

Webinar Calendar

Upcoming webinars and training sessions

Workforce Identity Concepts

Customer Identity Concepts

SAP IDM is being retired. Your migration window is open now.

SAP Identity Management is entering end of mainstream maintenance. OpenIAM is the purpose-built replacement — full feature parity with SAP IDM, native connectors across your SAP landscape, and governance that extends beyond the SAP boundary that SAP IDM never reached. Deployment in weeks, not quarters.

SAP IDM maintenance timeline

Now — May 2026

Evaluation window open

The optimal window to evaluate, procure, and begin migration planning.

Dec 31, 2027

Mainstream maintenance ends

SAP stops providing patches, updates, and standard support for SAP IDM.

Dec 31, 2030

All SAP IDM support ends

All forms of SAP support for SAP IDM end. No vendor support of any kind.


If your evaluation, procurement, and deployment cycle is 6–12 months, the decision window to begin your migration is now — not at the 2027 deadline.


The deadline is real. Here is exactly where you stand.

SAP has been clear about the SAP IDM end of life roadmap. These are not rumors or analyst predictions — they are published SAP product lifecycle dates. Understanding where you are in the timeline is the first step to planning a migration that doesn't become a crisis.

Date SAP IDM milestone What it means for your organization
2004–2023 SAP IDM active innovation SAP IDM receives regular feature development and roadmap investment.
2023 Innovation freeze SAP announces end of new feature development for SAP IDM. Bug fixes and security patches continue under mainstream maintenance.
NowMay 2026 Evaluation window open The optimal window to evaluate, procure, and begin migration planning. A 6–12 month evaluation and deployment cycle lands before the 2027 mainstream maintenance deadline with time to spare.
Dec 31, 2027 Mainstream maintenance ends SAP stops providing patches, updates, and standard support for SAP IDM. Organizations on SAP IDM after this date operate without SAP-backed support.
2028–2030 Extended maintenance only Extended maintenance (additional cost) provides limited support — security patches and legal/regulatory changes only. No new functionality. No standard support response SLA.
Dec 31, 2030 End of all SAP IDM support All forms of SAP support for SAP IDM end. Organizations still running SAP IDM after this date operate without any SAP vendor support.

If you also have SAP GRC Access Control 12.0

You face the same decision on the same deadline.

SAP GRC Access Control 12.0 mainstream maintenance ends December 31, 2027 — the same deadline as SAP IDM. SAP GRC for HANA 2026 (the successor) requires SAP HANA database and S/4HANA Foundation as prerequisites. Organizations on non-HANA databases face an additional database migration before they can upgrade to GRC 2026. OpenIAM works alongside SAP GRC — you do not need to replace GRC to use OpenIAM. But if you are evaluating both your SAP IDM replacement and your GRC 2026 path simultaneously, OpenIAM can serve as the cross-platform governance layer that complements whichever GRC path you choose.


SAP IDM isn't just a tool. It's a set of controls. When support ends, those controls stop being maintained.

Many organizations treat SAP IDM as background infrastructure — it runs, the lights are on, no one thinks about it. That changes when mainstream maintenance ends. The risk isn't that SAP IDM stops working on December 31, 2027. The risk is that it stops being patched, stops receiving security updates, and stops being auditable as a maintained internal control.

For organizations with compliance obligations — SOX, IFC, DORA, or any framework that requires controls to be operating effectively — running governance infrastructure on unsupported software creates an audit risk even before the software itself develops problems. 

SAP IDM capability What stops being maintained after 2027

Role-based provisioning

Provisioning workflows that depend on SAP IDM receive no updates when SAP ECC or S/4HANA change their API interfaces. Integration breaks are not fixed under extended maintenance.

Access certifications

The certification workflow engine receives no new feature development and no compatibility updates when connected systems upgrade. Certifications may continue to run but cannot be audited as a supported, maintained control.

User lifecycle management

Joiner-Mover-Leaver workflows tied to HR system integrations (SAP HCM or SuccessFactors) receive no updates when the source system changes. HR-driven provisioning becomes unreliable without patches.

Orphaned account management

Automated orphan detection receives no updates. Orphaned accounts — one of the most commonly cited IFC and SOX findings — may accumulate undetected as the detection logic becomes stale.

Security patches

Known vulnerabilities in SAP IDM components are not patched after 2027 under standard maintenance. Extended maintenance patches legal and regulatory changes only — not security vulnerabilities.

Auditor attestation

Auditors increasingly ask whether the tools used to produce compliance evidence are themselves operating under vendor support. Unsupported governance infrastructure becomes a qualification risk for the evidence it produces.

When SAP IDM goes away, three paths exist. Here is what each one actually means.

Every organization facing the SAP IDM migration evaluates the same three options. The right choice depends on your SAP landscape, your compliance obligations, and your timeline. Here is an honest assessment of each path.

Criteria SAP GRC for HANA 2026 Enterprise IGA platform OpenIAM
What it is SAP’s own successor governance platform — Access Control, Process Control, Risk Management on HANA architecture. SailPoint, Saviynt, or similar — full enterprise IGA platforms that also cover SAP. Purpose-built IGA for mid-market SAP environments — SAP IDM replacement plus cross-platform governance.
SAP coverage Deep — native SAP integration across the full GRC suite. Deep — broad connector libraries covering SAP and hundreds of other systems. Deep — native connectors for S/4HANA, ECC 6.0, Fiori, SuccessFactors, UME, plus vertical modules on roadmap.
Non-SAP coverage SAP boundary only — does not govern Microsoft 365, Salesforce, or SaaS applications. Full enterprise landscape — governs all connected systems. Full landscape — SAP, Microsoft 365, Salesforce, ServiceNow, SaaS, and on-premises systems.
Prerequisites Requires SAP HANA database and S/4HANA Foundation. Non-HANA customers face a database migration before upgrading. None — independent of SAP architecture. Connects via standard SAP connectors. None — connects to ECC 6.0 and S/4HANA as-is. No database migration required.
Mid-market fit Designed for SAP shops with dedicated SAP Basis and GRC expertise. Complex configuration. Designed for enterprises with dedicated IAM teams and 12–18 month implementation budgets. Built for mid-market. No dedicated IAM team required. Deployment in weeks.
Timeline 6–18 months depending on HANA migration prerequisite. 12–18 months typical implementation. Weeks to first value. Full deployment typically 6–12 weeks.
Pricing model SAP licensing — typically priced as extension of existing SAP contract. Enterprise licensing — priced for 5,000+ seat organizations. Mid-market pricing — proportionate to the problem, not the vendor’s revenue base.
Best for SAP-only
Organizations already on HANA with strong SAP GRC expertise who want to stay within the SAP ecosystem.
Large enterprise
Large enterprises with dedicated IAM teams, complex multi-system landscapes, and 18-month implementation capacity.
Recommended
Organizations that need SAP IDM replaced quickly, cost-effectively, and with governance that extends beyond SAP.

Everything SAP IDM did. And the things it never could.

The most common concern in an SAP IDM migration evaluation is functional coverage: will the replacement do everything SAP IDM did? OpenIAM provides full parity across every core SAP IDM capability. In several areas, it goes further — particularly around non-SAP governance, which SAP IDM was architecturally unable to address.

SAP IDM capability OpenIAM equivalent Status
Role-based provisioning to SAP Role-based provisioning to SAP ECC, S/4HANA, Fiori, and UME — attribute-driven automation, same behavior with broader system coverage. Parity
Access request and approval workflows Configurable access request and approval workflows across SAP and all connected systems — self-service portal, manager approval, automatic routing. Parity
Joiner-Mover-Leaver lifecycle automation JML automation driven by SuccessFactors or any HR system as the source of truth — real-time or scheduled sync via OData API. Parity
Access certifications and recertifications Scheduled and event-triggered access certification campaigns — audit trail, evidence export, risk-flagged review items. Parity
Orphaned account detection and management Automated orphan detection, reconciliation workflow, and documented remediation across all connected systems — audit evidence included. Parity
SAP role management Full SAP role management including SoD analysis — a capability SAP IDM did not natively include. Upgrade
SoD conflict detection Pre-built vertical SoD rule sets (manufacturing, financial services) with T-code level detection — SAP IDM had no native SoD detection capability. Upgrade
SAP-only system coverage SAP plus Microsoft 365, Salesforce, ServiceNow, SaaS applications, and on-premises systems — governed from one platform with one access certification campaign. Upgrade
Reporting and audit evidence Audit-ready violation and certification reports — formatted for auditor review, no transformation required. Includes cross-system access visibility that SAP IDM could not produce. Upgrade
SAP GRC integration OpenIAM SoD module works alongside SAP GRC Access Control — extend your GRC investment rather than replace it. SAP IDM had no GRC integration capability. Upgrade

The bottom line on parity

OpenIAM covers every core SAP IDM capability. In five areas, it goes further.

OpenIAM provides full functional parity across every core SAP IDM capability. In five areas — SoD detection, SAP role management, non-SAP governance, cross-system reporting, and SAP GRC integration — OpenIAM goes further than SAP IDM ever did. The migration from SAP IDM to OpenIAM is not a lateral move. It is an upgrade.


For the full detail on OpenIAM's SoD enforcement capability -- including pre-built rule sets, T-code detection, and the worked violation example -- see how SAP SoD enforcement works.

The SAP environment you're running today. Governed from day one.

Most mid-market SAP customers are not running pure S/4HANA. OpenIAM supports the SAP landscape you have — including the ECC 6.0 environments that enterprise IGA vendors treat as legacy.

SAP connector Coverage — available now
SAP S/4HANA Cloud and on-premise. Current-generation SAP ERP.
SAP ECC 6.0 The dominant mid-market deployment. Fully supported — not legacy.
SAP NetWeaver / Fiori Middleware and UX layer governance. Fiori launchpad tile assignment control.
SAP SuccessFactors HCM system of record. JML automation source via OData API.
SAP UME User Management Engine. Java stack and SAP Enterprise Portal.

Roadmap connectors — in active development

SAP Transportation Management (TM)  •  SAP Extended Warehouse Management (EWM)  •  SAP Dealer Business Management (DBM)

Contact us to discuss roadmap timelines relevant to your SAP environment.


See how OpenIAM turns SuccessFactors HR events into automated, audit-ready access governance across SAP and every connected system: SuccessFactors identity governance.

A migration approach designed to get you running before the deadline.

Replacing SAP IDM is not a 12-month program. OpenIAM's migration approach is structured in three phases — each with a clear output — designed for a mid-market team without a dedicated IAM function.

Phase 1 — Weeks 1–2

Connect and inventory

Connect OpenIAM to your SAP ECC or S/4HANA environment using the native SAP connector. OpenIAM reads your current user population, role assignments, and access data — read-only, no changes to SAP during this phase. Run the first access scan: identify all current users, their role assignments, and any SoD violations in the existing role landscape. This gives you a baseline of what you are migrating from and what needs to be remediated.

Output:A complete inventory of your SAP user and role landscape, with an initial SoD violation report ready for review.

OpenIAM ships pre-built SoD rule sets for manufacturing and financial services environments -- see the SAP SoD rules for manufacturing for the full 45-rule detail.

Phase 2 — Weeks 3–8

Configure and parallel run

Configure OpenIAM's provisioning workflows to mirror your existing SAP IDM processes — joiner provisioning, role request workflows, access certification campaigns. For each SAP IDM workflow, map the equivalent OpenIAM configuration. Run OpenIAM and SAP IDM in parallel for 2–4 weeks. Compare outputs — provisioning actions, access certifications, orphan detections — to validate that OpenIAM is producing consistent results before SAP IDM is decommissioned.

Output:Validated OpenIAM configuration in parallel operation. Confidence that cutover will not disrupt business operations.

Phase 3 — Weeks 9–12

Cutover and decommission

Cut over from SAP IDM to OpenIAM as the active governance platform. Decommission SAP IDM workflows. Activate OpenIAM SoD scanning, access certification campaigns, and scheduled JML automation. Document the migration for audit purposes: the date SAP IDM was decommissioned, the date OpenIAM became the active governance system, and the mapping of controls from SAP IDM to OpenIAM equivalents. This documentation is the evidence auditors request when assessing whether internal controls remained effective during the migration.

Output:OpenIAM active as the sole governance platform. SAP IDM decommissioned. Audit evidence of the migration documented and retained.

On migration timing

If your target is before December 31, 2027 — begin evaluation now.

The three-phase approach above is a typical mid-market migration. Actual timelines depend on the complexity of your SAP IDM workflow configuration, the size of your SAP user population, and the availability of internal SAP Basis resources for the connector setup. A procurement and deployment cycle that begins in the second half of 2026 gives adequate time with contingency. Organizations that begin evaluation in 2027 risk running into the deadline under time pressure.


<--Back to SAP compliance overview: SoD enforcement, SAP IDM replacement, and SuccessFactors lifecycle governance in one platform.

Frequently Asked Questions

We’re still running SAP ECC 6.0. Does OpenIAM support it?

⌄

Yes — fully. SAP ECC 6.0 is one of OpenIAM’s core supported connectors. We treat ECC 6.0 as a primary deployment target, not a legacy environment. The majority of mid-market SAP customers are running ECC today, often mid-migration to S/4HANA or with no near-term migration planned. OpenIAM governs the SAP landscape you have now and extends governance to S/4HANA when you are ready. The migration from SAP IDM to OpenIAM does not depend on or require an S/4HANA migration.

We also have SAP GRC Access Control. Do we need to replace that too?

⌄

No. OpenIAM is designed to work alongside SAP GRC, not replace it. SAP GRC continues to manage access control within your SAP environment. OpenIAM governs the systems GRC cannot reach — Microsoft 365, Salesforce, ServiceNow, and your SaaS stack — and provides a unified access certification campaign across all of them. If you are also facing the GRC 12.0 maintenance deadline, OpenIAM can serve as the cross-platform governance layer while you evaluate your GRC 2026 migration path independently. The two decisions do not need to be made simultaneously.

How do we handle the audit period during the migration — when neither system is fully in control?

⌄

The parallel run phase (Phase 2 in the migration approach above) is specifically designed to address this. During the parallel run, both SAP IDM and OpenIAM are active. OpenIAM’s access certification and provisioning outputs are compared to SAP IDM’s outputs to validate consistency. This parallel period — typically 2–4 weeks — generates audit evidence that governance controls remained continuously effective during the transition. The cutover documentation, which maps each SAP IDM control to its OpenIAM equivalent, provides the audit trail that auditors typically request when assessing control continuity during a system migration.

Can OpenIAM import our existing SAP IDM role assignments and workflow configurations?

⌄

Yes. OpenIAM’s bulk import capability accepts SAP IDM configuration exports in XML format. Role assignment data, workflow definitions, and access certification history can be imported and mapped to OpenIAM’s data model. For complex SAP IDM implementations with significant custom workflow logic, OpenIAM’s professional services team can assist with the configuration mapping — though most standard SAP IDM deployments can be migrated using the self-service import tools without additional professional services. The migration readiness assessment (primary CTA above) evaluates your specific SAP IDM configuration and identifies any areas that will require attention during migration.

Let’s Connect

Managing identity can be complex. Let OpenIAM simplify how you manage all of your identities from a converged modern platform hosted on-premises or in the cloud.

For 15 years, OpenIAM has been helping mid to large enterprises globally improve security and end user satisfaction while lowering operational costs.

Download a Trial Contact Sales
footer-top-logo
openIAM-white-logo

All modules of our IAM platform share a common infrastructure allowing customers to see one unified identity solution versus a collection of disparate products.

  • linkedin-icon
  • facebook-icon
  • twitter-icon
  • youtube-icon

sales@openiam.com

(858)935-7561

Copyright © 2026 OpenIAM. All rights reserved.
  • Privacy Policy