![Identity Management and SAP Users, Roles and Transactions - Part1 - IBM Security Identity and Access Identity Management and SAP Users, Roles and Transactions - Part1 - IBM Security Identity and Access](https://www.ibm.com/blogs/security-identity-access/wp-content/uploads/2018/08/SAP-Authorization-Model.png)
Identity Management and SAP Users, Roles and Transactions - Part1 - IBM Security Identity and Access
![Securing an application with role templates and scopes on the SAP Business Technology Platform | SAP Blogs Securing an application with role templates and scopes on the SAP Business Technology Platform | SAP Blogs](https://blogs.sap.com/wp-content/uploads/2021/04/user_group.jpg)
Securing an application with role templates and scopes on the SAP Business Technology Platform | SAP Blogs
![Chapter 6 Integrating Waveset and SAP BusinessObjects Access Control (Oracle Waveset 8.1.1 Deployment Guide) Chapter 6 Integrating Waveset and SAP BusinessObjects Access Control (Oracle Waveset 8.1.1 Deployment Guide)](https://docs.oracle.com/cd/E19225-01/821-0093/images/Sapgrc-scen1.gif)
Chapter 6 Integrating Waveset and SAP BusinessObjects Access Control (Oracle Waveset 8.1.1 Deployment Guide)
![Identity Management and SAP Users, Roles and Transactions - Part1 - IBM Security Identity and Access Identity Management and SAP Users, Roles and Transactions - Part1 - IBM Security Identity and Access](https://www.ibm.com/blogs/security-identity-access/wp-content/uploads/2018/08/SAP-Authzns-for-a-Role.png)