SAP BTP Security- IAM ( IAS & IPS ) and Application Security

5.0 Ratings
300 Learners

SAP BTP is Platform as Service offered by SAP. You can develop new custom application on top of BTP using different services offered on BTP. You also can subscribe pre delivered application provided  by SAP on BTP. The Security of BTP Platform , Pre delivered application and Custom Application is really important and SAP has provided Identity Access Managing and Identity Access Governance related tool for the same. We are going to learn those tools with real time implementation as part of this course, Join us to get the  

In collaboration with

24 Hrs
Online Class
3 Hrs
10 Hrs

24 Hrs Instructor-led Training

Mock Interview Session

Project Work & Exercises

Flexible Schedule

24 x 7 Lifetime Support & Access

Valid Certification

Course Benefits

SAP BTP Security- IAM ( IAS & IPS ) and Application Security Course Overview

In this course we will learn about

1- You will learn SAP BTP Identity and Access management using IAS

2- You will also learn Identity life cycle management using IAS and IPS

3- We will focus on Identity Provisioning Scenarios with different use cases+

4- You will learn authentication and authorisation concept on BTP and how to automate them

5- We will use IAS as a custom Identity provider with customisation having the capability to deligate its responsibility to any corporate identity provider like Azure AD, Okta, SAILPoint.. etc.

This course is recommended to all the SAP Basis Consultant, SAP Security consultant, SAP IDM and SSO, BTP Administrator and SAP GRC Consultant.

There is no prerequisite to this course, having understanding of security related terminology will be a added advantange.

Mentors Pool follows a rigorous certification process. To become a SAP BTP Security Certified , you must fulfill the following criteria:

  • Online Instructor-led Course:
  1. Successful completion of all projects, which will be evaluated by trainers
  2. Scoring a minimum of 60 percent in the SAP BTP Security Certified quiz conducted by Mentors Pool

Obtaining a certification in SAP Business Technology Platform (BTP) Security can provide various benefits to individuals and organizations. Here are some of the key advantages of earning this certification:

  1. Skill Validation: SAP BTP Security certification validates your expertise in securing SAP’s cloud-based platform. It demonstrates your knowledge and skills in ensuring the security of applications, data, and resources within the platform.
  2. Career Advancement: Certification can open up career advancement opportunities. Many organizations value certified professionals and may consider them for roles with higher responsibility and better compensation.
  3. Competitive Advantage: In a competitive job market, having a recognized certification can give you a competitive edge over other candidates. It can help you stand out to potential employers.
  4. Enhanced Knowledge: Preparing for the certification exam requires a deep understanding of SAP BTP security principles and best practices. This knowledge can be applied to your job and contribute to better security practices in your organization.
  5. Industry Recognition: SAP is a leading provider of enterprise software solutions, and their certifications are widely recognized and respected in the IT industry. Holding an SAP certification can be a mark of excellence in the field.
  6. Increased Confidence: Certification can boost your confidence in your own abilities and knowledge. This confidence can lead to better decision-making and more effective problem-solving in your role.
  7. Expanded Network: Joining the community of certified SAP professionals can expand your professional network. You may connect with other certified individuals who can provide support, advice, and collaboration opportunities.
  8. Alignment with Best Practices: SAP certifications are typically based on industry best practices and the latest technologies. By earning a certification, you align your skills with the current standards and trends in SAP security.
  9. Demonstrated Commitment: Achieving a certification demonstrates your commitment to ongoing professional development and a willingness to invest time and effort in advancing your skills.
  10. Improved Security Posture: With a strong understanding of SAP BTP security, certified professionals can contribute to better security practices and the mitigation of security risks within their organizations.

It’s worth noting that the specific benefits of SAP BTP Security certification may vary depending on your career goals, your organization’s needs, and the specific role you hold or aspire to. To maximize the benefits, it’s essential to stay current with SAP security developments and continue learning and growing in the field even after obtaining the certification

Talk to Us

IN: +91-8197658094

The Average salary of SAP BTP Security Consultant lies between¬†‚āĻ3.1 Lakhs to ‚āĻ12.0 Lakhs.


Self Paced Training

Rs. 15000

Enrolment validity: Lifetime

  • 24 Hrs of Instructor-led Training
  • 1:1 Doubt Resolution Sessions
  • Attend as many batches for Lifetime
  • Flexible Schedule
3 April SAT - SUN 08:00 PM TO 11:00 PM IST (GMT +5:30)
11 April SAT - SUN 08:00 PM TO 11:00 PM IST (GMT +5:30)
17 April SAT - SUN 08:00 PM TO 11:00 PM IST (GMT +5:30)
20 April TUE - FRI 07:00 PM TO 9:00 PM IST (GMT +5:30)



25th Aug
1st Sept
20th Oct
27th Oct


Sat-Sun ( Weekend Class )
Sat-Sun ( Weekend Class )
Sat-Sun ( Weekend Class )
Sat-Sun ( Weekend Class )


8:00 PM – 10:00 PM IST (GMT +5:30)
8:00 PM – 10:00 PM IST (GMT +5:30)
8:00 PM – 10:00 PM IST (GMT +5:30)
8:00 PM – 10:00 PM IST (GMT +5:30)

Enrolment validity: Lifetime

EMI Option Available with different credit cards


Corporate Training

  • Customised Learning
  • Enterprise grade learning management system (LMS)
  • 24x7 Support
  • Enterprise grade reporting

Course Content

SAP BTP Security- IAM ( IAS & IPS ) and Application Security Course Content

  • What is Cloud Computing?
  • Benefits of Cloud
  • What is BTP?
  • What is SAP CF?
  • CF Architecture and services
  • Regions
  • Global Accounts and Sub-Accounts
  • Hyperscalers
  • Service Entitlements and Entity Assignment¬†
  • Global Account User Management¬†
  • Sub-account User management
  • Understanding Role and Role Collection on BTP for platforma as well as Application
  • Difference between AuthN and AuthZ
  • User & Roles – Segregation of duties
  • What is CF UAA, Platform UAA and XSUAA?
  • oAuth Overview
  • oAuth Flows
  • Understanding oAuth flow for Authorization Code and Client Credentials
  • Rate Limiting¬†
  • Limitations on Bindings and Service Keys
  • Role Collections, Roles, Scopes and Attributes
  • xs-security.json
  • JWT
  • What is AppRouter?
  • Why is AppRouter needed?
  • xs-app.json
  • Introduction to SAP Cloud Identity¬† Services¬†
  • What is Identity provider and why to use them¬†
  • What is default identity provider and what is customer Identity provider¬†
  • Why to use custom identity provider not default one¬†
  • Understanding IAS and Identity provider for Platform and Business Users¬†
  • SAP CIS Features
  • SAP CIS Scenarios¬†
  • SAP CIS Use Cases¬†¬†
  • Entity Assignment for Cloud Identity Services
  • Subscribing Cloud Identity Services within Sub Account
  • ¬†Understanding CIS as Identity provider for Platform users and Application users¬†
  • Establishing Trust between CIS and BTP as Identity provider for Platform Users
  • CIS as Identity Provider for Business Users
    • Establishing Trust Using OpenID Connector¬†
    • Establishing Trust using SAML protocol¬†
  • Understanding concept of Shadow users
  • Understanding Authentication and Authorization concept¬† on BTP¬†
  • What is Federated Authorization¬†
  • How it is different from Manual Authorization Assignment
  • Understanding Users Groups in CIS¬†
  • Setting up Role Collection Mapping with CIS for Platform and Application Users using User groups¬†
  • SAP CIS ( IAS ) User management¬†
  • SAP CIS (IAS ) User Group Management¬†
  • Adding Administrator and different type of Administrator¬†
  • Understanding available role for CIS Administrator
  • Importing Users
  • Exporting Users
  • Understanding Schemas available on CIS – IAS
  • Setting up Exclude List
  • Onboarding Application on CIS -IAS
  • Term of Use Document¬†
  • Privacy Policy Document
  • Customizing Email Templates¬†
  • Setting up Password Policies¬†
  • Setting Up Custom Css for Login Page Customization
  • Customizing Tenant Text
  • Setting up Exclude List
  • Tenant Settings and Information
  • System Notifications and Alerts
  • Security Alerting
  • Blocking and Deletion
  • Logon Alias
  • Risk Based Authentication
  • Multi Factor Authentication
  • SAML 2.0 Configuration
  • Trusted Domain
  • What is corporate Identity Provider
  • Understanding CIS-IAS as Proxy Identity Provider with Corporate IDP¬†
  • Adding Corporate Identity Provider in CIS – IAS¬†
  • Setting Up Scenario where CIS – IAS works as Proxy Identity Authentication Service¬† and Corporate Identity Provider work as Main Identity provider
  • Understanding Reporting for Different Logon Counters
  • Audit & Change Logs
  • Troubleshooting Logs¬†
  • IPS Overview
  • IPS Use Cases
  • IPS Tenant Model
  • IPS Tenant Infrastructure
  • IPS System Types
  • Source System
  • Target System
  • Understanding IPS as a Proxy¬†
  • Integrate two System using IPS Source and Target System framework

Free Career Counselling

Course Projects

Setting Up Auto User Creation and Federated Authorization using IAS

Establishing trust between IAS and BTP using SAML and OpenID Connect. Onboard users to setup auto authentication and user creation in BTP, Create group in IAS and Setup federated aurthorization using role collection mapping.

Configuring IAS for B2C, B2B and B2E Applications and customising IAS Branding for each of them

Onboard different types of application in IAS and customising the login and authentication page with the different types of branding features available at application level and IAS tenant setting levels.

Configure SSO, MFA, conditional and risk based authentication using IAS

Use the scenario of " project-1 " configure SSO and MFA based on various Identity providers and risk associated with different type of users.

Course Certification

SAP BTP supports identity federation, a concept of linking and reusing digital identities of a user base across loosely coupled systems. Identity federation frees applications on SAP BTP as well as the platform itself from the need to obtain and store the credentials of users and to authenticate them.

SAP BTP Security refers to the set of measures and practices implemented to protect the data, applications, and infrastructure within the SAP BTP environment.

SAP (Systems Applications and Products) Security is a means¬†to protect your company’s data and systems by monitoring and controlling access both internally and externally. SAP Systems are a type of ERP software used widely by all kinds of businesses across a variety of industries.

SAP security encompasses three core areas of cyber security: access control, data security and application security. To be secure, an SAP landscape is subject to strict access controls, and the system data should be protected as well as possible

SAP (Systems Applications and Products) Security is a means to protect your company’s data and systems by monitoring and controlling access both internally and externally. SAP Systems are a type of ERP software used widely by¬†all kinds of businesses across a variety of industries

SAP BTP is built on four core pillars, each serving a distinct purpose to support various aspects of digital transformation and business innovation:
  • Database and Data Management
  • Analytics and Data Intelligence
  • Application Development and Integration
  • Intelligent Technologies
Click On Image To Zoom

Certification Course Reviews

passport pic - Bhavya Nukala

Very interactive session, It was a very interesting session. There was a lot of stuff to learn, analyze and implement in our career. I want to give 10/10 to a mentor pool for their experts.

DSC_0489 copy - Shakti Annam

Very good, wonderful explanation by trainer, They did handsOn based on real time scenarios Improved my skills Highly recommended. The most important thing in training is hand-on and the training was 80- 85 % hands on that's the plus point of Mentors Pool

img057 - sai chaitanya

Trainer explains each and every concept with perfect real time examples, which makes it really easy to understand. I gained more knowledge through him. The way of explaining is awesome.

IMG_20200925_132927 - Amarjeet Singh

The way the trainer explained to me is very interactive, he solved all my queries with perfect examples. Helped me in cracking the TCS interview. I am very grateful that I came across Mentors Pool

Certification Course FAQs

This course is specifically designed to help you clear the certification exam successfully. The comprehensive content of the course along with demonstration of practical scenarios & examples will make you understand each and every topic in great depth. Since the course structure has a special focus on certification, hence you will go through a lot of real-time case studies and study material during the training that will help you crack the certification exam.

We have a highly qualified and experienced team of professionals who are experts in their fields. Our trainers are highly supportive and render a friendly learning environment to the students focusing on their career growth.

We provide server access for you to practice on and our trainers will ensure that you get practical real-time experience and training with all the utilities required for in-depth understanding of the course.

Yes, we don’t assure 100% placement assistance. We are tied up with some corporate companies so when they have a requirement we send your profiles to them.

You can call our customer care 24/7 to our support.

Yes, we provide demo before starting any training in which you can clear all your doubts before starting training.

Talk to Us

IN: +91-8197658094

Recommended Courses