Goodbye, SAP IDM: End of Life. Time to rethink Identities

Goodbye SAP IDM: End of Life – Time to Rethink Identity Management

How SAP’s IDM End of Life decision opens the door for leaner, modern IAM landscape. When SAP announced the sunset of its on-premises Identity Management (SAP IDM) product, it marked more than just the end of a software line, it opened a strategic question for IT and security leaders across Europe: 
“If we’re forced to rearchitect identity management anyway — why simply replace what we had, when we could build something smarter?” 
This article kicks off a series exploring how open standards, cloud-native architectures, and sovereign SaaS solutions like cidaas provide a viable, secure, and cost-efficient alternative to simply replacing SAP IDM with another heavyweight enterprise suite.

The SAP IDM End of Life: What’s Happening when?

SAP IDM, the long-standing identity lifecycle platform used to provision and manage access in SAP-heavy landscapes, will no longer be supported. The mainstream maintenance officially ends in 2027 .

SAP will not offer a direct successor.

Instead, they have partnered with Microsoft to promote Microsoft Entra ID as the suggested target platform. A move that signals a shift toward cloud, but also introduces new challenges around vendor lock-in, operational complexity, and data sovereignty.

A Strategic Inflection Point

Many enterprises, especially in retail, franchise, logistics, or manufacturing, have historically relied on SAP IDM not only for user provisioning, but also as a lightweight IGA solution for other apps, Active Directory, and decentralized roles.

As a result, replacing SAP IDM isn’t just a technical migration — it’s an architectural redesign with long-term implications:

What SAP IDM was used for Replacement Consideration
SAP user provisioning (HCM/SF) SCIM / SAP CIS + Entra / alt.
Role mapping & SoD prep IAG / GRG / SaaS-based governance
NetWeaver / SAP Portal auth SAML / OIDC via modern IdPs
Workforce lifecycle management Entra ID Governance / iPaaS
Manual UI flows / self-service Custom workflows or low-code

And here’s the crux: Most of those tasks can now be covered using open standards without committing to a monolithic suite with complex migration paths.

SAP IDM End of life, Enter: Open Standards & Sovereign SaaS

The modern IAM landscape is vastly more interoperable than it was a decade ago. Thanks to SCIM, SAML, OIDC, and REST APIs, identity platforms can now integrate with HR systems, SaaS apps and environments, and internal portals without needing everything from a single vendor.

This is where cidaas, a European Identity-as-a-Service provider, enters the picture:

  • Built on OAuth2, OIDC, SAML, SCIM and REST
  • Delivered as a multi-tenant or private cloud SaaS
  • Hosted in Germany or Switzerland
  • Certified to ISO 27001, GDPR-compliant by design
  • Supports delegated group management, self-service portals, and API-first integration

Unlike Entra ID, which is tightly woven into Microsoft’s enterprise fabric, cidaas is vendor-neutral and open for integration in mixed environments (SAP, Microsoft, legacy, custom and other).

Modular Identity Architecture Instead of Monoliths

With the end of SAP IDM, organizations have the chance to shift to a modular IAM stack, for instance:

  • cidaas as the central identity solution for workforce (employees) and B2B (partner)
  • cnips (iPaaS) for workflow orchestration and data mapping
  • SAP Cloud Identity Services as SCIM/SAML integration target
  • SAP IAG (if needed) for deep SoD analysis and SAP-specific governance
  • ServiceNow or Portal for user self-service and request management

This modular approach ensures the following benefits:

  • Lower vendor lock-in
  • Better alignment with internal responsibilities (HR, IT, Security)
  • Faster time to value
  • Digital sovereignty and data control

SAP IDM End of Life and the Need for Re-Architecture

With the sunset of SAP IDM approaching, many organizations are asking themselves a critical question:

“What’s the right architecture for identity and access management, not just for today, but for the next decade?” 

Here´s How to Prepare for the SAP IDM End of Life:

For companies with SAP-centric landscapes, complex identity flows, and hybrid environments spanning employees, partners, contractors, and other applications, the answer is rarely a simple drop-in replacement.

SAP IDM has long been the glue for user provisioning and access control across SAP and other systems. But with them officially ending IDM support by 2027 and no successor in sight, a new strategy is required.
Most enterprise IAM landscapes today are far more complex than a decade ago and crucial requirements include:

  • HR systems like SAP SuccessFactors drive identity creation
  • Applications are hybrid: Cloud, on-premises, mobile, legacy
  • Users include not just employees, but partners, service providers, and externals
  • Compliance, auditability, and data sovereignty are top concerns
  • There’s a growing demand for decentralized workflows and faster onboarding

Rather than re-creating the same complexity with a software solution, this is an opportunity to modernize and simplify.

A Blueprint for a Standards-Based IAM

At the core of the proposed architecture are two key components:

  • cidaas: A cloud-native identity and access management platform based entirely on standards (OIDC, SAML, SCIM, OAuth2).
  • cnips: A low-code integration and automation platform (iPaaS) that acts as the orchestration layer between systems.

Together, they form a powerful and flexible stack that integrates seamlessly with SAP ecosystems – as well as other applications – without vendor lock-in.

infographic blueprint for a standards based iam

The Architecture: Modular, Extensible, Interoperable

Here’s how the pieces fit together:

  • cidaas acts as the central IAM platform. Handling authentication, token issuance, MFA, and role & group management.
  • cnips orchestrates identity flows, access requests, approvals, and provisioning across SAP, Active Directory, external applications, and beyond.
  • Systems like Cloud Identity Services, S/4HANA, and SAP Identity Access Governance (IAG) are integrated via SCIM, REST, and SAML.

This architecture decouples concerns: Identity services are separated from process orchestration, and compliance tools can be layered as needed.

Identity Lifecycle & Authentication Flows

Let’s go one step deeper and look into the details: 

1. Inbound Identity Management 

Identities are sourced from:

  • HR systems (e.g. SAP SuccessFactors, Workday, Personio, etc.) via SCIM or REST
  • External sources (B2B portals, delegated onboarding, project-based access)

These users are provisioned into cidaas, enriched with metadata (e.g. roles, departments, legal entities), and prepared for downstream provisioning.

2. cidaas as Identity Provider 

cidaas supports authentication via:

  • OIDC, OAuth2 and SAML 2.0 for cloud and enterprise applications
  • MFA policies, including biometrics, OTP, and device context
  • Custom-branded login pages and self-service portals for different user groups

cidaas also supports delegated group management, allowing business owners or team leads to manage memberships without burdening IT.

3. Orchestration via cnips 

Once users exist in cidaas, cnips triggers and manages:

  • Lifecycle workflows (joiner, mover, leaver)
  • Multi-step approvals for access requests
  • Attribute transformation and mapping (e.g. org codes, country-specific roles)
  • System-specific field normalization
  • Integration with ITSM systems like ServiceNow

This orchestration engine ensures processes are transparent, auditable, and adjustable without writing code.

4. Downstream Provisioning 

cnips provisions users via SCIM, REST, or even SOAP to:

  • SAP Cloud Identity Services (CIS) and S/4HANA
  • SAP IAG for access governance and risk analysis
  • Active Directory / Azure AD
  • Other applications and SaaS systems

Where advanced SoD, attestation, or recertification is required, cnips can either:

  • Integrate with SAP IAG for SAP-specific access governance
  • Drive external processes via its workflow engine or third-party GRC tools

Why This Architecture Works

This standards-based approach has already been adopted in complex enterprise environments – not just because it replaces IDM, but because it improves on it.

Key benefits include: 

  • Open standards: SCIM, SAML, OIDC, REST are future-proof and interoperable.
  • Vendor-neutral: cidaas and cnips are not tied to Microsoft or SAP licensing models.
  • Cloud-native: Available as SaaS or private cloud, scalable and always up-to-date.
  • Sovereign hosting: Fully GDPR-compliant, with hosting in Germany/EU or Switzerland.
  • Decentralized workflows: Business users can take responsibility for access, reducing IT overhead.
  • Low-code automation: Fast rollout of identity processes, adaptable to local requirements.

Don´t just replace SAP IDM with another “one-size-fits-all” tool. Go from legacy to lean. Replacing it is not just about matching features. It’s about rethinking the model entirely.

SAP IDM End of Life: Request, approve, assign with cidaas

How cidaas and cnips-iPaaS enable full-lifecycle access governance without the IGA bloat.

Modern access governance is caught in a paradox. On the one hand, organizations need fine-grained control over who can access what, especially in complex landscapes with business roles, data context, and compliance requirements.

On the other hand, traditional IGA platforms are often overkill: Monolithic, expensive, and difficult to adapt to real-world workflows. This is exactly where cidaas, paired with the cnips, iPaaS layer offers a modern, API-first alternative. Together, they enable not only self-service access requests, but also multi-step approval flows and automated role assignments – all while keeping the architecture lean, modular, and open.

Let’s walk through how it works.

From Request to Role Assignment – A Streamlined Governance Loop

In this architecture, cidaas acts as the central identity and role platform, while cnips orchestrates process logic, handles approvals, and connects to SAP business systems.

infographic from request to role assignment

Here’s what happens step by step:

  1. A user (internal, partner, or external) accesses a cidaas-powered self-service portal.
  2. This request is handed over to cnips, which runs the approval and orchestration logic.
  3. Upon approval, cidaas updates the user’s business role assignment in the Identity Store, reflecting the granted access.
  4. The change is mapped to one or more Application Role Collections in SAP BTP or provisioned to SAP Identity Services via SCIM, REST or claim injection (OIDC/SAML).
  5. Optionally, cnips can call into SAP Integration Suite or SAP Gateway to validate context, apply business rules, or enrich requests with system-specific data (e.g., company code, plant, org unit).

Flexible Governance — Without the Overhead

Unlike legacy IGA systems, cidaas and cnips don’t force a predefined governance model. Instead, they allow organizations to implement just enough access governance, while retaining full control. Some key strengths of this approach:

Context-Aware Role Assignment 

Roles in cidaas are linked to group types and business attributes. This enables context-specific access decisions, for example, only granting finance roles to users in certain regions or legal entities.

Seamless Approval Chains 

cnips can model multi-step approvals based on org structure, project ownership, or other identity metadata. Approvals can be executed in Microsoft Teams, a web portal, or native enterprise systems.

Reversible & Auditable 

Every access change is tracked, time-stamped, and can be reversed automatically. This ensures compliance with internal policies and external regulations – without the complexity of full-blown GRC stacks.

Integration-First 

Since both cidaas and cnips are API-native, they integrate easily with ticketing systems (e.g., ServiceNow), business workflows, and SAP tools. There’s no “black box” logic or proprietary workflow engines.

Three Closing Thoughts on SAP IDM End of Life

The SAP IDM end of support without a designated (or explicit?) successor gives room for thought:

  1. Instead of migrating to a new “one-size-fits-all” tool, simplify your identity landscape: SaaS IAM is ready. Modern tools like cidaas now offer enterprise-grade IAM in the cloud — fast, scalable, API-first.
    Open standards enable choice. SCIM and SAML let you plug into SAP or any third-party system. Retail and B2B models are changing. You need flexible onboarding, delegated management, and support for non-employees.
    Data sovereignty matters. Especially in the EU, relying on hyperscalers can raise GDPR risks. A sovereign SaaS avoids this. Plus, you already need to migrate. Why not simplify instead of replicate legacy complexity?
  2. Replacing SAP IDM is not just about matching features. It’s about rethinking the model entirely. With a layered architecture like this, you can: Centralize control without centralizing every system and avoid massive upfront projects by incrementally replacing legacy integrations.
  3. Choose the best-of-breed solution for each task: Identity, provisioning, orchestration and governance. Whether your environment is SAP-dominated or hybrid with Microsoft, Atlassian, Salesforce, or industry-specific apps. This modular approach works. Access governance doesn’t need to mean deploying a monolithic IGA suite. With cidaas and cnips, organizations get a lean, modular, and adaptable framework for managing access. This framework fits cloud-first architectures, hybrid SAP landscapes, and complex B2B environments alike.First and foremost, it’s a powerful solution for those who need:
    • Workflow-driven access control
    • Federated identity with policy-based mapping
    • Lifecycle automation with context
    • Governance without rigidity

SAP IDM end of life – do we need to panic now? No – it´s smooth sailing with the successful template from cidaas and cnips.

Are you interested in learning more about your options after SAP IDM? Get in touch with our cidaas experts or take advantage of our free demo, we´re happy to help you succeed!