The number of different services and systems in current customer IT landscapes is increasing rapidly. “Cross-runtime” access by user categories of different types to a wide variety of data must be granted properly and securely, regardless of whether they are employees, background and interface users, or external service providers. This can quickly lead to a confusing, complex, and potentially risky web of authorizations, users and roles. This must be taken into consideration when evaluating the risks of IT security and minimized in the sense of legal as well as internal requirements and guidelines.

With decades of experience in numerous security and authorization projects and with its Dynamic Security Suite, nexQuent provides a central identity management engine that reliably ensures the management and administration of different user categories, digital identities and authorizations in accordance with official regulations such as the EU Data Protection Regulation (EU-DSGVO) and the Minimum Requirements for Risk Management (MaRisk) and BSI standards. This applies across the entire IT landscape.

The data model of our solution is generic and can be easily adapted and extended to the customer’s business processes with our own admin app without extensive programming. Both our own REST API and our own classes and methods delivered as standard enable a direct and process-specific connection from the SAP on-premise world to the outside as well as from the outside in. Most importantly the data model ensures connectivity to all common API-enabled SaaS solutions, such as Microsoft Azure AD. Furthermore the nexQuent software can trigger direct further processing in SAP and non-SAP systems.

Identity and Access Management is one of the nexQuent Group’s special topics.

The services associated with this specialty are part of the standard nexQuent portfolio as follows:

  • Authorization Design & Redesign Projects
  • Introduction of Workflow-Controlled Digital User Administration
  • Definition of New Creation, Role Assignment, Decommissioning and Reactivation Processes
  • Introduction of Single Sign-on Scenarios
  • Emergency User Management
  • Segregation of Duty (SoD) / Separation of Duties Checks