![Identity Management and SAP Users, Roles and Transactions - Part1 - IBM Security Identity and Access Identity Management and SAP Users, Roles and Transactions - Part1 - IBM Security Identity and Access](https://www.ibm.com/blogs/security-identity-access/wp-content/uploads/2018/08/SAP-Authzns-for-a-Role.png)
Identity Management and SAP Users, Roles and Transactions - Part1 - IBM Security Identity and Access
![SAP security and deployment best practices for InfoSphere Information Server Pack for SAP Applications 8.2 and 8.1 SAP security and deployment best practices for InfoSphere Information Server Pack for SAP Applications 8.2 and 8.1](https://www.ibm.com/support/pages/system/files/support/swg/dmgtech.nsf/0/ee38d56d75ae74448525828a00153dc7/Content/0.8E8.jpg)
SAP security and deployment best practices for InfoSphere Information Server Pack for SAP Applications 8.2 and 8.1
![Identity Management and SAP Users, Roles and Transactions - Part1 - IBM Security Identity and Access Identity Management and SAP Users, Roles and Transactions - Part1 - IBM Security Identity and Access](https://www.ibm.com/blogs/security-identity-access/wp-content/uploads/2018/08/SAP-Authorization-Model.png)
Identity Management and SAP Users, Roles and Transactions - Part1 - IBM Security Identity and Access
![SAP Basis For Beginner: How to search for composite role by using single role that attached to it and vice versa SAP Basis For Beginner: How to search for composite role by using single role that attached to it and vice versa](http://3.bp.blogspot.com/-GNHIYuTGz9A/UeUF9ipOr9I/AAAAAAAAA4g/1YTfIo07R7Q/s1600/pic2.gif)