{"id":98,"date":"2016-10-23T12:00:46","date_gmt":"2016-10-23T11:00:46","guid":{"rendered":"http:\/\/akquinet-security-en.blog\/?p=98"},"modified":"2020-07-24T12:57:26","modified_gmt":"2020-07-24T10:57:26","slug":"sast-implementation-at-s-oliver","status":"publish","type":"post","link":"https:\/\/sast-solutions.com\/blog-en\/2016\/10\/23\/sast-implementation-at-s-oliver\/","title":{"rendered":"SAST implementation at s.Oliver"},"content":{"rendered":"<p><span style=\"color: #626161;\">Professional authorization management in real time for 50 SAP systems in 14 countries \u2013 in less than one month? It is possible \u2013 with SAST! <\/span><\/p>\n<p><span style=\"color: #626161;\"><span id=\"result_box\" lang=\"en\">Read in the success story how s.Oliver has expanded its SAP IdM with an integrated access control and governance solution.<\/span><br \/>\n<\/span><\/p>\n<p><a href=\"http:\/\/www.soliver.eu\" target=\"_blank\" rel=\"noopener noreferrer\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-69\" src=\"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2017\/01\/soliver_logo_rgb.jpg\" alt=\"soliver_logo_rgb\" width=\"190\" height=\"64\" srcset=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2017\/01\/soliver_logo_rgb.jpg 772w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2017\/01\/soliver_logo_rgb-300x101.jpg 300w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2017\/01\/soliver_logo_rgb-768x259.jpg 768w\" sizes=\"auto, (max-width: 190px) 100vw, 190px\" \/><\/a><\/p>\n<p><!--more--><\/p>\n<p><em><strong>&#8220;With the SAST Suite, we have around 20 man-days for an audit. This hugely relieves the burden on our departments and on IT security. With SAST, we therefore have more security and compliance but spend less time achieving this. The AKQUINET team is highly qualified and has a wealth of experience, so we were able to implement the project promptly and successfully.\u201c<\/strong><\/em><br \/>\n(Matthias Endrich,\u00a0Manager of SAP Basis Administration)<\/p>\n<p><a href=\"https:\/\/sast-solutions.com\/files\/SAST\/Dokumente\/sast-success-story-soliver-SAP-authorization-management-with-idm-connection.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">To the Success Story<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Professional authorization management in real time for 50 SAP systems in 14 countries \u2013 in less than one month? It is possible \u2013 with SAST!<br \/>\nRead in the success story how s.Oliver has expanded its SAP IdM with an integrated access control and governance solution.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[11],"tags":[67,64,68],"class_list":["post-98","post","type-post","status-publish","format-standard","hentry","category-references-best-cases","tag-identity-management","tag-role-management","tag-sap-authorizations"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>SAST implementation at s.Oliver<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sast-solutions.com\/blog-en\/2016\/10\/23\/sast-implementation-at-s-oliver\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"SAST implementation at s.Oliver\" \/>\n<meta property=\"og:description\" content=\"Professional authorization management in real time for 50 SAP systems in 14 countries \u2013 in less than one month? It is possible \u2013 with SAST!  Read in the success story how s.Oliver has expanded its SAP IdM with an integrated access control and governance solution.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sast-solutions.com\/blog-en\/2016\/10\/23\/sast-implementation-at-s-oliver\/\" \/>\n<meta property=\"og:site_name\" content=\"SAST BLOG\" \/>\n<meta property=\"article:published_time\" content=\"2016-10-23T11:00:46+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-07-24T10:57:26+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2017\/01\/soliver_logo_rgb.jpg\" \/>\n<meta name=\"author\" content=\"securityblog\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"securityblog\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2016\\\/10\\\/23\\\/sast-implementation-at-s-oliver\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2016\\\/10\\\/23\\\/sast-implementation-at-s-oliver\\\/\"},\"author\":{\"name\":\"securityblog\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/person\\\/cd70e3749cca136a7e8a37dc1d3cfc26\"},\"headline\":\"SAST implementation at s.Oliver\",\"datePublished\":\"2016-10-23T11:00:46+00:00\",\"dateModified\":\"2020-07-24T10:57:26+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2016\\\/10\\\/23\\\/sast-implementation-at-s-oliver\\\/\"},\"wordCount\":119,\"publisher\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2016\\\/10\\\/23\\\/sast-implementation-at-s-oliver\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sast-blog.akquinet.com\\\/wp-content\\\/uploads\\\/2017\\\/01\\\/soliver_logo_rgb.jpg\",\"keywords\":[\"Identity Management\",\"Role Management\",\"SAP Authorizations\"],\"articleSection\":[\"References &amp; Best Cases\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2016\\\/10\\\/23\\\/sast-implementation-at-s-oliver\\\/\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2016\\\/10\\\/23\\\/sast-implementation-at-s-oliver\\\/\",\"name\":\"SAST implementation at s.Oliver\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2016\\\/10\\\/23\\\/sast-implementation-at-s-oliver\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2016\\\/10\\\/23\\\/sast-implementation-at-s-oliver\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sast-blog.akquinet.com\\\/wp-content\\\/uploads\\\/2017\\\/01\\\/soliver_logo_rgb.jpg\",\"datePublished\":\"2016-10-23T11:00:46+00:00\",\"dateModified\":\"2020-07-24T10:57:26+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2016\\\/10\\\/23\\\/sast-implementation-at-s-oliver\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2016\\\/10\\\/23\\\/sast-implementation-at-s-oliver\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2016\\\/10\\\/23\\\/sast-implementation-at-s-oliver\\\/#primaryimage\",\"url\":\"https:\\\/\\\/sast-blog.akquinet.com\\\/wp-content\\\/uploads\\\/2017\\\/01\\\/soliver_logo_rgb.jpg\",\"contentUrl\":\"https:\\\/\\\/sast-blog.akquinet.com\\\/wp-content\\\/uploads\\\/2017\\\/01\\\/soliver_logo_rgb.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2016\\\/10\\\/23\\\/sast-implementation-at-s-oliver\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"SAST implementation at s.Oliver\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#website\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/\",\"name\":\"SAST BLOG\",\"description\":\"SAP Security &amp; Compliance\",\"publisher\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#organization\",\"name\":\"SAST BLOG\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/sast-solutions-logo.png\",\"contentUrl\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/sast-solutions-logo.png\",\"width\":358,\"height\":155,\"caption\":\"SAST BLOG\"},\"image\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/person\\\/cd70e3749cca136a7e8a37dc1d3cfc26\",\"name\":\"securityblog\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"SAST implementation at s.Oliver","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sast-solutions.com\/blog-en\/2016\/10\/23\/sast-implementation-at-s-oliver\/","og_locale":"en_US","og_type":"article","og_title":"SAST implementation at s.Oliver","og_description":"Professional authorization management in real time for 50 SAP systems in 14 countries \u2013 in less than one month? It is possible \u2013 with SAST!  Read in the success story how s.Oliver has expanded its SAP IdM with an integrated access control and governance solution.","og_url":"https:\/\/sast-solutions.com\/blog-en\/2016\/10\/23\/sast-implementation-at-s-oliver\/","og_site_name":"SAST BLOG","article_published_time":"2016-10-23T11:00:46+00:00","article_modified_time":"2020-07-24T10:57:26+00:00","og_image":[{"url":"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2017\/01\/soliver_logo_rgb.jpg","type":"","width":"","height":""}],"author":"securityblog","twitter_card":"summary_large_image","twitter_misc":{"Written by":"securityblog","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/sast-solutions.com\/blog-en\/2016\/10\/23\/sast-implementation-at-s-oliver\/#article","isPartOf":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2016\/10\/23\/sast-implementation-at-s-oliver\/"},"author":{"name":"securityblog","@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/person\/cd70e3749cca136a7e8a37dc1d3cfc26"},"headline":"SAST implementation at s.Oliver","datePublished":"2016-10-23T11:00:46+00:00","dateModified":"2020-07-24T10:57:26+00:00","mainEntityOfPage":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2016\/10\/23\/sast-implementation-at-s-oliver\/"},"wordCount":119,"publisher":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#organization"},"image":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2016\/10\/23\/sast-implementation-at-s-oliver\/#primaryimage"},"thumbnailUrl":"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2017\/01\/soliver_logo_rgb.jpg","keywords":["Identity Management","Role Management","SAP Authorizations"],"articleSection":["References &amp; Best Cases"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/sast-solutions.com\/blog-en\/2016\/10\/23\/sast-implementation-at-s-oliver\/","url":"https:\/\/sast-solutions.com\/blog-en\/2016\/10\/23\/sast-implementation-at-s-oliver\/","name":"SAST implementation at s.Oliver","isPartOf":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2016\/10\/23\/sast-implementation-at-s-oliver\/#primaryimage"},"image":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2016\/10\/23\/sast-implementation-at-s-oliver\/#primaryimage"},"thumbnailUrl":"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2017\/01\/soliver_logo_rgb.jpg","datePublished":"2016-10-23T11:00:46+00:00","dateModified":"2020-07-24T10:57:26+00:00","breadcrumb":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2016\/10\/23\/sast-implementation-at-s-oliver\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sast-solutions.com\/blog-en\/2016\/10\/23\/sast-implementation-at-s-oliver\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sast-solutions.com\/blog-en\/2016\/10\/23\/sast-implementation-at-s-oliver\/#primaryimage","url":"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2017\/01\/soliver_logo_rgb.jpg","contentUrl":"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2017\/01\/soliver_logo_rgb.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/sast-solutions.com\/blog-en\/2016\/10\/23\/sast-implementation-at-s-oliver\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sast-solutions.com\/blog-en\/"},{"@type":"ListItem","position":2,"name":"SAST implementation at s.Oliver"}]},{"@type":"WebSite","@id":"https:\/\/sast-solutions.com\/blog-en\/#website","url":"https:\/\/sast-solutions.com\/blog-en\/","name":"SAST BLOG","description":"SAP Security &amp; Compliance","publisher":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sast-solutions.com\/blog-en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/sast-solutions.com\/blog-en\/#organization","name":"SAST BLOG","url":"https:\/\/sast-solutions.com\/blog-en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/logo\/image\/","url":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/03\/sast-solutions-logo.png","contentUrl":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/03\/sast-solutions-logo.png","width":358,"height":155,"caption":"SAST BLOG"},"image":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/person\/cd70e3749cca136a7e8a37dc1d3cfc26","name":"securityblog"}]}},"_links":{"self":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts\/98","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/comments?post=98"}],"version-history":[{"count":2,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts\/98\/revisions"}],"predecessor-version":[{"id":1210,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts\/98\/revisions\/1210"}],"wp:attachment":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/media?parent=98"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/categories?post=98"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/tags?post=98"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}