New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

SAP P_BTPA_2408 Exam - Topic 1 Question 18 Discussion

Actual exam question for SAP's P_BTPA_2408 exam
Question #: 18
Topic #: 1
[All P_BTPA_2408 Questions]

You are a solution architect and your client has recently completed a merger and acquisition. Your client uses SAP S/4HANA Cloud Public Edition and the acquired company is using SAP ECC 6.0. For business and legal reasons, the users of the acquired company cannot yet be added to the global user directory. The acquired users still need access to the custom application.

Given the attached diagram, which solution would you recommend to your client in "1" to enable this access?

Show Suggested Answer Hide Answer
Suggested Answer: A

Contribute your Thoughts:

0/2000 characters
Tricia
3 months ago
Option C could work too, but A seems more straightforward.
upvoted 0 times
...
Meaghan
3 months ago
Surprised that people are leaning towards A, I thought D would be better.
upvoted 0 times
...
Hester
3 months ago
Not so sure about A, what about option B?
upvoted 0 times
...
Marquetta
4 months ago
Totally agree, A makes the most sense here!
upvoted 0 times
...
Belen
4 months ago
I think option A is the best choice for authentication.
upvoted 0 times
...
Alonso
4 months ago
I recall that Secure Login Service is more for GUI access, but I wonder if it could still be a viable option in this scenario.
upvoted 0 times
...
Hermila
4 months ago
I feel like Identity Provisioning might be relevant since it deals with user access, but I'm not entirely confident.
upvoted 0 times
...
Geraldine
4 months ago
I think we practiced a similar question about user access in SAP environments. Could it be Identity Authentication?
upvoted 0 times
...
Alesia
5 months ago
I remember we discussed the importance of identity management in mergers, but I'm not sure which service fits best here.
upvoted 0 times
...
Huey
5 months ago
This is a great question that really tests our understanding of SAP's identity and access management solutions. I'm confident I can analyze the options and provide a well-reasoned recommendation to the client.
upvoted 0 times
...
Gail
5 months ago
I'm a bit confused by the different identity and access management services mentioned. I'll need to review the descriptions more closely to understand the differences and determine the best fit.
upvoted 0 times
...
Celestina
5 months ago
Okay, I've got a plan. Based on the scenario, I believe option C, the SAP Authorization and Trust Management Service, would be the most appropriate solution to enable access for the acquired users.
upvoted 0 times
...
Johana
5 months ago
Hmm, the key here seems to be that the acquired users can't be added to the global user directory. I'm thinking option B might be the way to go, but I'll double-check the details.
upvoted 0 times
...
Devon
5 months ago
This looks like a tricky one. I'll need to carefully review the diagram and options to determine the best solution for the client's specific requirements.
upvoted 0 times
...
Clemencia
10 months ago
I hope the exam doesn't ask me to juggle while solving this problem. That would be a real SAP-rise!
upvoted 0 times
...
Fausto
10 months ago
Option D? Really? That's just for accessing SAP GUI, not a custom application. Definitely not the right solution here.
upvoted 0 times
Tanesha
8 months ago
C) SAP Authorization and Trust Management Service
upvoted 0 times
...
Enola
9 months ago
B) SAP Cloud Identity Services - Identity Provisioning
upvoted 0 times
...
Cathern
9 months ago
A) SAP Cloud Identity Services - Identity Authentication
upvoted 0 times
...
...
Alline
10 months ago
Hmm, Option C could work too, but it might be overkill for this scenario. Identity Provisioning seems more straightforward.
upvoted 0 times
Reita
9 months ago
Let's go with Identity Provisioning to keep things simple for the acquired users.
upvoted 0 times
...
Erin
9 months ago
Identity Authentication could also be a good choice, but I think Identity Provisioning is more suitable.
upvoted 0 times
...
Tequila
10 months ago
Option C might be too complex for what the client needs right now.
upvoted 0 times
...
Caitlin
10 months ago
I agree, Identity Provisioning seems like the best fit for this scenario.
upvoted 0 times
...
...
Lashandra
11 months ago
I agree, Option B is the way to go. Provisioning the users is the best approach to give them access to the custom application.
upvoted 0 times
Margart
10 months ago
Agreed, Option B seems like the most efficient solution in this scenario. Provisioning the users will streamline the access process.
upvoted 0 times
...
Lauran
10 months ago
I think Option B is the best choice too. Provisioning the users will make it easier for them to access the custom application.
upvoted 0 times
...
...
Charlena
11 months ago
Option B seems like the logical choice here. Identity Provisioning would allow the acquired company's users to be provisioned into the SAP S/4HANA Cloud environment without needing to be added to the global user directory.
upvoted 0 times
Cathrine
10 months ago
True, Option B seems like the most efficient solution for integrating the acquired company's users.
upvoted 0 times
...
Skye
10 months ago
Option A might work, but Option B specifically focuses on provisioning users into the SAP S/4HANA Cloud environment.
upvoted 0 times
...
Johana
10 months ago
But wouldn't Option A also work for providing secure access to the custom application?
upvoted 0 times
...
Vallie
10 months ago
I agree, Option B would streamline the process for onboarding the acquired company's users.
upvoted 0 times
...
...
Madonna
11 months ago
I'm not sure, but option B) SAP Cloud Identity Services - Identity Provisioning could also work to provide access to the custom application.
upvoted 0 times
...
Vannessa
11 months ago
I agree with Francoise. Using Identity Authentication would ensure secure access for the acquired users.
upvoted 0 times
...
Francoise
11 months ago
I think option A) SAP Cloud Identity Services - Identity Authentication would be the best choice.
upvoted 0 times
...

Save Cancel