SlideShare a Scribd company logo
1 of 34
Download to read offline
SAP Single Sign-On 2.0 
Overview Presentation 
June 2014 Public
Legal disclaimer 
This presentation is not subject to your license agreement or any other agreement with SAP. SAP has 
no obligation to pursue any course of business outlined in this presentation or to develop or release 
any functionality mentioned in this presentation. This presentation and SAP's strategy and possible 
future developments are subject to change and may be changed by SAP at any time for any reason 
without notice. This document is provided without a warranty of any kind, either express or implied, 
including but not limited to, the implied warranties of merchantability, fitness for a particular purpose, or 
non-infringement. SAP assumes no responsibility for errors or omissions in this document, except if 
such damages were caused by SAP intentionally or grossly negligent. 
© 2014 SAP AG or an SAP affiliate company. All rights reserved. Public 2
Agenda 
SAP Portfolio 
Overview SAP Single Sign-On 
Single Sign-On Scenarios 
Architecture 
What’s New in Support Package 03 
Recommendations 
Summary 
© 2014 SAP AG or an SAP affiliate company. All rights reserved. Public 3
SAP Portfolio
SAP Identity and Access Management Solutions 
Compliant Identity and Access Management 
Simplify and secure 
access 
SAP 
Single Sign-On 
Manage identities and 
permissions 
SAP 
Identity Management 
Identify and mitigate 
risks 
SAP Access Control 
© 2014 SAP AG or an SAP affiliate company. All rights reserved. Public 5
Overview SAP Single Sign-On
SAP Single Sign-On – What is it about? 
Authenticate once and subsequently access SAP and 
non-SAP applications in a secure and user-friendly way. 
Meet company and regulatory requirements. 
Improve security measures and protect your company. 
© 2014 SAP AG or an SAP affiliate company. All rights reserved. Public 7
SAP Single Sign-On – Benefits 
Security 
Reduce Costs 
Simplicity 
© 2014 SAP AG or an SAP affiliate company. All rights reserved. Public 8
SAP Single Sign-On – Benefits in Detail 
Solve security and compliance 
issues caused by 
• Re-use of passwords 
• Password patterns 
• Trivial passwords 
• Passwords on post-it notes 
• Leaked passwords 
Solve productivity issues 
caused by 
y Large number of 
manual logins 
y Forgotten passwords 
y Help desk calls 
Only one secure (!) password 
to remember 
Only one password to store 
and protect 
Automated login while you 
work 
© 2014 SAP AG or an SAP affiliate company. All rights reserved. Public 9
Single Sign-On Scenarios
Business User Expectations 
SAP GUI 
SAP NetWeaver 
Business Client 
SAP Business 
Explorer 
Web 
Browser 
… 
Easy and secure access 
© 2014 SAP AG or an SAP affiliate company. All rights reserved. Public 11
SAP Single Sign-On 2.0 
Key Capabilities 
• Single sign-on for SAP and non-SAP applications 
• Support of proprietary SAP clients (e.g. SAP GUI) 
• Secure network communication (SNC) 
• SSO for cloud-based applications 
• Based on standards like X.509 certificates, 
SPNEGO, Kerberos, SAML 
• Password Manager 
SAP HANA and 
SAP NetWeaver 
SAP Business Suite 
SAP and non-SAP applications 
Cloud and 
cross-company 
SAP Single Sign-On 
Password Manager 
© 2014 SAP AG or an SAP affiliate company. All rights reserved. Public 12
SAP Business Suite 
Single Sign-On Based on Kerberos / SPNEGO 
SAP Business Suite 
Secure Login Client 
Secure Login Library 
SPNEGO for ABAP 
Microsoft Active 
Directory 
Token: Kerberos 
SPNEGO only 
available in newer 
SAP NetWeaver 
releases 
SAP Business Suite 
SAP NetWeaver 
SAP client (native) 
Web client 
© 2014 SAP AG or an SAP affiliate company. All rights reserved. Public 13
SAP and Non-SAP Applications 
Single Sign-On Based on X.509 Certificates 
SAP and non- 
SAP applications 
Secure Login Client 
Secure Login Server 
Secure Login Library 
Microsoft Active 
Directory, LDAP, 
other login modules 
Token: X.509 
certificate 
This option supports 
most platforms and 
clients. 
Recommended for 
heterogeneous and 
intranet scenarios 
SAP Business Suite 
SAP NetWeaver 
SAP client (native) 
Web client 
Non-SAP 
Legacy systems 
© 2014 SAP AG or an SAP affiliate company. All rights reserved. Public 14
Cloud and Cross-Company 
Single Sign-On and Identity Federation Based on SAML 
SAP and non-SAP 
applications 
SAML identity 
provider 
Microsoft Active 
Directory, LDAP, 
other login modules 
Token: SAML 
SAML is a public 
standard for Web 
applications. The 
application server has 
to support the 
standard. 
Recommended for 
extranet scenarios, 
partner integration 
SAP / non-SAP 
Web applications 
Cloud applications 
Web client 
Web client 
© 2014 SAP AG or an SAP affiliate company. All rights reserved. Public 15
Secure Storage of Remaining Passwords 
Password Manager 
SAP and non- 
SAP applications 
Password Manager 
Stand-alone 
Based on user name 
and password 
Secure storage of 
remaining passwords 
in a local client. 
Provides automatic 
capture of login 
credentials 
© 2014 SAP AG or an SAP affiliate company. All rights reserved. Public 16
Architecture
SAP Single Sign-On – Components 
Secure Login Client 
y Client application 
y Manages security tokens (Kerberos tokens, X.509 certificates) 
Secure Login Server 
y Central service on SAP NetWeaver AS Java 
y Provides X.509 certificates to users and application servers 
Secure Login Library 
y Cryptography and security library for SAP NetWeaver AS ABAP 
Identity Provider 
y Central service on SAP NetWeaver AS Java 
y Provides SAML 2.0 assertions for Web-based SSO 
© 2014 SAP AG or an SAP affiliate company. All rights reserved. Public 18
Single Sign-On Based on Kerberos / SPNEGO 
Start SAP GUI or Browser 
1 
2 
Client 
SAP GUI / NWBC / 
Browser 
Secure Login Client 
Windows HTTPS (SPNEGO) 
Authentication 
3 
User Desktop 
SAP NetWeaver 
AS ABAP 
Secure Login Library 
NW AS JAVA 
DIAG, RFC (SNC) 
HTTPS (SPNEGO) 
Single Sign-On and 
Secure Communication 
Kerberos 
Token 
In a Nutshell 
• Relies on „Integrated Windows 
Authentication“ 
• Kerberos Security Token 
created by Microsoft Active 
Directory (AD) 
• No additional server required, 
low TCO 
• SAP backend needs to trust 
the AD 
• SPNEGO requires ABAP 
version 7.02 or higher 
• Kerberos/SPNEGO SSO 
supported by e.g. AS ABAP, 
AS Java, HANA DB, … 
Microsoft 
Active 
Directory (AD) 
SAP NetWeaver 
AS Java 
© 2014 SAP AG or an SAP affiliate company. All rights reserved. Public 19
Single Sign-On Based on X.509 Certificates 
Client 
SAP GUI / NWBC / 
Secure Login Client 
User Desktop 
Sign into Secure Login Client profile 
1 
2 
3 
SAP GUI / Browser / 
Browser 
NWBC 
Secure Login Client 
6 
Authenticate 
5 
Provide X.509 
Certificate 
Authentication 
Server 
4 
Verify User 
Credentials 
NW AS JAVA 
DIAG, RFC (SNC) 
HTTPS 
HTTPS 
Single Sign-On and 
Secure Communication 
In a Nutshell 
• Relies on X.509 certificate, a 
very mature standard security 
token 
• Certificates created by Secure 
Login Server (or other PKI) 
• SLS provides short-lived 
certificates, no overhead for 
revocation management 
• Multiple ways of user credential 
verification (SPNEGO, LDAP, 
ABAP, UME,...) 
• Support for SAP backends, but 
also for legacy systems, 3rd 
party Web applications,… 
• Secure Login Server requires 
AS Java 
SAP NetWeaver 
AS Java 
Secure Login Server 
(SLS) 
SAP NetWeaver 
AS ABAP 
Secure Login Library 
NW AS JAVA 
SAP NetWeaver 
AS Java 
© 2014 SAP AG or an SAP affiliate company. All rights reserved. Public 20
Single Sign-On Based on SAML 
2 
Authenticate 
Return SAML 
Assertion 
4 
Authentication 
SAP NetWeaver 
AS Java 
Identity Provider 
(IDP) 
HTTPS Service 
HTTPS 
NW AS JAVA 
Service Provider 
(SP) 
Provider (SP) 
Service 
Provider (SP) 
In a Nutshell 
• Relies on Security Assertion 
Markup Language (SAML) 
assertions as security token 
• Industry standard for cloud 
and cross-company scenarios 
• Assertions created by Identity 
Provider, running on AS Java 
• Authentication initiated by 
IDP or SP 
• Multiple ways of user 
credential verification 
(SPNEGO, LDAP, 
ABAP, UME,..) 
Client 
Browser 
5 Single Sign-On and 
Secure Communication 
1 User Desktop 
Server 
3 
Verify User 
Credentials 
Service Provider 
(SP) 
© 2014 SAP AG or an SAP affiliate company. All rights reserved. Public 21
What’s New in Support 
Package 03
Two-Factor Authentication with SAP Authenticator 
Two-Factor Authentication 
Authentication with One-Time Passwords (OTP) 
Provide two means of identification 
y OTP required for login in addition to password or security token 
y Second factor for high security scenarios 
Based on SAP Authenticator iOS Application 
y OTP (6-digit code) created on mobile device 
Usage Scenarios 
Integrated with Secure Login Server (X.509) and Identity Provider (SAML) 
y Administrator configures SAP NetWeaver AS Java system to require two-factor authentication 
For Web and SAP GUI scenarios 
© 2014 SAP AG or an SAP affiliate company. All rights reserved. Public 23
SSO for SAP GUI for Java on Mac OS X 
Secure Login Client for Mac Client Computers 
Mac OS X 10.7 or higher 
Usage Scenarios 
Kerberos-based authentication 
X.509 certificates 
For SAP GUI scenarios 
© 2014 SAP AG or an SAP affiliate company. All rights reserved. Public 24
RFID-Based User Identification 
Identify Users with RFID Token (Radio Frequency 
Identification) 
Only privileged persons have physical access 
Instant user identification with RFID token 
Based on X.509 certificates 
Usage Scenarios 
Warehouse and production scenarios 
Kiosk/terminal computers 
© 2014 SAP AG or an SAP affiliate company. All rights reserved. Public 25
Hardware Security Module Support 
Hardware Security Module Support for Digital Signatures 
Store Private Keys in Hardware 
y Protect Secure Login Server Certificate Authority 
y Protect private keys for digital signatures (Secure Store and Forward, SSF) 
y Performance acceleration 
Thales SafeNet 
© 2014 SAP AG or an SAP affiliate company. All rights reserved. Public 26
Recommendations
Recommendations 
9 Identify the most critical systems. Which systems contain your most sensitive business information? 
How many people have access to them? Define your overall single sign-on strategy and start with 
these critical business systems. 
Understand the different modules of SAP Single Sign-On and analyze your system landscape to 
determine which SSO standards can be used. If your organization does not have the appropriate 
resources and know-how, involve SAP Consulting or SAP partners. 
Passwords are often the weakest link in enterprises. Prevent the usage of passwords by relying on 
standards such as SAML, X.509 certificates, or Kerberos. SAP Single Sign-On offers solutions for 
all of these standards. 
Once you have implemented single sign-on, start enforcing strong passwords in the related systems. 
Mid-term strategy: Consider disabling user name/password authentication in critical business 
systems. 
Provide a tool to store remaining passwords (such as the Password Manager component of SAP 
Single Sign-On). 
9 
9 
9 
9 
© 2014 SAP AG or an SAP affiliate company. All rights reserved. Public 28
Summary
Extensible Technology – Ready for the Future 
SAP 
Business Suite 
SAP and non-SAP 
applications 
Cloud and 
cross-company 
© 2014 SAP AG or an SAP affiliate company. All rights reserved. Public 30
Summary 
SAP Single Sign-On is a “Single Sign-On Suite” that 
supports SAP as well as non-SAP applications. 
It offers 
• Investment protection 
• Flexibility 
• Single sign-on for heterogeneous system landscapes 
What are the main business drivers? 
• Protect business, reputation and trust 
• Lower password related costs 
• Simplicity and agility 
© 2014 SAP AG or an SAP affiliate company. All rights reserved. Public 31
Get More Information 
Community Network 
Get more information, videos and updates 
http://scn.sap.com/community/sso 
© 2014 SAP AG or an SAP affiliate company. All rights reserved. Public 32
Thank you 
Contact information: 
Product Management 
SAP AG 
© 2014 SAP AG or an SAP affiliate company. All rights reserved.
© 2014 SAP AG or an SAP affiliate company. All rights reserved. 
No part of this publication may be reproduced or transmitted in any form or for any purpose without the express permission of SAP AG or an SAP affiliate company. 
SAP and other SAP products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of SAP AG (or an SAP affiliate 
company) in Germany and other countries. Please see http://global12.sap.com/corporate-en/legal/copyright/index.epx for additional trademark information and notices. 
Some software products marketed by SAP AG and its distributors contain proprietary software components of other software vendors. 
National product specifications may vary. 
These materials are provided by SAP AG or an SAP affiliate company for informational purposes only, without representation or warranty of any kind, and SAP AG or its 
affiliated companies shall not be liable for errors or omissions with respect to the materials. The only warranties for SAP AG or SAP affiliate company products and services 
are those that are set forth in the express warranty statements accompanying such products and services, if any. Nothing herein should be construed as constituting an 
additional warranty. 
In particular, SAP AG or its affiliated companies have no obligation to pursue any course of business outlined in this document or any related presentation, or to develop or 
release any functionality mentioned therein. This document, or any related presentation, and SAP AG’s or its affiliated companies’ strategy and possible future 
developments, products, and/or platform directions and functionality are all subject to change and may be changed by SAP AG or its affiliated companies at any time for 
any reason without notice. The information in this document is not a commitment, promise, or legal obligation to deliver any material, code, or functionality. All forward-looking 
statements are subject to various risks and uncertainties that could cause actual results to differ materially from expectations. Readers are cautioned not to place 
undue reliance on these forward-looking statements, which speak only as of their dates, and they should not be relied upon in making purchasing decisions. 
© 2014 SAP AG or an SAP affiliate company. All rights reserved. Public 34

More Related Content

What's hot

Hybrid Cloud and Its Implementation
Hybrid Cloud and Its ImplementationHybrid Cloud and Its Implementation
Hybrid Cloud and Its ImplementationSai P Mishra
 
Cloud Architectures with AWS Direct Connect (ARC304) | AWS re:Invent 2013
Cloud Architectures with AWS Direct Connect (ARC304) | AWS re:Invent 2013Cloud Architectures with AWS Direct Connect (ARC304) | AWS re:Invent 2013
Cloud Architectures with AWS Direct Connect (ARC304) | AWS re:Invent 2013Amazon Web Services
 
Enterprise WAN Transformation: SD-WAN, SASE, and the Pandemic
Enterprise WAN Transformation: SD-WAN, SASE, and the PandemicEnterprise WAN Transformation: SD-WAN, SASE, and the Pandemic
Enterprise WAN Transformation: SD-WAN, SASE, and the PandemicEnterprise Management Associates
 
Introduction to AWS Cloud Computing
Introduction to AWS Cloud ComputingIntroduction to AWS Cloud Computing
Introduction to AWS Cloud ComputingAmazon Web Services
 
5 BENEFITS OF HYBRID CLOUD
5 BENEFITS OF HYBRID CLOUD5 BENEFITS OF HYBRID CLOUD
5 BENEFITS OF HYBRID CLOUDTyrone Systems
 
Introduction to AWS Services and Cloud Computing
Introduction to AWS Services and Cloud ComputingIntroduction to AWS Services and Cloud Computing
Introduction to AWS Services and Cloud ComputingAmazon Web Services
 
Microsoft Information Protection.pptx
Microsoft Information Protection.pptxMicrosoft Information Protection.pptx
Microsoft Information Protection.pptxChrisaldyChandra
 
Oracle Cloud Infrastructure – Storage
Oracle Cloud Infrastructure – StorageOracle Cloud Infrastructure – Storage
Oracle Cloud Infrastructure – StorageMarketingArrowECS_CZ
 
Cloud Journey Roadmap: Capgemini's Cloud Readiness Assessment
Cloud Journey Roadmap: Capgemini's Cloud Readiness AssessmentCloud Journey Roadmap: Capgemini's Cloud Readiness Assessment
Cloud Journey Roadmap: Capgemini's Cloud Readiness AssessmentCapgemini
 
Secure Your Cloud Environment with Azure Active Directory (AD)
Secure Your Cloud Environment with Azure Active Directory (AD)Secure Your Cloud Environment with Azure Active Directory (AD)
Secure Your Cloud Environment with Azure Active Directory (AD)WinWire Technologies Inc
 
Cisco umbrella overview
Cisco umbrella overviewCisco umbrella overview
Cisco umbrella overviewCisco Canada
 
How does Quest Software fit into a Microsoft hybrid environment?
How does Quest Software fit into a Microsoft hybrid environment?How does Quest Software fit into a Microsoft hybrid environment?
How does Quest Software fit into a Microsoft hybrid environment?Xylos
 
Cloud security and security architecture
Cloud security and security architectureCloud security and security architecture
Cloud security and security architectureVladimir Jirasek
 
Fiori and S/4 authorizations: What are the biggest challenges, and where do t...
Fiori and S/4 authorizations: What are the biggest challenges, and where do t...Fiori and S/4 authorizations: What are the biggest challenges, and where do t...
Fiori and S/4 authorizations: What are the biggest challenges, and where do t...akquinet enterprise solutions GmbH
 

What's hot (20)

Hybrid Cloud and Its Implementation
Hybrid Cloud and Its ImplementationHybrid Cloud and Its Implementation
Hybrid Cloud and Its Implementation
 
Cloud Architectures with AWS Direct Connect (ARC304) | AWS re:Invent 2013
Cloud Architectures with AWS Direct Connect (ARC304) | AWS re:Invent 2013Cloud Architectures with AWS Direct Connect (ARC304) | AWS re:Invent 2013
Cloud Architectures with AWS Direct Connect (ARC304) | AWS re:Invent 2013
 
Enterprise WAN Transformation: SD-WAN, SASE, and the Pandemic
Enterprise WAN Transformation: SD-WAN, SASE, and the PandemicEnterprise WAN Transformation: SD-WAN, SASE, and the Pandemic
Enterprise WAN Transformation: SD-WAN, SASE, and the Pandemic
 
Introduction to AWS Cloud Computing
Introduction to AWS Cloud ComputingIntroduction to AWS Cloud Computing
Introduction to AWS Cloud Computing
 
Azure Security Overview
Azure Security OverviewAzure Security Overview
Azure Security Overview
 
How to hana_sso_kerberos
How to hana_sso_kerberosHow to hana_sso_kerberos
How to hana_sso_kerberos
 
5 BENEFITS OF HYBRID CLOUD
5 BENEFITS OF HYBRID CLOUD5 BENEFITS OF HYBRID CLOUD
5 BENEFITS OF HYBRID CLOUD
 
Multi cloud security architecture
Multi cloud security architecture Multi cloud security architecture
Multi cloud security architecture
 
Introduction to Microsoft Azure 101
Introduction to Microsoft Azure 101Introduction to Microsoft Azure 101
Introduction to Microsoft Azure 101
 
Introduction to AWS Services and Cloud Computing
Introduction to AWS Services and Cloud ComputingIntroduction to AWS Services and Cloud Computing
Introduction to AWS Services and Cloud Computing
 
Microsoft Information Protection.pptx
Microsoft Information Protection.pptxMicrosoft Information Protection.pptx
Microsoft Information Protection.pptx
 
Oracle Cloud Infrastructure – Storage
Oracle Cloud Infrastructure – StorageOracle Cloud Infrastructure – Storage
Oracle Cloud Infrastructure – Storage
 
Cloud Journey Roadmap: Capgemini's Cloud Readiness Assessment
Cloud Journey Roadmap: Capgemini's Cloud Readiness AssessmentCloud Journey Roadmap: Capgemini's Cloud Readiness Assessment
Cloud Journey Roadmap: Capgemini's Cloud Readiness Assessment
 
SAP on Azure - Deck
SAP on Azure - DeckSAP on Azure - Deck
SAP on Azure - Deck
 
Secure Your Cloud Environment with Azure Active Directory (AD)
Secure Your Cloud Environment with Azure Active Directory (AD)Secure Your Cloud Environment with Azure Active Directory (AD)
Secure Your Cloud Environment with Azure Active Directory (AD)
 
Cisco umbrella overview
Cisco umbrella overviewCisco umbrella overview
Cisco umbrella overview
 
Boot camp - Migration to AWS
Boot camp - Migration to AWSBoot camp - Migration to AWS
Boot camp - Migration to AWS
 
How does Quest Software fit into a Microsoft hybrid environment?
How does Quest Software fit into a Microsoft hybrid environment?How does Quest Software fit into a Microsoft hybrid environment?
How does Quest Software fit into a Microsoft hybrid environment?
 
Cloud security and security architecture
Cloud security and security architectureCloud security and security architecture
Cloud security and security architecture
 
Fiori and S/4 authorizations: What are the biggest challenges, and where do t...
Fiori and S/4 authorizations: What are the biggest challenges, and where do t...Fiori and S/4 authorizations: What are the biggest challenges, and where do t...
Fiori and S/4 authorizations: What are the biggest challenges, and where do t...
 

Similar to SAP Single Sign-On 2.0 Overview

SAP HANA Cloud Platform: The void between your Datacenter and the Cloud
SAP HANA Cloud Platform: The void between your Datacenter and the CloudSAP HANA Cloud Platform: The void between your Datacenter and the Cloud
SAP HANA Cloud Platform: The void between your Datacenter and the CloudSAP HANA Cloud Platform
 
SAP HANA Cloud Platform - Overview
SAP HANA Cloud Platform - OverviewSAP HANA Cloud Platform - Overview
SAP HANA Cloud Platform - OverviewMatthias Steiner
 
Desenvolvimento JAVA orientado à SAP HANA Cloud Platform
Desenvolvimento JAVA orientado à SAP HANA Cloud PlatformDesenvolvimento JAVA orientado à SAP HANA Cloud Platform
Desenvolvimento JAVA orientado à SAP HANA Cloud PlatformRui Nogueira
 
Breeze overview
Breeze overviewBreeze overview
Breeze overviewYang Cheng
 
SAP HANA Cloud: From Your Datacenter to the Cloud and Back
SAP HANA Cloud: From Your Datacenter to the Cloud and Back  SAP HANA Cloud: From Your Datacenter to the Cloud and Back
SAP HANA Cloud: From Your Datacenter to the Cloud and Back SAP HANA Cloud Platform
 
Accelerate2022-Solving the SAP Security Gap through Application-aware Network...
Accelerate2022-Solving the SAP Security Gap through Application-aware Network...Accelerate2022-Solving the SAP Security Gap through Application-aware Network...
Accelerate2022-Solving the SAP Security Gap through Application-aware Network...PeterSmetny1
 
Gateway Deployment Options
Gateway Deployment OptionsGateway Deployment Options
Gateway Deployment OptionsGaurav Ahluwalia
 
160d74ec 597c-0010-82c7-eda71af511fa
160d74ec 597c-0010-82c7-eda71af511fa160d74ec 597c-0010-82c7-eda71af511fa
160d74ec 597c-0010-82c7-eda71af511faNagendra Babu
 
Exploiting Critical Attack Vectors to Gain Control of SAP Systems
Exploiting Critical Attack Vectors to Gain Control of SAP SystemsExploiting Critical Attack Vectors to Gain Control of SAP Systems
Exploiting Critical Attack Vectors to Gain Control of SAP SystemsOnapsis Inc.
 
SAP TechEd 2013: CD105: Extending SuccessFactors EmployeeCentral with apps on...
SAP TechEd 2013: CD105: Extending SuccessFactors EmployeeCentral with apps on...SAP TechEd 2013: CD105: Extending SuccessFactors EmployeeCentral with apps on...
SAP TechEd 2013: CD105: Extending SuccessFactors EmployeeCentral with apps on...SAP HANA Cloud Platform
 
Penetration Testing SAP Systems
Penetration Testing SAP SystemsPenetration Testing SAP Systems
Penetration Testing SAP SystemsOnapsis Inc.
 
2017 sitNL Cloud Foundry Masterclass
2017 sitNL Cloud Foundry Masterclass2017 sitNL Cloud Foundry Masterclass
2017 sitNL Cloud Foundry MasterclassTed Castelijns
 
What is SAP API Management_.pdf
What is SAP API Management_.pdfWhat is SAP API Management_.pdf
What is SAP API Management_.pdfBilawalAmeen
 
SAP HANA Cloud Portal
SAP HANA Cloud PortalSAP HANA Cloud Portal
SAP HANA Cloud PortalAmir Blich
 
SAP HANA Cloud Portal - Overview Presentation
SAP HANA Cloud Portal - Overview PresentationSAP HANA Cloud Portal - Overview Presentation
SAP HANA Cloud Portal - Overview PresentationSAP Portal
 
Dissecting and Attacking RMI Frameworks
Dissecting and Attacking RMI FrameworksDissecting and Attacking RMI Frameworks
Dissecting and Attacking RMI FrameworksOnapsis Inc.
 

Similar to SAP Single Sign-On 2.0 Overview (20)

SAP HANA Cloud Platform: The void between your Datacenter and the Cloud
SAP HANA Cloud Platform: The void between your Datacenter and the CloudSAP HANA Cloud Platform: The void between your Datacenter and the Cloud
SAP HANA Cloud Platform: The void between your Datacenter and the Cloud
 
SAP HANA Cloud Platform - Overview
SAP HANA Cloud Platform - OverviewSAP HANA Cloud Platform - Overview
SAP HANA Cloud Platform - Overview
 
Desenvolvimento JAVA orientado à SAP HANA Cloud Platform
Desenvolvimento JAVA orientado à SAP HANA Cloud PlatformDesenvolvimento JAVA orientado à SAP HANA Cloud Platform
Desenvolvimento JAVA orientado à SAP HANA Cloud Platform
 
SUSE Technical Webinar: Build HANA Apps in the Framework of the SAP and SUSE ...
SUSE Technical Webinar: Build HANA Apps in the Framework of the SAP and SUSE ...SUSE Technical Webinar: Build HANA Apps in the Framework of the SAP and SUSE ...
SUSE Technical Webinar: Build HANA Apps in the Framework of the SAP and SUSE ...
 
Breeze overview
Breeze overviewBreeze overview
Breeze overview
 
SAP HANA Cloud – Virtual Bootcamp Securing SAP HANA Cloud Applications
SAP HANA Cloud – Virtual BootcampSecuring SAP HANA Cloud Applications SAP HANA Cloud – Virtual BootcampSecuring SAP HANA Cloud Applications
SAP HANA Cloud – Virtual Bootcamp Securing SAP HANA Cloud Applications
 
SAP HANA Cloud: From Your Datacenter to the Cloud and Back
SAP HANA Cloud: From Your Datacenter to the Cloud and Back  SAP HANA Cloud: From Your Datacenter to the Cloud and Back
SAP HANA Cloud: From Your Datacenter to the Cloud and Back
 
Google Technical Webinar - Building Mashups with Google Apps and SAP, using S...
Google Technical Webinar - Building Mashups with Google Apps and SAP, using S...Google Technical Webinar - Building Mashups with Google Apps and SAP, using S...
Google Technical Webinar - Building Mashups with Google Apps and SAP, using S...
 
Accelerate2022-Solving the SAP Security Gap through Application-aware Network...
Accelerate2022-Solving the SAP Security Gap through Application-aware Network...Accelerate2022-Solving the SAP Security Gap through Application-aware Network...
Accelerate2022-Solving the SAP Security Gap through Application-aware Network...
 
Gateway Deployment Options
Gateway Deployment OptionsGateway Deployment Options
Gateway Deployment Options
 
Notes
NotesNotes
Notes
 
160d74ec 597c-0010-82c7-eda71af511fa
160d74ec 597c-0010-82c7-eda71af511fa160d74ec 597c-0010-82c7-eda71af511fa
160d74ec 597c-0010-82c7-eda71af511fa
 
Exploiting Critical Attack Vectors to Gain Control of SAP Systems
Exploiting Critical Attack Vectors to Gain Control of SAP SystemsExploiting Critical Attack Vectors to Gain Control of SAP Systems
Exploiting Critical Attack Vectors to Gain Control of SAP Systems
 
SAP TechEd 2013: CD105: Extending SuccessFactors EmployeeCentral with apps on...
SAP TechEd 2013: CD105: Extending SuccessFactors EmployeeCentral with apps on...SAP TechEd 2013: CD105: Extending SuccessFactors EmployeeCentral with apps on...
SAP TechEd 2013: CD105: Extending SuccessFactors EmployeeCentral with apps on...
 
Penetration Testing SAP Systems
Penetration Testing SAP SystemsPenetration Testing SAP Systems
Penetration Testing SAP Systems
 
2017 sitNL Cloud Foundry Masterclass
2017 sitNL Cloud Foundry Masterclass2017 sitNL Cloud Foundry Masterclass
2017 sitNL Cloud Foundry Masterclass
 
What is SAP API Management_.pdf
What is SAP API Management_.pdfWhat is SAP API Management_.pdf
What is SAP API Management_.pdf
 
SAP HANA Cloud Portal
SAP HANA Cloud PortalSAP HANA Cloud Portal
SAP HANA Cloud Portal
 
SAP HANA Cloud Portal - Overview Presentation
SAP HANA Cloud Portal - Overview PresentationSAP HANA Cloud Portal - Overview Presentation
SAP HANA Cloud Portal - Overview Presentation
 
Dissecting and Attacking RMI Frameworks
Dissecting and Attacking RMI FrameworksDissecting and Attacking RMI Frameworks
Dissecting and Attacking RMI Frameworks
 

More from SAP Technology

SAP Integration Suite L1
SAP Integration Suite L1SAP Integration Suite L1
SAP Integration Suite L1SAP Technology
 
Future-Proof Your Business Processes by Automating SAP S/4HANA processes with...
Future-Proof Your Business Processes by Automating SAP S/4HANA processes with...Future-Proof Your Business Processes by Automating SAP S/4HANA processes with...
Future-Proof Your Business Processes by Automating SAP S/4HANA processes with...SAP Technology
 
7 Top Reasons to Automate Processes with SAP Intelligent Robotic Processes Au...
7 Top Reasons to Automate Processes with SAP Intelligent Robotic Processes Au...7 Top Reasons to Automate Processes with SAP Intelligent Robotic Processes Au...
7 Top Reasons to Automate Processes with SAP Intelligent Robotic Processes Au...SAP Technology
 
Extend SAP S/4HANA to deliver real-time intelligent processes
Extend SAP S/4HANA to deliver real-time intelligent processesExtend SAP S/4HANA to deliver real-time intelligent processes
Extend SAP S/4HANA to deliver real-time intelligent processesSAP Technology
 
Process optimization and automation for SAP S/4HANA with SAP’s Business Techn...
Process optimization and automation for SAP S/4HANA with SAP’s Business Techn...Process optimization and automation for SAP S/4HANA with SAP’s Business Techn...
Process optimization and automation for SAP S/4HANA with SAP’s Business Techn...SAP Technology
 
Accelerate your journey to SAP S/4HANA with SAP’s Business Technology Platform
Accelerate your journey to SAP S/4HANA with SAP’s Business Technology PlatformAccelerate your journey to SAP S/4HANA with SAP’s Business Technology Platform
Accelerate your journey to SAP S/4HANA with SAP’s Business Technology PlatformSAP Technology
 
Accelerate Your Move to an Intelligent Enterprise with SAP Cloud Platform and...
Accelerate Your Move to an Intelligent Enterprise with SAP Cloud Platform and...Accelerate Your Move to an Intelligent Enterprise with SAP Cloud Platform and...
Accelerate Your Move to an Intelligent Enterprise with SAP Cloud Platform and...SAP Technology
 
Transform your business with intelligent insights and SAP S/4HANA
Transform your business with intelligent insights and SAP S/4HANATransform your business with intelligent insights and SAP S/4HANA
Transform your business with intelligent insights and SAP S/4HANASAP Technology
 
SAP Cloud Platform for SAP S/4HANA: Accelerate your move to an Intelligent En...
SAP Cloud Platform for SAP S/4HANA: Accelerate your move to an Intelligent En...SAP Cloud Platform for SAP S/4HANA: Accelerate your move to an Intelligent En...
SAP Cloud Platform for SAP S/4HANA: Accelerate your move to an Intelligent En...SAP Technology
 
Innovate collaborative applications with SAP Jam Collaboration & SAP Cloud Pl...
Innovate collaborative applications with SAP Jam Collaboration & SAP Cloud Pl...Innovate collaborative applications with SAP Jam Collaboration & SAP Cloud Pl...
Innovate collaborative applications with SAP Jam Collaboration & SAP Cloud Pl...SAP Technology
 
The IoT Imperative for Consumer Products
The IoT Imperative for Consumer ProductsThe IoT Imperative for Consumer Products
The IoT Imperative for Consumer ProductsSAP Technology
 
The IoT Imperative for Discrete Manufacturers - Automotive, Aerospace & Defen...
The IoT Imperative for Discrete Manufacturers - Automotive, Aerospace & Defen...The IoT Imperative for Discrete Manufacturers - Automotive, Aerospace & Defen...
The IoT Imperative for Discrete Manufacturers - Automotive, Aerospace & Defen...SAP Technology
 
IoT is Enabling a New Era of Shareholder Value in Energy and Natural Resource...
IoT is Enabling a New Era of Shareholder Value in Energy and Natural Resource...IoT is Enabling a New Era of Shareholder Value in Energy and Natural Resource...
IoT is Enabling a New Era of Shareholder Value in Energy and Natural Resource...SAP Technology
 
The IoT Imperative in Government and Healthcare
The IoT Imperative in Government and HealthcareThe IoT Imperative in Government and Healthcare
The IoT Imperative in Government and HealthcareSAP Technology
 
SAP S/4HANA Finance and the Digital Core
SAP S/4HANA Finance and the Digital CoreSAP S/4HANA Finance and the Digital Core
SAP S/4HANA Finance and the Digital CoreSAP Technology
 
Five Reasons To Skip SAP Suite on HANA and Go Directly to SAP S/4HANA
Five Reasons To Skip SAP Suite on HANA and Go Directly to SAP S/4HANAFive Reasons To Skip SAP Suite on HANA and Go Directly to SAP S/4HANA
Five Reasons To Skip SAP Suite on HANA and Go Directly to SAP S/4HANASAP Technology
 
SAP Helps Reduce Silos Between Business and Spatial Data
SAP Helps Reduce Silos Between Business and Spatial DataSAP Helps Reduce Silos Between Business and Spatial Data
SAP Helps Reduce Silos Between Business and Spatial DataSAP Technology
 
Spotlight on Financial Services with Calypso and SAP ASE
Spotlight on Financial Services with Calypso and SAP ASESpotlight on Financial Services with Calypso and SAP ASE
Spotlight on Financial Services with Calypso and SAP ASESAP Technology
 
SAP ASE 16 SP02 Performance Features
SAP ASE 16 SP02 Performance FeaturesSAP ASE 16 SP02 Performance Features
SAP ASE 16 SP02 Performance FeaturesSAP Technology
 

More from SAP Technology (20)

SAP Integration Suite L1
SAP Integration Suite L1SAP Integration Suite L1
SAP Integration Suite L1
 
Future-Proof Your Business Processes by Automating SAP S/4HANA processes with...
Future-Proof Your Business Processes by Automating SAP S/4HANA processes with...Future-Proof Your Business Processes by Automating SAP S/4HANA processes with...
Future-Proof Your Business Processes by Automating SAP S/4HANA processes with...
 
7 Top Reasons to Automate Processes with SAP Intelligent Robotic Processes Au...
7 Top Reasons to Automate Processes with SAP Intelligent Robotic Processes Au...7 Top Reasons to Automate Processes with SAP Intelligent Robotic Processes Au...
7 Top Reasons to Automate Processes with SAP Intelligent Robotic Processes Au...
 
Extend SAP S/4HANA to deliver real-time intelligent processes
Extend SAP S/4HANA to deliver real-time intelligent processesExtend SAP S/4HANA to deliver real-time intelligent processes
Extend SAP S/4HANA to deliver real-time intelligent processes
 
Process optimization and automation for SAP S/4HANA with SAP’s Business Techn...
Process optimization and automation for SAP S/4HANA with SAP’s Business Techn...Process optimization and automation for SAP S/4HANA with SAP’s Business Techn...
Process optimization and automation for SAP S/4HANA with SAP’s Business Techn...
 
Accelerate your journey to SAP S/4HANA with SAP’s Business Technology Platform
Accelerate your journey to SAP S/4HANA with SAP’s Business Technology PlatformAccelerate your journey to SAP S/4HANA with SAP’s Business Technology Platform
Accelerate your journey to SAP S/4HANA with SAP’s Business Technology Platform
 
Accelerate Your Move to an Intelligent Enterprise with SAP Cloud Platform and...
Accelerate Your Move to an Intelligent Enterprise with SAP Cloud Platform and...Accelerate Your Move to an Intelligent Enterprise with SAP Cloud Platform and...
Accelerate Your Move to an Intelligent Enterprise with SAP Cloud Platform and...
 
Transform your business with intelligent insights and SAP S/4HANA
Transform your business with intelligent insights and SAP S/4HANATransform your business with intelligent insights and SAP S/4HANA
Transform your business with intelligent insights and SAP S/4HANA
 
SAP Cloud Platform for SAP S/4HANA: Accelerate your move to an Intelligent En...
SAP Cloud Platform for SAP S/4HANA: Accelerate your move to an Intelligent En...SAP Cloud Platform for SAP S/4HANA: Accelerate your move to an Intelligent En...
SAP Cloud Platform for SAP S/4HANA: Accelerate your move to an Intelligent En...
 
Innovate collaborative applications with SAP Jam Collaboration & SAP Cloud Pl...
Innovate collaborative applications with SAP Jam Collaboration & SAP Cloud Pl...Innovate collaborative applications with SAP Jam Collaboration & SAP Cloud Pl...
Innovate collaborative applications with SAP Jam Collaboration & SAP Cloud Pl...
 
The IoT Imperative for Consumer Products
The IoT Imperative for Consumer ProductsThe IoT Imperative for Consumer Products
The IoT Imperative for Consumer Products
 
The IoT Imperative for Discrete Manufacturers - Automotive, Aerospace & Defen...
The IoT Imperative for Discrete Manufacturers - Automotive, Aerospace & Defen...The IoT Imperative for Discrete Manufacturers - Automotive, Aerospace & Defen...
The IoT Imperative for Discrete Manufacturers - Automotive, Aerospace & Defen...
 
IoT is Enabling a New Era of Shareholder Value in Energy and Natural Resource...
IoT is Enabling a New Era of Shareholder Value in Energy and Natural Resource...IoT is Enabling a New Era of Shareholder Value in Energy and Natural Resource...
IoT is Enabling a New Era of Shareholder Value in Energy and Natural Resource...
 
The IoT Imperative in Government and Healthcare
The IoT Imperative in Government and HealthcareThe IoT Imperative in Government and Healthcare
The IoT Imperative in Government and Healthcare
 
SAP S/4HANA Finance and the Digital Core
SAP S/4HANA Finance and the Digital CoreSAP S/4HANA Finance and the Digital Core
SAP S/4HANA Finance and the Digital Core
 
Five Reasons To Skip SAP Suite on HANA and Go Directly to SAP S/4HANA
Five Reasons To Skip SAP Suite on HANA and Go Directly to SAP S/4HANAFive Reasons To Skip SAP Suite on HANA and Go Directly to SAP S/4HANA
Five Reasons To Skip SAP Suite on HANA and Go Directly to SAP S/4HANA
 
SAP Helps Reduce Silos Between Business and Spatial Data
SAP Helps Reduce Silos Between Business and Spatial DataSAP Helps Reduce Silos Between Business and Spatial Data
SAP Helps Reduce Silos Between Business and Spatial Data
 
Why SAP HANA?
Why SAP HANA?Why SAP HANA?
Why SAP HANA?
 
Spotlight on Financial Services with Calypso and SAP ASE
Spotlight on Financial Services with Calypso and SAP ASESpotlight on Financial Services with Calypso and SAP ASE
Spotlight on Financial Services with Calypso and SAP ASE
 
SAP ASE 16 SP02 Performance Features
SAP ASE 16 SP02 Performance FeaturesSAP ASE 16 SP02 Performance Features
SAP ASE 16 SP02 Performance Features
 

Recently uploaded

Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 

Recently uploaded (20)

Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 

SAP Single Sign-On 2.0 Overview

  • 1. SAP Single Sign-On 2.0 Overview Presentation June 2014 Public
  • 2. Legal disclaimer This presentation is not subject to your license agreement or any other agreement with SAP. SAP has no obligation to pursue any course of business outlined in this presentation or to develop or release any functionality mentioned in this presentation. This presentation and SAP's strategy and possible future developments are subject to change and may be changed by SAP at any time for any reason without notice. This document is provided without a warranty of any kind, either express or implied, including but not limited to, the implied warranties of merchantability, fitness for a particular purpose, or non-infringement. SAP assumes no responsibility for errors or omissions in this document, except if such damages were caused by SAP intentionally or grossly negligent. © 2014 SAP AG or an SAP affiliate company. All rights reserved. Public 2
  • 3. Agenda SAP Portfolio Overview SAP Single Sign-On Single Sign-On Scenarios Architecture What’s New in Support Package 03 Recommendations Summary © 2014 SAP AG or an SAP affiliate company. All rights reserved. Public 3
  • 5. SAP Identity and Access Management Solutions Compliant Identity and Access Management Simplify and secure access SAP Single Sign-On Manage identities and permissions SAP Identity Management Identify and mitigate risks SAP Access Control © 2014 SAP AG or an SAP affiliate company. All rights reserved. Public 5
  • 7. SAP Single Sign-On – What is it about? Authenticate once and subsequently access SAP and non-SAP applications in a secure and user-friendly way. Meet company and regulatory requirements. Improve security measures and protect your company. © 2014 SAP AG or an SAP affiliate company. All rights reserved. Public 7
  • 8. SAP Single Sign-On – Benefits Security Reduce Costs Simplicity © 2014 SAP AG or an SAP affiliate company. All rights reserved. Public 8
  • 9. SAP Single Sign-On – Benefits in Detail Solve security and compliance issues caused by • Re-use of passwords • Password patterns • Trivial passwords • Passwords on post-it notes • Leaked passwords Solve productivity issues caused by y Large number of manual logins y Forgotten passwords y Help desk calls Only one secure (!) password to remember Only one password to store and protect Automated login while you work © 2014 SAP AG or an SAP affiliate company. All rights reserved. Public 9
  • 11. Business User Expectations SAP GUI SAP NetWeaver Business Client SAP Business Explorer Web Browser … Easy and secure access © 2014 SAP AG or an SAP affiliate company. All rights reserved. Public 11
  • 12. SAP Single Sign-On 2.0 Key Capabilities • Single sign-on for SAP and non-SAP applications • Support of proprietary SAP clients (e.g. SAP GUI) • Secure network communication (SNC) • SSO for cloud-based applications • Based on standards like X.509 certificates, SPNEGO, Kerberos, SAML • Password Manager SAP HANA and SAP NetWeaver SAP Business Suite SAP and non-SAP applications Cloud and cross-company SAP Single Sign-On Password Manager © 2014 SAP AG or an SAP affiliate company. All rights reserved. Public 12
  • 13. SAP Business Suite Single Sign-On Based on Kerberos / SPNEGO SAP Business Suite Secure Login Client Secure Login Library SPNEGO for ABAP Microsoft Active Directory Token: Kerberos SPNEGO only available in newer SAP NetWeaver releases SAP Business Suite SAP NetWeaver SAP client (native) Web client © 2014 SAP AG or an SAP affiliate company. All rights reserved. Public 13
  • 14. SAP and Non-SAP Applications Single Sign-On Based on X.509 Certificates SAP and non- SAP applications Secure Login Client Secure Login Server Secure Login Library Microsoft Active Directory, LDAP, other login modules Token: X.509 certificate This option supports most platforms and clients. Recommended for heterogeneous and intranet scenarios SAP Business Suite SAP NetWeaver SAP client (native) Web client Non-SAP Legacy systems © 2014 SAP AG or an SAP affiliate company. All rights reserved. Public 14
  • 15. Cloud and Cross-Company Single Sign-On and Identity Federation Based on SAML SAP and non-SAP applications SAML identity provider Microsoft Active Directory, LDAP, other login modules Token: SAML SAML is a public standard for Web applications. The application server has to support the standard. Recommended for extranet scenarios, partner integration SAP / non-SAP Web applications Cloud applications Web client Web client © 2014 SAP AG or an SAP affiliate company. All rights reserved. Public 15
  • 16. Secure Storage of Remaining Passwords Password Manager SAP and non- SAP applications Password Manager Stand-alone Based on user name and password Secure storage of remaining passwords in a local client. Provides automatic capture of login credentials © 2014 SAP AG or an SAP affiliate company. All rights reserved. Public 16
  • 18. SAP Single Sign-On – Components Secure Login Client y Client application y Manages security tokens (Kerberos tokens, X.509 certificates) Secure Login Server y Central service on SAP NetWeaver AS Java y Provides X.509 certificates to users and application servers Secure Login Library y Cryptography and security library for SAP NetWeaver AS ABAP Identity Provider y Central service on SAP NetWeaver AS Java y Provides SAML 2.0 assertions for Web-based SSO © 2014 SAP AG or an SAP affiliate company. All rights reserved. Public 18
  • 19. Single Sign-On Based on Kerberos / SPNEGO Start SAP GUI or Browser 1 2 Client SAP GUI / NWBC / Browser Secure Login Client Windows HTTPS (SPNEGO) Authentication 3 User Desktop SAP NetWeaver AS ABAP Secure Login Library NW AS JAVA DIAG, RFC (SNC) HTTPS (SPNEGO) Single Sign-On and Secure Communication Kerberos Token In a Nutshell • Relies on „Integrated Windows Authentication“ • Kerberos Security Token created by Microsoft Active Directory (AD) • No additional server required, low TCO • SAP backend needs to trust the AD • SPNEGO requires ABAP version 7.02 or higher • Kerberos/SPNEGO SSO supported by e.g. AS ABAP, AS Java, HANA DB, … Microsoft Active Directory (AD) SAP NetWeaver AS Java © 2014 SAP AG or an SAP affiliate company. All rights reserved. Public 19
  • 20. Single Sign-On Based on X.509 Certificates Client SAP GUI / NWBC / Secure Login Client User Desktop Sign into Secure Login Client profile 1 2 3 SAP GUI / Browser / Browser NWBC Secure Login Client 6 Authenticate 5 Provide X.509 Certificate Authentication Server 4 Verify User Credentials NW AS JAVA DIAG, RFC (SNC) HTTPS HTTPS Single Sign-On and Secure Communication In a Nutshell • Relies on X.509 certificate, a very mature standard security token • Certificates created by Secure Login Server (or other PKI) • SLS provides short-lived certificates, no overhead for revocation management • Multiple ways of user credential verification (SPNEGO, LDAP, ABAP, UME,...) • Support for SAP backends, but also for legacy systems, 3rd party Web applications,… • Secure Login Server requires AS Java SAP NetWeaver AS Java Secure Login Server (SLS) SAP NetWeaver AS ABAP Secure Login Library NW AS JAVA SAP NetWeaver AS Java © 2014 SAP AG or an SAP affiliate company. All rights reserved. Public 20
  • 21. Single Sign-On Based on SAML 2 Authenticate Return SAML Assertion 4 Authentication SAP NetWeaver AS Java Identity Provider (IDP) HTTPS Service HTTPS NW AS JAVA Service Provider (SP) Provider (SP) Service Provider (SP) In a Nutshell • Relies on Security Assertion Markup Language (SAML) assertions as security token • Industry standard for cloud and cross-company scenarios • Assertions created by Identity Provider, running on AS Java • Authentication initiated by IDP or SP • Multiple ways of user credential verification (SPNEGO, LDAP, ABAP, UME,..) Client Browser 5 Single Sign-On and Secure Communication 1 User Desktop Server 3 Verify User Credentials Service Provider (SP) © 2014 SAP AG or an SAP affiliate company. All rights reserved. Public 21
  • 22. What’s New in Support Package 03
  • 23. Two-Factor Authentication with SAP Authenticator Two-Factor Authentication Authentication with One-Time Passwords (OTP) Provide two means of identification y OTP required for login in addition to password or security token y Second factor for high security scenarios Based on SAP Authenticator iOS Application y OTP (6-digit code) created on mobile device Usage Scenarios Integrated with Secure Login Server (X.509) and Identity Provider (SAML) y Administrator configures SAP NetWeaver AS Java system to require two-factor authentication For Web and SAP GUI scenarios © 2014 SAP AG or an SAP affiliate company. All rights reserved. Public 23
  • 24. SSO for SAP GUI for Java on Mac OS X Secure Login Client for Mac Client Computers Mac OS X 10.7 or higher Usage Scenarios Kerberos-based authentication X.509 certificates For SAP GUI scenarios © 2014 SAP AG or an SAP affiliate company. All rights reserved. Public 24
  • 25. RFID-Based User Identification Identify Users with RFID Token (Radio Frequency Identification) Only privileged persons have physical access Instant user identification with RFID token Based on X.509 certificates Usage Scenarios Warehouse and production scenarios Kiosk/terminal computers © 2014 SAP AG or an SAP affiliate company. All rights reserved. Public 25
  • 26. Hardware Security Module Support Hardware Security Module Support for Digital Signatures Store Private Keys in Hardware y Protect Secure Login Server Certificate Authority y Protect private keys for digital signatures (Secure Store and Forward, SSF) y Performance acceleration Thales SafeNet © 2014 SAP AG or an SAP affiliate company. All rights reserved. Public 26
  • 28. Recommendations 9 Identify the most critical systems. Which systems contain your most sensitive business information? How many people have access to them? Define your overall single sign-on strategy and start with these critical business systems. Understand the different modules of SAP Single Sign-On and analyze your system landscape to determine which SSO standards can be used. If your organization does not have the appropriate resources and know-how, involve SAP Consulting or SAP partners. Passwords are often the weakest link in enterprises. Prevent the usage of passwords by relying on standards such as SAML, X.509 certificates, or Kerberos. SAP Single Sign-On offers solutions for all of these standards. Once you have implemented single sign-on, start enforcing strong passwords in the related systems. Mid-term strategy: Consider disabling user name/password authentication in critical business systems. Provide a tool to store remaining passwords (such as the Password Manager component of SAP Single Sign-On). 9 9 9 9 © 2014 SAP AG or an SAP affiliate company. All rights reserved. Public 28
  • 30. Extensible Technology – Ready for the Future SAP Business Suite SAP and non-SAP applications Cloud and cross-company © 2014 SAP AG or an SAP affiliate company. All rights reserved. Public 30
  • 31. Summary SAP Single Sign-On is a “Single Sign-On Suite” that supports SAP as well as non-SAP applications. It offers • Investment protection • Flexibility • Single sign-on for heterogeneous system landscapes What are the main business drivers? • Protect business, reputation and trust • Lower password related costs • Simplicity and agility © 2014 SAP AG or an SAP affiliate company. All rights reserved. Public 31
  • 32. Get More Information Community Network Get more information, videos and updates http://scn.sap.com/community/sso © 2014 SAP AG or an SAP affiliate company. All rights reserved. Public 32
  • 33. Thank you Contact information: Product Management SAP AG © 2014 SAP AG or an SAP affiliate company. All rights reserved.
  • 34. © 2014 SAP AG or an SAP affiliate company. All rights reserved. No part of this publication may be reproduced or transmitted in any form or for any purpose without the express permission of SAP AG or an SAP affiliate company. SAP and other SAP products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of SAP AG (or an SAP affiliate company) in Germany and other countries. Please see http://global12.sap.com/corporate-en/legal/copyright/index.epx for additional trademark information and notices. Some software products marketed by SAP AG and its distributors contain proprietary software components of other software vendors. National product specifications may vary. These materials are provided by SAP AG or an SAP affiliate company for informational purposes only, without representation or warranty of any kind, and SAP AG or its affiliated companies shall not be liable for errors or omissions with respect to the materials. The only warranties for SAP AG or SAP affiliate company products and services are those that are set forth in the express warranty statements accompanying such products and services, if any. Nothing herein should be construed as constituting an additional warranty. In particular, SAP AG or its affiliated companies have no obligation to pursue any course of business outlined in this document or any related presentation, or to develop or release any functionality mentioned therein. This document, or any related presentation, and SAP AG’s or its affiliated companies’ strategy and possible future developments, products, and/or platform directions and functionality are all subject to change and may be changed by SAP AG or its affiliated companies at any time for any reason without notice. The information in this document is not a commitment, promise, or legal obligation to deliver any material, code, or functionality. All forward-looking statements are subject to various risks and uncertainties that could cause actual results to differ materially from expectations. Readers are cautioned not to place undue reliance on these forward-looking statements, which speak only as of their dates, and they should not be relied upon in making purchasing decisions. © 2014 SAP AG or an SAP affiliate company. All rights reserved. Public 34