How To Configure SAML Authentication for SAP NetWeaver Process Integration 7.1
|
|
|
- Kristian Robertson
- 10 years ago
- Views:
Transcription
1 SAP NetWeaver How-To Guide How To Configure SAML Authentication for SAP NetWeaver Process Integration 7.1 Applicable Releases: SAP NetWeaver Process Integration 7.1x and higher Topic Area: SOA Middleware Capability: SOA Management Version 1.0 April 2009
2 Copyright 2009 SAP AG. All rights reserved. No part of this publication may be reproduced or transmitted in any form or for any purpose without the express permission of SAP AG. The information contained herein may be changed without prior notice. Some software products marketed by SAP AG and its distributors contain proprietary software components of other software vendors. Microsoft, Windows, Outlook, and PowerPoint are registered trademarks of Microsoft Corporation. IBM, DB2, DB2 Universal Database, OS/2, Parallel Sysplex, MVS/ESA, AIX, S/390, AS/400, OS/390, OS/400, iseries, pseries, xseries, zseries, z/os, AFP, Intelligent Miner, WebSphere, Netfinity, Tivoli, Informix, i5/os, POWER, POWER5, OpenPower and PowerPC are trademarks or registered trademarks of IBM Corporation. Adobe, the Adobe logo, Acrobat, PostScript, and Reader are either trademarks or registered trademarks of Adobe Systems Incorporated in the United States and/or other countries. Oracle is a registered trademark of Oracle Corporation. UNIX, X/Open, OSF/1, and Motif are registered trademarks of the Open Group. Citrix, ICA, Program Neighborhood, MetaFrame, WinFrame, VideoFrame, and MultiWin are trademarks or registered trademarks of Citrix Systems, Inc. HTML, XML, XHTML and W3C are trademarks or registered trademarks of W3C, World Wide Web Consortium, Massachusetts Institute of Technology. Java is a registered trademark of Sun Microsystems, Inc. JavaScript is a registered trademark of Sun Microsystems, Inc., used under license for technology invented and implemented by Netscape. MaxDB is a trademark of MySQL AB, Sweden. SAP, R/3, mysap, mysap.com, xapps, xapp, SAP NetWeaver, and other SAP products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of SAP AG in Germany and in several other countries all over the world. All other product and service names mentioned are the trademarks of their respective companies. Data contained in this document serves informational purposes only. National product specifications may vary. These materials are subject to change without notice. These materials are provided by SAP AG and its affiliated companies ("SAP Group") for informational purposes only, without representation or warranty of any kind, and SAP Group shall not be liable for errors or omissions with respect to the materials. The only warranties for SAP Group products and services are those that are set forth in the express warranty statements accompanying such products and services, if any. Nothing herein should be construed as constituting an additional warranty. These materials are provided as is without a warranty of any kind, either express or implied, including but not limited to, the implied warranties of merchantability, fitness for a particular purpose, or non-infringement. SAP shall not be liable for damages of any kind including without limitation direct, special, indirect, or consequential damages that may result from the use of these materials. SAP does not warrant the accuracy or completeness of the information, text, graphics, links or other items contained within these materials. SAP has no control over the information that you may access through the use of hot links contained in these materials and does not endorse your use of third party web pages nor provide any warranty whatsoever relating to third party web pages. SAP NetWeaver How-to Guides are intended to simplify the product implementation. While specific product features and procedures typically are explained in a practical business context, it is not implied that those features and procedures are the only approach in solving a specific business problem using SAP NetWeaver. Should you wish to receive additional information, clarification or support, please refer to SAP Consulting. Any software coding and/or code lines / strings ( Code ) included in this documentation are only examples and are not intended to be used in a productive system environment. The Code is only intended better explain and visualize the syntax and phrasing rules of certain coding. SAP does not warrant the correctness and completeness of the Code given herein, and SAP shall not be liable for errors or damages caused by the usage of the Code, except if such damages were caused by SAP intentionally or grossly negligent. Disclaimer Some components of this product are based on Java. Any code change in these components may cause unpredictable and severe malfunctions and is therefore expressively prohibited, as is any decompilation of these components. Any Java Source Code delivered with this product is only to be used by SAP s Support Services and may not be modified or altered in any way.
3 Document History Document Version Description 1.00 First official release of this guide
4 Typographic Conventions Icons Type Style Description Icon Description Example Text Words or characters quoted from the screen. These include field names, screen titles, pushbuttons labels, menu names, menu paths, and menu options. Caution Note or Important Example Recommendation or Tip Cross-references to other documentation Example text Emphasized words or phrases in body text, graphic titles, and table titles Example text File and directory names and their paths, messages, names of variables and parameters, source text, and names of installation, upgrade and database tools. Example text User entry texts. These are words or characters that you enter in the system exactly as they appear in the documentation. <Example text> Variable user entry. Angle brackets indicate that you replace these words and characters with appropriate entries to make entries in the system. EXAMPLE TEXT Keys on the keyboard, for example, F2 or ENTER.
5 Table of Contents 1. Business Scenario Introduction Scenario Description Background Information Prerequisites Software Supported releases ABAP Kernel and Cryptographic library Relevant SAP Notes Sender-Vouches Subject Confirmation Method for SAML Token Profiles Configuration Steps in Detail Setup Web Service Security Configuring Trust Relationship for ABAP Systems Enable Principal Propagation Maintain Trusted Issuer Configure Communication Monitoring Appendix Troubleshooting Error Scenarios Problems and Solutions Additional Information Help Documentation Upcoming Features Tips... 45
6 1. Business Scenario 1.1 Introduction Entering usernames and passwords on the Internet has become a significant security challenge. As single sign-on provides access to many resources once the user is initially authenticated ("keys to the castle"), it increases the negative impact in case the credentials are available to other persons and misused. Therefore, single sign-on requires an increased focus on the protection of the user credentials, and should ideally be combined with strong authentication methods, e.g. smart cards, Kerberos, SSL etc. It also, reduces sharing and impersonation of usernames and passwords, eliminates usage barriers and risky proprietary SSO implementations that are vulnerable to attacks. Historically, the majority of Web services have been based on the same enabling technology that underlies the Web, namely HTTP (Hyper Text Transfer Protocol). As a result, common technologies that secure Web applications, such as Basic Authentication and SSL (Secure Sockets Layer), work equally well with web services. These security technologies have been effective for years for all sorts of online business transactions, and they work equally well for Web services. Security at the transport layer: SSL, however, does have limitations. SSL for Web services is an all-ornothing proposition: it often secures the entire wire protocol rather than just the SOAP (Simple Object Access Protocol) message sent over the protocol. It doesn't let developers apply different levels of security to different parts of a document. Because of its point-to-point structure, SSL doesn't support chained services or workflow applications where user credentials can be passed through each stop in a transaction chain. This leaves the messages unsecured at each intermediary checkpoint. SSL also does not support the concept of an audit trail. There are different ways you can use standard HTTP authentication mechanisms, such as Basic Authentication (User ID and Password) Http over SSL X.509 Certificates SAP Assertion Tickets (Logon Tickets) Security at the message layer: The answer to providing both message- and transport-level security lies with the OASIS (Organization for the Advancement of Structured Information Standards) standard, Web Service Security, released as a full industry-recognized recommendation in April WS- Security defines a mechanism for adding transport independence and different levels of security to SOAP messages.there are many SOAP message authentication mechanisms, such as Username Token X.509 certificate Token XML Signature XML Encryption SAML 1.1 Token SAML 1.1 Assertion issued by a central Security Token Service If there is a need to apply message integrity and confidentiality at a fine-grained level instead of applying to the entire SOAP message, XML signature and encryption can be used to protect the SOAP body, header block, or portions of either. If there is a need to use different forms of authentication, then message-level security authentication tokens can be used, such as username token, X.509 token, SAML token or SAML Holder of the Key (STS). April
7 WS-Security Scenario Web Service Security describes mechanisms to provide message integrity and confidentiality for SOAP messaging. It leverages existing standards like XML Signature, XML Encryption to cover a wide variety of security models and encryption technologies. It plugs into the SOAP architecture and extends the SOAP header information in the protocol with additional security information such as encryption keys, digital signatures and authentication information. WS-Security addresses end-to-end security through the definition of the security header format for SOAP messages that is designated by the opening and closing <Security> block. The specification builds upon existing and approved approaches to distributed systems security such as public key encryption, digital signatures or certificates. For protecting messages, X.509, SAML 1.1 and Secure Conversation are supported. WS-Security does not invent any new security mechanisms it simply defines how existing ones, such as XML Encryption or XML Signature, should be applied in the context of a SOAP message. Figure 1 illustrates a common usage scenario for WS-Security: The SOAP message is signed with the private key of sender to ensure integrity of the content. Based on the signature, the recipient can verify the identity of the sender and that the data has not been modified by an intermediary during transit. More precisely, the sender has signed two elements of the SOAP message: The SOAP <Body> with the application data and the <Timestamp> element of the message, which contains the message creation date and time to let the recipient decide whether the message is fresh enough to be processed or not. Figure 1: Signed SOAP Message with WS-Security Based on the certificate (like X.509, SAML ) contained in the <BinarySecurityToken> element that belongs to the private key used to sign the message, the recipient can determine the sender s identity and decide whether to trust it or not. Successful verification of the sender s identity requires a preestablished trust relationship between both parties. Sender and recipient usually trust a common Certification Authority (CA) and trust the certificates issued by that CA. This document explicates a way of authenticating web services using SAML 1.0 token mechanism. SAP Netweaver Process Integration 7.1 contains an interoperable security solution to allow systems integration with great ease and minimal resources using Security Assertion Markup Language (SAML). The SAML is an XML-based framework for exchanging security information. This security information is expressed in the form of assertions (security related information) about subjects (Business users), either human or computer, that have identities in some security domain. One example of a subject is a person, who is identified by his or her address in a particular Internet April
8 DNS domain. Assertions convey information about authentication acts performed by subjects, attributes of subjects, as well as authorization decisions about whether subjects are allowed to access certain resources. SAML provides a flexible and extensible framework for business and Web services to exchange security information, such as authentication, authorization, and attributes, about their users. For example, it allows one service to vouch for a user's authentication to another service. This provides useful activities, such as single sign-on to multiple services. SAML lets one service to inform another service whether a user is permitted to access a given resource. This allows policy enforcement to be decoupled from resource services. It also provides attribute information about a user, such as work-site address, to be communicated between services as the user moves from one site to another. Within a single company SAP Logon Tickets may be used for Single-Sign-On (SSO). But if SSO between different companies is needed (authentication over Domain Boundaries ) the use of SAP Logon Tickets is not practical any more. SAML addresses the problem of authentication and authorization across Domain Boundaries. Web service infrastructure in Process Integration 7.1 supports both point-to-point and mediated (over PI) scenarios. It enables to use the sender-vouches subject confirmation method to confirm a subject with SAML token profile authentication and Web service Reliable messaging (WS-RM) for Principal Propagation. For this subject confirmation method, the SAP NetWeaver PI (Web Service intermediary system) acts as a SAML assertion issuer. SAP NetWeaver PI system authenticates the Web Service (WS) client and forwards to the back-end WS provider the authentication information for the WS consumer using SAML Token profile. The WS provider, in turn, authenticates access based on its trust relationship with the intermediary system. You would like to use this feature in your SAP Netweaver PI 7.1 system. Note SAP NetWeaver PI 7.1 system is referred to as PI system, WS provider system as Provider and WS consumer system as Consumer in the remainder of this document. 1.2 Scenario Description To better understand the whole the process flow it is necessary to take a simple business scenario where Consumer sends a customer number synchronously to the Provider expecting the customer details as a response. PI system invokes a service on the Provider to get the details. The main purpose of the scenario is to show how the user identities can be propagated from the Consumer to the Provider via the intermediary server, Process Integration. Consumer triggers the process by sending the customer number via ABAP client proxy exposed as a web service using WS runtime. At Provider system a server ABAP proxy exposed as a service handles the client request and responds with the details of the customer. The following graphic describes the important application components and their communication with the PI system for a typical three system landscape. April
9 customer number customer number WS Consumer Bob customer details Process Integration customer details WS Provider Bob Figure 2: Overview of the process Note Business user (for e.g. Bob) to be propagated must exist at Integration server as a service user with appropriate roles for message processing 2. Background Information This guide explains how to configure SAML authentication using SAP NetWeaver Process Integration 7.1. In this document we will use SAML 1.0 Sender Vouches Assertion method to configure web service security between AS ABAP systems. Where information is available otherwise, the guide will refer to the same rather than to repeat it. 3. Prerequisites To read the specification of SAML, see OASIS documentation at To get a basic understanding of what SAML is all about, see SOAP Message Level Authentication This guide assumes that the Consumer and Provider ABAP Proxy scenario is configured beforehand using the Help Documentation given in the Appendix section. 3.1 Software This section provides the details of supported releases for the applications (Consumer, Integration Server and Provider) and the version details of ABAP service pack, ABAP Kernel and Crypto library. The technology stack of backends can be AS ABAP, AS Java, or external system. This guide makes the following assumptions: An ABAP back-end is used at the consumer and provider ends SAP NetWeaver PI 7.1 is installed. April
10 3.1.1 Supported releases Consumer Integration Server Provider AS ABAP 7.0 >= SP14 AS ABAP 7.1 and higher AS ABAP 7.0 >= SP ABAP Kernel and Cryptographic library ABAP Kernel 700_REL ABAP Kernel 710_REL Patch level 179 is minimum Patch level 116 is minimum Note Download the latest Kernel patch from SMP (Service Market Place) SAP Cryptographic Library or higher must be installed on all systems involved. You can check this in transaction STRUST, menu Environment->Display SSF Version. For example: SSFLIB Version ; SECUDE(tm) SAPCRYPTOLIB SNC for SAP Server components and SSL Version5.5.5C (c) SECUDE GmbH For more information about the installation of SAP Cryptographic Library, see Installing the SAP Cryptographic Library on the SAP Web Dispatcher and check SAP Note After installing the cryptographic library, create the PSEs (Personal Security Environment) in Trust- Manager by using the transaction STRUST. This step ensures that the cryptographic keys and certificates required for the application are stored in the PSE and this step needs to be done on all involved systems (Consumer, Integration Server and Provider). Make sure you check the system PSE health, before installing crypto library, as given below: Before installation of Cryptographic library 1. Call transaction STRUST as shown below. You should see the green node by expanding System PSE. This ensures that the system PSE is stored in the database and distributed to application servers. April
11 Figure 3: Trust Manager 2. Double click on Owner (CN=XID, for example as shown in Figure 3). This will show the system certificate details like Owner, Issuer, Serial Number etc. as shown below: April
12 Figure 4: Check System PSE After installation of Cryptographic library 3. After installing the crypto library, call transaction STRUST and create all PSEs (SNC, SSL server, SSL client, SSF application and WS Security) which are displayed with Red Cross mark as shown below: April
13 Figure 5: Maintain PSE For more information, see Creating PSEs and Maintaining the PSE Infrastructure 3.2 Relevant SAP Notes Central note for WS Security on Central note for WS Security on WS adapter: Dump STRING_LENGTH_TOO_LARGE Transaction SECSTORE displays many SOAP runtime entries Missing authorization for SYST or RFCPING Activating PI objects leads to no change in ABAP bgrfc scheduler terminates w/ arithmetic overflow exception SSF Encryption Using the SAPCryptolib SYSTEM_CORE_DUMPED, exception CX_SY_MESSAGE_IN_PLUGIN_MODE April
14 4. Sender-Vouches Subject Confirmation Method for SAML Token Profiles The SAML Token Profile authentication enables you to confirm a subject in SAML with the sendervouches subject confirmation method. This method enables SSO for Web services by using a SAML assertion to forward authentication information acquired in an initial logon. You can use the sendervouches confirmation method for SSO scenarios where the WS intermediary system has a trust relationship with the back-end system. This scenario defines four different entities: (1) a client, (2) an intermediary, (3) SAML issuer, and (4) a back-end system that is the WS provider. For an overview of the system interaction for this scenario, see the figure below: Figure 6: Sender-Vouches Subject Confirmation Method The following steps describe in more detail the lifetime of a request using the SAML sender-vouches profile. 1. The client sends a request to the intermediary. This request can be of any kind but must contain valid authentication information to log the client on to the intermediary. 2. The intermediary authenticates the client. To process the request, the intermediary needs to retrieve information from the back-end system using Web Services forwarding mechanisms for the client s authentication information. 3. To forward the client s authentication, the intermediary needs to add a SAML assertion to the request. This assertion is provided by the issuer. To get it the intermediary needs to forward all necessary login information to the issuer, which in return creates the SAML assertion. 4. The assertion is added to the Web service request. To vouch for the integrity of the SAML assertion and the payload of the Web service request both are signed by the intermediary using a digital signature. The intermediary is able to vouch for the SAML assertion because there is an explicit trust relationship between the back-end system and the intermediary, which enables the back-end system to verify the digital signature. 5. The Web service request containing the SAML assertion is now sent to the back-end system. 6. The back-end system attempts to verify the SAML assertion. Other than checking the correctness of the SAML assertion, the back-end system also verifies that the issuer is trusted and there is an existing trust relationship between the intermediary and the backend system. After successful verification, the client is logged on to the system and the request is processed. 7. The back-end system sends a response to the intermediary. The intermediary uses the received data to complete the client s request and send a response to the client. April
15 The following excerpt shows what a security header including a SAML assertion using the sendervouches subject confirmation method looks like. <wsse:security> <saml:assertion AssertionID="SAML_ID" Issuer=" <saml: Conditions NotBefore="..." NotOnOrAfter="..."/> <saml:authenticationstatement AuthenticationMethod="urn:oasis:names:tc:SAML:1.0:am:unspecified" 19T...Z" <saml:subject> <saml:nameidentifier NameQualifier="" AuthenticationInstant=" Format="urn:oasis:names:tc:SAML:1.1:nameid- format:unspecified">your Business User that is propagated</saml:nameidentifier> <saml:subjectconfirmation> <saml:confirmationmethod> urn:oasis:names:tc:saml:1.0:cm:sender-vouches </saml:confirmationmethod> </saml:subjectconfirmation> </saml:subject> </saml:authenticationstatement> </saml:assertion> <wsse:securitytokenreference wsu:id="str1"...>... </wsse: SecurityTokenReference...> <wsse:binarysecuritytoken...>... </wsse:binarysecuritytoken> <ds:signature> <ds:signedinfo> <ds:reference URI="#STR1">... </ds:reference> <ds:reference URI="#body">... </ds:reference>... </ds:signedinfo> </ds:signature> </wsse:security> April
16 5. Configuration Steps in Detail This section covers the configuration steps required in back-end systems and PI system for message processing with Integration Server communication. 5.1 Setup Web Service Security To create the configuration for WS Security, execute the report WSS_SETUP by calling the transaction SA38 in all the systems (Consumer, Integration Server and Provider) involved, as shown below: The successful result of the report is shown below: Figure 7: WS Security Configuration Figure 8: WSS_SETUP result The report creates a user, DELAY_LOGON, which does not have any authorizations on Integration Server. Also it stores the user password in the secure storage. Whenever Consumer of an SAP system logs on to a web service with message based authentication such as SAML Token, the Internet Communication Framework (ICF) initially performs the logon using the technical user DELAY_LOGON that is stored in it. A direct logon with the authentication data contained in the SOAP document is not possible, since the ICF cannot access SOAP data. It requires an HTTP authentication (Transport level) and therefore it uses the DELAY_LOGON user. All ICF nodes, created by SOAP runtime with message authentication, use DELAY_LOGON user for initial authentication. After this step the SOAP runtime performs a user switch and logs on the user specified in SAML Token as shown below: April
17 CAUTION Figure 9: User switch from DELAY_LOGON Never change the password of DELAY_LOGON user on Integration Server and do not assign any roles or profiles to this user. 5.2 Configuring Trust Relationship for ABAP Systems Each communication step along the way from the sender to the receiver requires a separate authentication for each messaging component before the message is executed. This implies that the message is executed under the same user in all participating messaging components. Wherever SAML assertion is used for authentication between a sending and a receiving messaging component, a trust relationship, between the underlying application servers first, needs to be configured. As a prerequisite, the X.509 client certificates for the WS Security PSEs must have been signed by a Certification Authority (CA), so that encryption can be used. The certificate contains the CA v3 extension Subject Key Identifier. Since a distinction is made between the sender (client) and the receiver (server) side, two configuration variants apply: AS ABAP client configuration AS ABAP server configuration Note Different components (Consumer, Integration Server and Provider) act either as client [C] or server [S] depending on the connection, as shown below: Request: AS ABAP WS consumer [C] [S] Integration Server [C] [S] AS ABAP WS provider Response: AS ABAP WS provider [C] [S] Integration Server [C] [S] AS ABAP April
18 Consumer Procedure 1. On ABAP Client [C], call transaction STRUST and export the certificate as shown below: Figure 10: Export WS Consumer system certificate 2. Choose Binary file format and save the certificate to local desktop as shown below: April
19 Figure 11: Export dialog You have made the certificate available as a file, which you can later import into the ABAP Server [S] system. April
20 3. On ABAP Server [S], call transaction STRUSTSSO2 and import the certificate as shown below: Figure 12: Import certificate into ABAP Server [S] 4. Select Binary file format and import the client certificate which is saved as file from step 2 5. Click on Add to Certificate List button to add this certificate to the list 6. Click on Add to ACL button to add the client system to Access Control List of server as shown below: April
21 Figure 13: Add to ACL Save the data now and as a result, you will be able to see the ABAP Client [C] system added as an entry to the Access Control List window as given below: Figure 14: Access Control List window You need to perform the above steps for every client-server combination as explained in the above important note for establishing the SSO trust between all systems. 5.3 Enable Principal Propagation Call transaction SXMB_ADM (Integration Engine - Administration) and run Configure Principal Propagation to activate principal propagation. This will create a service user XIPPUSER with role SAP_XI_APPL_SERV_USER assigned to the same and a RFC destination SAPXIPP<Client No>. Activation has the effect that the user context in message processing remains the same for all asynchronous locks and restarts. The context of the user to be propagated is impersonated again after a message restart or during batch processing only if principal propagation is enabled for the involved messaging component (The ABAP messaging components are the Integration Server and the Integration Engines of the sender and receiver systems executing ABAP proxies). This step needs to be done on Consumer, Integration Server and Provider systems as shown below: April
22 Figure 15: Activate Principal Propagation 5.4 Maintain Trusted Issuer Determine the issuer 1. In the Consumer, run report WSS_INFO using transaction SA38 to determine the data that the accepting system requires. This provides information about how the issued SAML assertion looks like, as shown below: Figure 16: Trusted Issuer April
23 The above procedure determines the issuer of SAML assertion and the certificate used to sign the SAML assertion. For instance, the issuer is EC6 client 001 and certificate used is enclosed in the tags ---BEGIN CERTIFICATE--- and ---END CERTIFICATE--- from the Figure 14. This information will be used for setting up the Integration Server to accept the SAML token profiles. Preparing the Integration Server to accept SAML Token Profiles 2. For all propagated users, a user mapping has to be maintained. User mapping clarifies following questions: Do I trust the issuer of the assertion, and hence the user that is the subject of the assertion? Which user should be logged in? Optionally, maintain user mapping either directly in table USREXTID, or via table view VUSREXTID. In the Integration Server, call transaction SA38 and execute the report RSUSREXTID to maintain a user mapping for the business user to be propagated as shown below: April
24 Figure 17: User Mapping In the next screen, enter the following values to maintain user mapping. April
25 Tip Clear or remove the default values of all the fields before entering the following values. User External ID type : Business user that needs to be propagated : SA Prefix of External Name : <SID>/<Client>:: (Copy the value of Prefix of External Name from step 1 screen above and paste it in this field) Optional Issuer s Name : Copy the value of the External Name Of Issuer from Step 1 screen above and paste it in this field Uncheck the fields Only Users without Ext. Names and Test Mode. Click on EXECUTE and verify the results on the next screen. 3. Optionally, call transaction SM30 and enter the Table/View name as VUSREXTID to display and verify the user mapping for the business user. In the next pop-up window select External ID type as SA. You will see your business user present in the table with the status activated as shown below: Figure 18: Display User Mapping 4. Go to transaction SA38, and execute the report WSS_INFO. This information will be used for setting up the Provider to accept SAML token profiles as shown below: April
26 Figure 19: SAML Signature Certificate on Integration Server Preparing the Provider to accept SAML Token Profiles 5. Go to transaction SA38 and execute the report RSUSREXTID to maintain user mapping for the business user. Repeat the steps 2 and 3 on Provider also. 5.5 Configure Communication Follow the steps below to configure the ABAP backend as a WS Provider assuming that the proxy scenario is already configured using the Help Documentation given in the Appendix section. Use SOAMANAGER to configure the endpoints for the Provider proxy 1) Logon to the Provider, go to transaction SOAMANAGER. Navigate to Business Administration Web Service Administration, as shown below: April
27 Figure 20: Web Service administration 2) The following web page will be displayed in the web browser. Select the Provider proxy service for which you need to create the Logical port and Binding information. 1. Select Search by: Service 2. Enter Search Pattern: This name is from the SPROXY display of the External Key of the provider interface. 3. Select Field: External Name or Both Names. 4. Click on button Go. 5. With the Search Result, select the service 6. Click on button Apply Selection. This procedure is shown below: Figure 21: Search for Provider service 3) On the lower half of the screen, go to Configuration Tab Create Service. April
28 Figure 22: Create Service 4) Enter any service and binding names for the web service: Figure 23: Creating Binding Information 5) On the lower half of the screen, a) Select SAML 1.1 Sender Vouches Assertion b) Save the configuration April
29 Note Figure 24: Message Authentication In the case of Secure Conversation, you need to select the transport guarantee type as Secure Conversation instead of No Transport Guarantee. 6) Go to Overview tab and click on Open WSDL document for selected binding.this will open a browser window with the WSDL document where you can copy the URL of the web service and paste it to temporary location. This URL is needed while configuring the receiver communication channel in Integration Directory. April
30 Example Figure 25: Web Service URL 850A9D0/wsdl11/allinone/ws_policy/document?sap-client=001 Host Port : 8000 URL Access Path: : inst blr4.sap.corp /sap/bc/srt/wsdl/bndg_de07133f1607bbf1b1b a9d0/wsdl11/allinone/ws_policy/d ocument?sap-client=001 Configure SAML Authentication in Integration Directory Follow the below steps in Integration Directory assuming that the configuration scenario is already created. In this section you will see how the sender and receiver communication channels can be configured. 7. WS Sender Communication Channel: (Consumer) Enter the system related information of the PI server. Change the Authentication Method to SAML 1.1 Sender Vouches Assertion (Authentication in message) as shown below: April
31 Figure 26: Sender Communication Channel (WS adapter) 8. WS Receiver Communication Channel: (Provider) Enter the system related information of the Provider. Change the Authentication Method to SAML 1.1 Sender Vouches Assertion (Authentication in message). The URL access path can be obtained from the step 6 above. April
32 Figure 27: Receiver Communication Channel (WS adapter) 9. Sender Agreement: Create a sender agreement for the sender communication channel, configured in step 7. April
33 Figure 28: Sender Agreement Obtain the WSDL URL for the Sender Agreement. This URL will be used in the configuration of consumer proxy. Menu: Sender Agreement Display WSDL April
34 Figure 29: Display WSDL Copy and Paste the URL to a temporary location: Figure 30: WSDL URL for consumer April
35 Example m_os5customer400/swcv_5b7207a08a1c11dda28addc30a889430/chn_890d59ae EB41B5DC60F0FB5/agr_5E6C7D9B732F353986E43EB3D99CD363/wsdl11/document/allinone/ ws_policy?sap-client= Receiver Agreement: Create a Receiver Agreement for the receiver communication channel, configured in the step 8. Figure 31: Receiver Agreement When the PI integration server makes an outbound call, it needs to have the WSDL file. The WSDL file contains interface information as well as WS Policy. WS Policy contains information about the security requirements for the web service (what kind of authentication, use of XML Signature/Encryption). The WSDL is obtained by an HTTP GET request as 1) WSDL access is only granted to authenticated users 2) HTTP GET requests can not be authenticated based on HTTP Headers as no SOAP message is transferred So a different kind of authentication is needed and this must be a transport authentication. Therefore the Integration Server uses basic authentication with a service user to obtain the WSDL once. During runtime, no basic authentication is used, but SAML is used for authentication. The user should have authorization to access the metadata. April
36 Use transaction SOAMANAGER to configure the ports/bindings for the consumer proxy Follow the below steps to configure the web service for the consumer proxy: 11. Logon to the Consumer and execute transaction SOAMANAGER. Click on tab Business Administration and then Web Service Administration. 12. Select the consumer proxy: Figure 32: Web Service Administration Figure 33: Search Consumer Proxy 13. On lower half of the page, click on the Configurations tab and then Create Logical Port button. April
37 Figure 34: Create Logical Port 14. Create the service and port for the PI system. Figure 35: Create Service and Logical Port for PI system Save the configuration: April
38 Figure 36: Save Configuration When completed, you will see the Logical Port and Service created by you as shown below: Figure 37: Display Logical Port April
39 For more information on How to configure Consumer and Provider ABAP proxy scenarios, refer to Help Documentation in Appendix section. 6. Monitoring Go to transaction SRT_TOOLS for monitoring the processed XML messages. Monitoring the Web service runtime is part of the central monitoring operation. For more information, see Monitoring the Web Service Runtime You can monitor sequences, processed XML messages (SXMB_MONI transaction), bgrfc units and many more as shown in the below diagram. Figure 38: SOA Runtime Monitor Logs and Traces of SOA Manager help in analyzing errors or performance problems. To display logs and traces, see Displaying Logs and Traces To see the SAML assertion of payload either in Consumer or Provider, you need to set the trace level in SOAMANAGER to Full Trace. Then you will get the complete message with assertion details. 1. Call Transaction SOAMANAGER in Consumer or Provider systems. This will load a web browser as shown below: April
40 Figure 39: SOAMANAGER 2. Go to Logs and Traces tab and click on Trace Configuration. Figure 40: Trace Configuration 3. Set the trace level to Full Trace as shown below: Figure 41: Set Trace Level 4. Execute your scenario again and go to Logs and Traces tab as explained in step 2. Click on Logs/Trace Viewer. April
41 Figure 42: Logs/Trace Viewer 5. Select your message from the displayed list and click on Download Request link to download the complete message. Save the file to local desktop with.xml extension. Figure 43: Download Complete Message Open the XML file and the SAML assertion looks like below, for example. April
42 Figure 44: SAML Assertion in the payload 7. Appendix 7.1 Troubleshooting Error Scenarios Problems and Solutions Execution of report WSS_INFO results an exception PSE does not exist in database Problem When you execute the report WSS_INFO, an exception is thrown saying that PSE does not exist in database. The exception is shown below: April
43 Validity SAP Netweaver PI 7.1 SP06, SAP ECC 6.0 SP 17 Possible Reasons Figure 45: WSS_INFO Error The cryptographic library is not installed and the system is still using SAPSECULIB which is the default security provider in SAP systems. This library can be used for digital signatures created by the SAP system but not for encrypting data. To have the system encrypt data, you must replace the SAPSECULIB with the SAP Cryptographic Library (SAPCRYPTOLIB). Solution Replace the SAPSECULIB with the SAPCRYPTOLIB on the system's application server(s) and set up the system for using encryption. Follow the steps given in SAP Note After installing the crypto library, call transaction STRUST and create all PSEs (SNC, SSL server, SSL client, SSF application and WS Security) which are displayed with Red Cross mark as given in the Prerequisites section Execution of Consumer proxy outputs an exception Message outdated Problem When you execute Consumer proxy by means of a report or a function module the system displays an exception message saying that CX_WS_SECURITY_FAULT: An exception occurred: Message outdated as shown below: April
44 Validity SAP Netweaver PI 7.1 SP06, SAP ECC 6.0 SP 17 Possible Reasons Figure 46: Message Outdated Error The clocks of the Consumer, PI system and Provider are not synced. The time difference between them is more than 30 seconds. Because of this, older SAML assertion is being sent or WSRM resends the expired message. This assertion is rejected on the Provider side. Solution Synchronize the clocks of all systems involved and reduce the time skew by less than or equal to 30 seconds Exception CX_SY_MESSAGE_IN_PLUGIN_MODE: Message E 1S 110 cannot be processed Problem While running the scenario, an exception is thrown saying that CX_SY_MESSAGE_IN_PLUGIN_MODE: Message E 1S 110 cannot be processed in plug-in mode HTTP. This problem can happen on Consumer or PI system. Validity SAP Netweaver PI 7.1 SP06, SAP ECC 6.0 SP 14 Possible Reasons Incorrect parameters to crypto API cause the error. Solution Figure 47: WS Security Error Apply the correction attached to SAP Notes and on Consumer, PI system and Provider systems. April
45 System Error while calling Web service adapter: Error when initializing SOAP client application: error_text Problem When you use the Web service adapter (adapter type "WS") to execute a PI call and use the PI integration server for communication ("mediated communication"), you cannot process PI messages. It hangs in the PI message monitor (transaction SXI_MONITOR) with the status "System error". The following error occurs when you display the details for the PI message: "System error while calling Web service adapter: Error when initializing SOAP client application" as shown below: <?xml version="1.0" encoding="utf-8"?> - <!-- Call Adapter - <SAP:Error xmlns:sap=" xmlns:soap=" SOAP:mustUnderstand=""> <SAP:Category>XIServer</SAP:Category> <SAP:Code area="internal">ws_adapter_sys_error</sap:code> <SAP:P1 /> <SAP:P2 /> <SAP:P3 /> <SAP:P4 /> <SAP:AdditionalText /> <SAP:Stack>System error while calling Web service adapter: Error when initializing SOAP client application: 'error_text'</SAP:Stack> <SAP:Retry>M</SAP:Retry> </SAP:Error> Figure 48: WS Adapter Error Validity SAP Netweaver PI 7.1 SP06, SAP ECC 6.0 SP 17 Possible Reasons There can be many possible reasons as given below: The error indicates that the required Consumer configuration does not exist. April
46 There is a configuration error in the PI directory for the relevant receiver agreement. In the PI directory, the fields "User Name" and "User Password" for the receiver agreement in the screen group "Authentication" for the "WS" adapter-specific attributes are not specified or the user entered cannot be used for a login in the target system (he or she does not exist, the password is incorrect, the user is locked, the user is not in its validity period or similar). Solution Follow the SAP Notes and Also refer to the problem PI cache refresh problems in connection with WS adapter Problem When you execute a Web service (WS) that has been configured using the process integration (PI) framework (more precisely, the PI integration directory (PI directory), the system does not process the message. In the PI message monitor (transaction SXI_MONITOR), messages remain in the "System Error" status (red flag). The relevant message in the sequence monitor (report SRT_SEQ_MONITOR or transaction SRT_TOOLS, "Sequence Monitor" selection or forward navigation in the PI monitor [as of NetWeaver 7.11]) contains an error message of the following type: SRT: HTTP-Code 500: ("SRT: Failure in SOAP processing occurred: ("No configuration found")") OR SRT: HTTP-Code 404: ("Not Found") OR SRT: Initialization of SOAP Runtime failed: "No configuration found" Validity SAP Netweaver PI 7.1 SP06, SAP ECC 6.0 SP 17 Possible Reasons The required Web service (WS) configuration cannot be determined in the involved ABAP systems so that the related PI message remains in the processing queue. This is an error that occurs during the PI cache refresh processing for objects of the PI adapter type "WS". This error can have different causes, but usually, it occurs due to an incorrectly configured security environment of the interacting systems or due to a problem with the underlying design tie objects (service and proxy definitions). It may also happen if Integration Server faces a problem in getting the WSDL metadata. This process of getting the metadata occurs only once and Integration Server won t try to get the WSDL for subsequent WS calls. For more information about the reasons and prerequisites, see the related notes. Solution Do a dummy change in the Integration Directory find the scenario objects (as given below) edit add a space character in the description field and then after delete it and save activate the change list key (as well save it in a notepad) On all ends execute the report SSRV_CPA_TEST with the new change list key. This report enables you to repeat the PI cache refresh process in the relevant back-end systems. To repeat the PI cache refresh process, you require the PI objects that are April
47 involved in the generation of the WS configuration or the WS configurations. This report then reads these objects from the PI directory and triggers their processing in the relevant ABAP back end. You have to enter the key (GUID) of a change list (CL) of the PI directory that contains all PI objects that are required for the WS configuration. You specify this key on the selection screen of the report in the relevant input field. For a mediated communication (that is, a communication using the PI Integration Server (IS)), you require the following PI objects: Sender side: Sender agreement Sender channel Receiver side: Receiver agreement Receiver channel A PI CL is activated in the relevant view after all PI objects are collected in the PI directory. Due to the activation, all the objects are asynchronously transported to the back ends involved, and the generation of the WS configuration is triggered. Therefore, wait until this activation process is completed. This may take some time. To check the current status of the activation, you can use the cache notification view of the PI directory (choose "Refresh"). If an error occurs at runtime, that is, while the PI messages are exchanged (and results in one of the situations specified above in the section concerning the reasons), it may be useful to repeat the WS configuration in the relevant ABAP back ends. Therefore, log on to all ABAP back-end systems that are involved in the WS communication (sender, recipient and in the case of the mediated communication, also in the IS client) and start the report SSRV_CPA_TEST in these systems. Specify the CL key or the object ID in each case. If processing is successful, the report does not issue any messages. If an error occurs, the system issues detailed error messages. You can use the change list key for the mentioned report repeatedly. During each run, the WS configurations that depend on the PI objects in the change list are deleted and regenerated. If you execute the report in an ABAP system that is not involved in the WS communication, the system does not perform any actions. An additional important reason why you could use the report SSRV_CPA_TEST is that this report enables you to redo the PI cache refresh process part that is performed in an ABAP back end. As a result, you can directly reproduce the actions performed in the current ABAP back end, for example, using the debugger. For a detailed error analysis of the PI cache refresh process in connection with the WS adapter, you require this report Exception Authentication failed Problem An exception is raised when you try to send the message from Consumer to PI system saying that CX_WS_SECURITY_FAULT: An exception occurred: Authentication failed. April
48 Validity SAP Netweaver PI 7.1 SP06, SAP ECC 6.0 SP 17 Possible Reasons Figure 49: Authentication failed error This may occur because of time skew between the systems involved is greater than 30 seconds or the password of DELAY_LOGON user on Integration Server is changed or this user is locked. Solution Reduce the time difference between all the systems to be less than or equal to 30 seconds. Ensure DELAY_LOGON user is not locked CX_WS_SECURITY_FAULT: An exception occurred: No SAML mapping data in USREXTID Problem An exception is raised by the system during SAML authentication which says CX_WS_SECURITY_FAULT: An exception occurred: No SAML mapping data in USREXTID for Validity SAP Netweaver PI 7.1 SP06, SAP ECC 6.0 SP 17 Possible Reasons Figure 50: No SAML Mapping Error System cannot find a user (the user who triggers the process i.e. Business user) that matches to Ticket Trust and this user is not maintained in the table VUSREXTID. Solution Make sure that you maintain the user mapping by following the link below: Setting the WS Provider AS ABAP to Accept SAML Token Profiles April
49 Go to transaction SM30 table view VUSREXTID, type=sa check if a mapping with the user exists CX_WS_SECURITY_FAULT:An exception occurred: No trusted certificate for SAML authentication found Problem You encounter an error while running the SAML scenario saying that CX_WS_SECURITY_FAULT:An exception occurred: No trusted certificate for SAML authentication found. Validity SAP Netweaver PI 7.1 SP06, SAP ECC 6.0 SP 17 Possible Reasons Ticket Trust is not maintained. Certificate used for signing the SAML Assertion is not trusted. Solution Check if the right certificates are used in agreements/logical ports and create trust relationship on AS ABAP for all systems involved. For more information see SAP Help portal at Setting the WS Provider AS ABAP to Accept SAML Token Profiles 7.2 Additional Information Help Documentation 1. To configure Consumer and Provider ABAP Proxy Service with PI system, see the documentation at bd2b08f 2. For more information on how to configure web service scenarios, see the documentation at Upcoming Features 1. New feature is coming up with SAP PI 7.11 (EHP 1) to separate WSDL access credentials and WS processing security in WS adapter of version in SAP BASIS SAML 1.1 assertion issued by a central Security Token Service or Holder of the key authentication method is supported from the release SAP PI 7.11 (i.e. SAP BASIS 7.11) 3. A configurable parameter, for time tolerance between the systems so as to make SAML assertion valid for more than 30 seconds, will be available in EHP 1 for PI 7.1. April
50 7.2.3 Tips 1. Go to transaction SICF, browse to default_host sap bc srt wsdl. Double click on the node, if it says that it is not active, right-click on it and choose activate service. This helps in activating the wsdl service. 2. Apply SAP Note to find out the error code for authentication problems. 3. For ICM errors, check ICM trace (Transaction SMICM, menu Goto Trace File). 4. For authorization problems, call transaction SU53 to see the failing authorization check. See Authorization to know which standard roles are required for web service security. April
51
How To Configure MDM to Work with Oracle ASM-Based Products
SAP NetWeaver How-To Guide How To Configure MDM to Work with Oracle ASM-Based Products Applicable Releases: MDM 7.1 SP10 and later Version 1.0 June 2013 Copyright 2013 SAP AG. All rights reserved. No part
Developing Applications for Integration between PI and SAP ERP in Different Network Domains or Landscapes
Developing Applications for Integration between PI and SAP ERP in Different Network Domains or Landscapes Applies to: SAP NetWeaver Process Integration 7.1+ SAP NetWeaver 7.02 (ABAP) Summary This document
Posting Messages into XI
Posting Messages into XI Applies to: SAP NetWeaver Exchange Infrastructure Summary This article demonstrates how easy it is to post XML/SOAP messages into SAP NetWeaver Exchange Infrastructure (XI) using
Download and Install Crystal Reports for Eclipse via the Eclipse Software Update Manager
Download and Install Crystal Reports for Eclipse via the Eclipse Software Update Manager Applies to: Crystal Reports for Eclipse version 2 Summary This document provides a step-by-step guide on how to
How to Configure and Trouble Shoot Email Notification for Process Control 2.5
SAP SOLUTIONS FOR GOVERNANCE, RISK, AND COMPLIANCE How-To Guide How to Configure and Trouble Shoot Email Notification for Process Control 2.5 SAP GRC Regional Implementation Group Applicable Releases:
Configuring Distribution List in Compliant User Provisioning
Configuring Distribution List in Compliant User Provisioning Applies To: GRC Access Control Suite for 5.3 Summary: Configuration of Distribution List in Compliant User Provisioning will allow a group of
How to Configure Access Control for Exchange using PowerShell Cmdlets A Step-by-Step guide
SAP How-to Guide Mobile Device Management SAP Afaria How to Configure Access Control for Exchange using PowerShell Cmdlets A Step-by-Step guide Applicable Releases: SAP Afaria 7 SP3 HotFix 06, SAP Afaria
SAP GRC Access Control: Background jobs for risk analysis and remediation (formerly Virsa Compliance Calibrator)
SAP GRC Access Control: Background jobs for risk analysis and remediation (formerly Virsa Compliance Calibrator) Applies to: SAP GRC Access Control, version 5.2 Summary This document discusses the background
CREATING A PURCHASE ORDER STORE RECORD WEB SERVICE
SAP BEST PRACTICES AND SERVICE SOLUTION MANAGEMENT CREATING A PURCHASE ORDER STORE RECORD WEB SERVICE Exercise / Solution ITAI SADAN, SOLUTION OFFICE, SAP AMERICA SAP BEST PRACTICES AND SERVICE SOLUTION
Performance Best Practices Guide for SAP NetWeaver Portal 7.3
SAP NetWeaver Best Practices Guide Performance Best Practices Guide for SAP NetWeaver Portal 7.3 Applicable Releases: SAP NetWeaver 7.3 Document Version 1.0 June 2012 Copyright 2012 SAP AG. All rights
How to Set Up an Authorization for a Business Partner in Customer Relationship Management (CRM) Internet Sales: Sample Case
How to Set Up an Authorization for a Business Partner in Customer Relationship Management (CRM) Internet Sales: Sample Case Applies to: SAP CRM 4.0 Internet Sales and beyond Summary You want to set up
Using SAP Logon Tickets for Single Sign on to Microsoft based web applications
Collaboration Technology Support Center - Microsoft - Collaboration Brief March 2005 Using SAP Logon Tickets for Single Sign on to Microsoft based web applications André Fischer, Project Manager CTSC,
How To... Use SOA Configuration to Call RFCs and Web Services from within SAP NetWeaver BPM
SAP NetWeaver How-To Guide How To... Use SOA Configuration to Call RFCs and Web Services from within SAP NetWeaver BPM Applicable Releases: SAP NetWeaver Composition Environment 7.2 Topic Area: Development
Backup & Restore with SAP BPC (MS SQL 2005)
How-to Guide SAP CPM How To Backup & Restore with SAP BPC (MS SQL 2005) Version 1.0 September 2007 Applicable Releases: SAP BPC 5.1 Copyright 2007 SAP AG. All rights reserved. No part of this publication
How to Schedule Report Execution and Mailing
How To Guide SAP Business One Document Version: 1.0 2012-09-02 Applicable Releases: SAP Business One 8.81 PL10 and higher, SAP Business One 8.82 Typographic Conventions Type Style Example Description Words
How to configure BusinessObjects Enterprise with Citrix Presentation Server 4.0
How to configure BusinessObjects Enterprise with Citrix Presentation Server 4.0 Applies to: BusinessObjects Enterprise XI 3.0 Summary The objective of this document is to provide steps to install and configure
Methodology to Implement SAP Process Integration
Methodology to Implement SAP Process Integration Applies to: SAP NetWeaver, SAP Exchange Infrastructure, SAP Process Integration Summary When starting a SAP PI project from scratch, it is very important
E-Recruiting Job Board Integration using XI
E-Recruiting Job Board Integration using XI SAP AG 2005 SAP AG 1 Overview of Integration Scenario E-Recruiting System Configuration Delivered XI Components Basic XI-side Configuration Message Monitoring
3 rd party Service Desk interface
SAP Solution Manager 3 rd party Service Desk interface Product Management SAP Solution Manager SAP AG Disclaimer This presentation is a preliminary version and not subject to your license agreement or
How To... Call BEx Web Applications from SAP BusinessObjects Dashboards (Xcelsius) and vice versa
SAP NetWeaver SAP How-To NetWeaver Guide How-To Guide How To... Call BEx Web Applications from SAP BusinessObjects Dashboards (Xcelsius) and vice versa Applicable Releases: SAP NetWeaver BW 7.01 SP6 and
Extract Archived Data from SAP ERP
How-to Guide SAP NetWeaver 7.0 How To Extract Archived Data from SAP ERP Version 1.00 May 2006 Applicable Releases: SAP NetWeaver 7.0 (BI capability) Copyright 2008 SAP AG. All rights reserved. No part
Installation Guide Customized Installation of SQL Server 2008 for an SAP System with SQL4SAP.VBS
Installation Guide Customized Installation of SQL Server 2008 for an SAP System with SQL4SAP.VBS Target Audience Technology Consultants System Administrators PUBLIC Document version: 1.00 09/16/2008 Document
Implementing Outlook Integration for SAP Business One
Welcome to your RKT Live Expert Session Implementing Outlook Integration for SAP Business One Valerie Arguin Solution Manager Please note that we are recording this session! Your Presenter Please insert
R/3 and J2EE Setup for Digital Signature on Form 16 in HR Systems
R/3 and J2EE Setup for Digital Signature on Form 16 in HR Systems Agenda 1. R/3 - Setup 1.1. Transaction code STRUST 1.2. Transaction code SM59 2. J2EE - Setup 2.1. Key Storage 2.2. Security Provider 2.3.
Sales Rush Sales Order Processing S01- Lean Baseline Package. SAP Lean Baseline Package Version: V1.500 Country: UK Language: EN Date: February 2006
SAP Lean Baseline Package Version: V1.500 Country: UK Language: EN Date: February 2006 Sales Rush Sales Order Processing S01- Lean Baseline Package SAP AG Neurottstr. 16 69190 Walldorf Germany 1.1.1 Copyright
How To... Integrate Custom Formulas into the Formula Builder
SAP NetWeaver How-To Guide How To... Integrate Custom Formulas into the Formula Builder Applicable Releases: SAP NetWeaver 2004 SAP NetWeaver 7.0 IT Practice: Business Information Management IT Scenario:
Integration of SAP Netweaver User Management with LDAP
Integration of SAP Netweaver User Management with LDAP Applies to: SAP Netweaver 7.0/7.1 Microsoft Active Directory 2003 Summary The document describes the detailed steps of configuring the integration
Roster Configuration (Payroll) in SAP ECC 6.0 Tips & Tricks
Roster Configuration (Payroll) in SAP ECC 6.0 Tips & Tricks Applies to: SAP ECC 6.0 onwards. Summary Roster is an application which shows persons of reserved category against specific roster points. Roster
Integration of SAP central user administration with Microsoft Active Directory
Collaboration Technology Support Center Microsoft - Collaboration Brief June 2005 Integration of SAP central user administration with Microsoft Active Directory Chris Kohlsdorf, Senior System Architect
prioritize XI messages on integration server
How-to Guide SAP NetWeaver 2004s How To prioritize XI messages on integration server Version 1.00 May 2006 Applicable Releases: SAP NetWeaver 2004s Process Integration Enabling Application-to-Application
How To Balance In Sap Bw
How-to Guide SAP NetWeaver 04 How To Load Balancing For Data Load Processing and Warehouse Management In BW Version 1.10 January 2005 Applicable Releases: SAP NetWeaver 04 For source system requirements
Utilities for downloading and uploading OO ABAP classes in XML format
SDN Contribution Utilities for downloading and uploading OO ABAP classes in XML format Applies to: SAP WebAS 6.20 and above. Summary This article will present two utility reports for downloading and uploading
Single Sign-On between SAP Portal and SuccessFactors
Single Sign-On between SAP Portal and SuccessFactors Dimitar Mihaylov 7/1/2012 Contents 1. Overview... 3 2. Trust between SAP Portal 7.3 and SuccessFactors... 5 2.1. Initial configuration in SAP Portal
SAP NetWeaver 04 Security Guide. Security Guide for SAP Mobile Infrastructure
SAP NetWeaver 04 Security Guide Security Guide for SAP Mobile Infrastructure Document Version 1.00 April 29, 2004 SAP AG Neurottstraße 16 69190 Walldorf Germany T +49/18 05/34 34 24 F +49/18 05/34 34 20
Analyzing Sales Data for Choosing Forecast Strategies
Analyzing Sales Data for Choosing Forecast Strategies Applies to The article applies to the Demand Planner in SAP APO. Works for version 4.7 and upwards. Summary Choosing the right forecasting strategy
How To... Develop, Monitor and Debug WS Consumer and Provider
SAP NetWeaver How-To Guide How To... Develop, Monitor and Debug WS Consumer and Provider Applicable Releases: SAP NetWeaver 7.0 SP14 IT Practice: Service SOA & Design IT Scenario: Enabling Enterprise Services
Budget Control by Cost Center
SAP Business One Budget Control by Cost Center Ecosystem & Channels Readiness July 2011 Allows a precise follow up of costs booked using the cost accounting dimensions functionality as introduced in SAP
How To... Migrate Custom Portal Applications to SAP NetWeaver 7.3
SAP NetWeaver How-To Guide How To... Migrate Custom Portal Applications to SAP NetWeaver 7.3 Applicable Releases: SAP NetWeaver 7.30 SP03 and above SAP NetWeaver 7.31 SP02 and above IT Practice / Topic
Third Party Digital Asset Management Integration
Third Party Digital Asset Management Integration Objectives At the end of this unit, you will be able to: Assign Digital Assets to CRM Objects Work with the Where-Used List Describe the necessary customizing
Collaboration Technology Support Center - Microsoft - Collaboration Brief
Collaboration Technology Support Center - Microsoft - Collaboration Brief February 2007 Single Sign-On to a Microsoft Exchange Cluster Summary Users of the SAP NetWeaver Portal can take advantage of Single
SAP NetWeaver MDM 5.5 SP3 SAP Portal iviews Installation & Configuration. Ron Hendrickx SAP NetWeaver RIG Americas Foundation Team
SAP NetWeaver MDM 5.5 SP3 SAP Portal iviews Installation & Configuration Ron Hendrickx SAP NetWeaver RIG Americas Foundation Team Prerequisites Required: Basic MDM knowledge Basic EP6 content management
How To... configure and execute Business Process Flows in SAP BusinessObjects Planning and Consolidation 7.5 version for SAP NetWeaver
SAP BusinessObjects EPM RIG How-To Guide How To... configure and execute Business Process Flows in SAP BusinessObjects Planning and Consolidation 7.5 version for SAP NetWeaver Applicable Releases: SAP
Process Archiving using NetWeaver Business Process Management
Process Archiving using NetWeaver Business Process Management Applies to: NetWeaver Composition Environment 7.2, 7.3. For more information, visit the Business Process Modeling homepage. Summary This document
Monitoring and Management of Landscapes with SAP NetWeaver Administrator. Dieter Krieger, SAP AG
Monitoring and Management of Landscapes with SAP NetWeaver Administrator Dieter Krieger, SAP AG Overview of SAP NetWeaver Administrator Setting up SAP NetWeaver Administrator Using SAP NetWeaver Administrator
Ronald Bueck SBO Product Definition
SAP Business One Welcomes you to the Weekly Partner Webinar Series Overview Microsoft Outlook Integration Add-on Ronald Bueck SBO Product Definition Please note that we are recording this session! Your
SAP Master Data Governance- Hiding fields in the change request User Interface
SAP Master Data Governance- Hiding fields in the change request User Interface Applies to: ERP 6 Ehp 5 SAP Master Data Governance. For more information, visit the Master Data Management homepage. Summary
Problems with your Data Model in SAP NetWeaver MDM Do s and Don ts
How-to Guide SAP NetWeaver 7.0 (2004s) How to Avoid Problems with your Data Model in SAP NetWeaver MDM Do s and Don ts Version 1.00 May 2007 Applicable Releases: SAP NetWeaver 2004 SAP NetWeaver 7.0 (2004s)
Integrate Third Party Collaboration Tools in the SAP NetWeaver Portal. SAP NetWeaver Product Management
Integrate Third Party Collaboration Tools in the SAP NetWeaver Portal SAP NetWeaver Product Management Overview Native Third-Party Services Code Samples Summary Integration of Third-Party Collaboration
SAP Central Process Scheduling (CPS) 8.0 by Redwood
SAP Central Process Scheduling (CPS) 8.0 by Redwood What s new in SAP CPS 8.0? November 2010 Agenda 1. SAP Central Process Scheduling by Redwood Architecture Overview 2. Enhanced User Interface 3. New
Table of Contents. How to Find Database Index usage per ABAP Report and Creating an Index
How to Find Database Index usage per ABAP Report and Creating an Index Applies to: SAP NETWEAVER WEB AS ABAP. For more information, visit the ABAP homepage Summary The aim of this article is to show how
How to Create Web Dynpro-Based iviews. Based on SAP NetWeaver 04 Stack 09. Jochen Guertler
How to Create Web Dynpro-Based iviews Based on SAP NetWeaver 04 Stack 09 Jochen Guertler Copyright Copyright 2004 SAP AG. All rights reserved. No part of this publication may be reproduced or transmitted
How to Create a Support Message in SAP Service Marketplace
How to Create a Support Message in SAP Service Marketplace Summary This document explains how to create a message (incident) on the SAP Service Marketplace. It is assumed that the customer has never logged
Alert Notification in SAP Supply Network Collaboration. SNC Extension Guide
Alert Notification in SAP Supply Network Collaboration SNC Extension Guide Version: 1.2 Date 08.02.2010 1 The SNC Extension Guide is a collection of tips and tricks on how to extend SAP Supply Network
SAP NetWeaver Process Integration - Demo Example Configuration
SAP NetWeaver 7.40 f SAP NetWeaver Process Integration - Demo Example Configuration Document Version 1.0 October 2013 SAP AG Dietmar-Hopp-Allee 16 69190 Walldorf Germany T +49/18 05/34 34 24 F +49/18 05/34
Integration of Universal Worklist into Microsoft Office SharePoint
Integration of Universal Worklist into Microsoft Office SharePoint Applies to: SAP NetWeaver Portal 7.01 SP3 Microsoft Office SharePoint 2007 For more information, visit the Portal and Collaboration homepage.
Integrating Easy Document Management System in SAP DMS
Integrating Easy Document Management System in SAP DMS Applies to: SAP Easy Document Management System Version 6.0 SP12. For more information, visit the Product Lifecycle Management homepage. Summary This
SAP SYSTEM MEASUREMENT GUIDE
Global License Auditing Services SAP SYSTEM MEASUREMENT GUIDE MEASUREMENT PROGRAM AND LICENSE ADMINISTRATION WORKBENCH Version 7.0 Updated Edition, August 2015 Copyright 2015 SAP SE. All rights reserved.
OData in a Nutshell. August 2011 INTERNAL
OData in a Nutshell August 2011 INTERNAL Objectives At the end of this module, you will be able to: Understand the OData Standard and how it works. Understand how OData uses the Atom Protocol. Understand
Service Level Reporting for Business Process Monitoring
Service Level Reporting in SAP Solution Manager Service Level Reporting for Business Process Monitoring with SAP Solution Manager 7.1 May 2013 SAP AG Dietmar-Hopp-Allee 16 69190 Walldorf Germany T +49/18
UI Framework Simple Search in CRM WebClient based on NetWeaver Enterprise Search (ABAP) SAP Enhancement Package 1 for SAP CRM 7.0
UI Framework Simple Search in CRM WebClient based on NetWeaver Enterprise Search (ABAP) SAP Enhancement Package 1 for SAP CRM 7.0 1 Objectives At the end of this unit, you will be able to: Use the new
NetWeaver Business Client (NWBC) for Incentives and Commissions Management (ICM)
NetWeaver Business Client (NWBC) for Incentives and Commissions Management (ICM) Applies to: Enhancement Pack 5 (Ehp5), EA-APPL, Incentives and Commissions Management (FS-ICM). Summary This article discusses
Data Archiving in CRM: a Brief Overview
Data Archiving in CRM: a Brief Overview Applies to: Developing Archiving Solutions in SAP CRM technology. For more information, visit the Customer Relationship Management homepage. Summary This document
Consume an External Web Service in a Nutshell with good old ABAP
Consume an External Web Service in a Nutshell with good old ABAP Applies to: SAP_BASIS, Release 701, SP Level 8 Summary Have you ever tried to consume an external web service out of ABAP? This document
Secure MobiLink Synchronization using Microsoft IIS and the MobiLink Redirector
Secure MobiLink Synchronization using Microsoft IIS and the MobiLink Redirector A whitepaper from ianywhere Author: Joshua Savill, Product Manager This whitepaper was written in the context of SQL Anywhere
Enterprise Software - Applications, Technologies and Programming
Enterprise Software - Applications, Technologies and Programming Dr. Uwe Kubach, Dr. Gregor Hackenbroich, Dr. Ralf Ackermann SAP Research 2010 SAP AG. All rights reserved. / Page 1 Abstract This lecture
Portfolio and Project Management 5.0: Excel Integration for Financial and Capacity Planning
Portfolio and Project Management 5.0: Excel Integration for Financial and Capacity Planning Applies to: Portfolio and Project Management 5.0 Summary Financial and Capacity planning for item, initiative
Configuring Single Sign-on for SAP HANA
Configuring Single Sign-on for SAP HANA Applies to: SAP BusinessObjects Business Intelligence platform 4.0 Feature Pack 3. For more information, visit the Business Objects homepage. Summary This document
USDL XG WP3 SAP use case. Kay Kadner
XG WP3 SAP use case Kay Kadner Customer Marketplace Company B Runtime Company D Innovation & Community Community Company A Repository Company C Repository Provider Provider 2 Integrated Demonstrator -
Learning Series: SAP NetWeaver Process Orchestration, secure connectivity add-on 1c SFTP Adapter
Learning Series: SAP NetWeaver Process Orchestration, secure connectivity add-on 1c SFTP Adapter Applies to: SAP NetWeaver Process Orchestration, Secure Connectivity Add-on 1.0 SP0 Summary This article
Installation Checklist
SAP Installation Checklist SAP Mobility SAP CRM Sales 2.0 Mobile Application Installation Checklist A Branded Service provided by SAP Customer Solution Adoption Applicable Releases: SAP CRM Sales 2.0 Mobile
Debugging Portal Applications
Debugging Portal Applications Applies to: SAP NetWeaver Portal, and developers of portal applications Summary NetWeaver Developer Studio and the AS Java provide tools for helping you debug your applications.
Compliant, Business-Driven Identity Management using. SAP NetWeaver Identity Management and SBOP Access Control. February 2010
Compliant, Business-Driven Identity Management using SAP NetWeaver Identity Management and SBOP Access Control February 2010 Disclaimer This presentation outlines our general product direction and should
Duet Enterprise Add SAP ERP Reports and SAP BI Queries/Workbooks to Duet Enterprise Configuration
Duet Enterprise Add SAP ERP Reports and SAP BI Queries/Workbooks to Duet Enterprise Configuration Applies to: Duet Enterprise 1.0, Feature Pack 1 for Duet Enterprise Summary This paper gives an overview
User Experience in Custom Apps
User Experience in Custom Apps p o w e r e d b y t h e S A P M o b i l e P l a t f o r m S e a n L o n g U X A r c h i t e c t M a n u e l S a e z - D i r e c t o r M o b i l e I n n o v a t i o n C e
How To Use the BPC Mass User Management Tool in BPC 10.0 NW
How To Use the BPC Mass User Management Tool in BPC 10.0 NW Applies to: SAP BusinessObjects Planning & Consolidation 10.0, version for SAP NetWeaver. For more information, visit the Enterprise Performance
Maintaining Different Addresses and Email Ids for a Business Partner via CRM Web UI
Maintaining Different Addresses and Email Ids for a Business Partner via CRM Web UI Applies to: CRM 7.0 SP09. For more information, visit the Customer Relationship Management homepage. Summary This article
AC 10.0 Centralized Emergency Access
AC 10.0 Centralized Emergency Access Customer Solution Adoption June 2011 Version 2.0 Purpose of this document This document is a detailed guide on the emergency access capability of Access Control 10.0.
SAP Service Tools for Performance Analysis
SAP Service Tools for Performance Analysis Kerstin Knebusch Active Global Support Month 05, 2013 Public Performance Analysis Wait event based Focus on statements causing high load and / or high wait time
Log Analysis Tool for SAP NetWeaver AS Java
Log Analysis Tool for SAP NetWeaver AS Java Applies to: SAP NetWeaver 6.40, 7.0x, 7.1x, 7.20 and higher Summary Log Analysis is an SAP tool for analyzing list formatted logs and traces in Application Server
Enabling Full-Text Search for Business Objects in mysap ERP
SDN Contribution Enabling Full-Text Search for Business Objects in mysap ERP Applies to: SAP NetWeaver 2004s, mysap ERP 2005 Summary The SAP NetWeaver Search Engine Service (SES) for business objects is
Understanding HR Schema and PCR with an Example
Understanding HR Schema and PCR with an Example Applies to: SAP ECC 6.0 version, SAP HCM module. For more information, visit the Enterprise Resource Planning homepage. Summary This document will provide
SAP CCMS Monitors Microsoft Windows Eventlog
MSCTSC Collaboration Brief November 2004 SAP CCMS Monitors Microsoft Windows Eventlog Christian Klink Member of CTSC Focus Group SAP Technology Consultant SAP Technology Consulting II SAP Deutschland AG
Business One in Action - How can we post bank fees and charges while posting Incoming or Outgoing Payment transactions?
Business One in Action - How can we post bank fees and charges while posting Incoming or Outgoing Payment transactions? Applies to: SAP Business One, Accounting, Banking and Reconciliation Summary: This
Sending Additional Files from SAP Netweaver PI to third Party System
Sending Additional Files from SAP Netweaver PI to third Party System Applies to: SAP Netweaver PI. Summary The document describes about a scenario where the requirement is to send multiple files from one
SAP Web Application Server Security
SAP Web Application Server Security HELP.BCSECSWAPPS Release 6.10 Document Version 1.4 01/15/02 Copyright Copyright 2001 SAP AG. All rights reserved. No part of this publication may be reproduced or transmitted
How to Configure and Trouble Shoot Workflow for Process Control 2.5
SAP SOLUTIONS FOR GOVERNANCE, RISK, AND COMPLIANCE How-To Guide How to Configure and Trouble Shoot Workflow for Process Control 2.5 SAP GRC Regional Implementation Group Applicable Releases: SAP GRC Process
Intelligent Business Operations Chapter 1: Overview & Strategy
Intelligent Business Operations Chapter 1: Overview & Strategy Legal Disclaimer The information in this presentation is confidential and proprietary to SAP and may not be disclosed without the permission
Implementing SSO between the Enterprise Portal and the EPM Add-In
Implementing SSO between the Enterprise Portal and the EPM Add-In Applies to: SAP BusinessObjects Planning and Consolidation 10, version for SAP NetWeaver SP1 and higher EPM Add-In, SP3 and higher. For
ARCHIVING OF IDOCS IN SAP
SDN Contribution ARCHIVING OF IDOCS IN SAP Summary Archiving is the process of offloading data in SAP documents to a file at the Operating system layer for future retrieval and optionally delete the documents
SAPFIN. Overview of SAP ERP Financials COURSE OUTLINE. Course Version: 15 Course Duration: 2 Day(s)
SAPFIN Overview of SAP ERP Financials. COURSE OUTLINE Course Version: 15 Course Duration: 2 Day(s) SAP Copyrights and Trademarks 2014 SAP AG. All rights reserved. No part of this publication may be reproduced
HR400 SAP ERP HCM Payroll Configuration
HR400 SAP ERP HCM Payroll Configuration. COURSE OUTLINE Course Version: 15 Course Duration: 5 Day(s) SAP Copyrights and Trademarks 2014 SAP AG. All rights reserved. No part of this publication may be reproduced
Ariba Network Integration to SAP ECC
Ariba Network Integration to SAP ECC Mark Willner Principal Technical Solutions Consultant Ariba an SAP Company» October 2014 ERP Materials Management Core Integration Scenario Ariba Collaborative Commerce,
How-to-Guide: Middleware Settings for Download of IPC Configuration (KB) Data from R/3 to CRM System
How-to-Guide: Middleware Settings for Download of IPC Configuration (KB) Data from R/3 to CRM System Applies to: The IPC (Internet Pricing and Configurator). For more information, visit the Customer Relationship
TM111. ERP Integration for Order Management (Shipper Specific) COURSE OUTLINE. Course Version: 15 Course Duration: 2 Day(s)
TM111 ERP Integration for Order Management (Shipper Specific). COURSE OUTLINE Course Version: 15 Course Duration: 2 Day(s) SAP Copyrights and Trademarks 2014 SAP SE. All rights reserved. No part of this
ERP Quotation and Sales Order in CRM WebClient UI Detailed View. SAP Enhancement Package 1 for SAP CRM 7.0 CRM Sales - SFA
ERP Quotation and Sales Order in CRM WebClient UI Detailed View SAP Enhancement Package 1 for SAP CRM 7.0 CRM Sales - SFA ERP Quote, Order, Quantity Contract in CRM WebClient UI Recognizing that many SAP
How To Use the ESR Eclipse Tool with the Enterprise Service Repository
How To Use the ESR Eclipse Tool with the Enterprise Service Repository Applies to: SAP NetWeaver Process Orchestration 7.31 SP2 SAP NetWeaver Process Integration PI 7.31 SP2 Summary With PI 7.31 SP2, an
DBA Cockpit for Oracle
DBA Cockpit for Oracle Ralf Hackmann, Matthias Lienert Database Platforms Group SAP AG Contents Introduction Pages 3-8 Selected New Performance Monitors Pages 9-17 Space Monitoring Pages 18-20 New DBA
K in Identify the differences between the universe design tool and the information design tool
K in Identify the differences between the universe design tool and the information design tool The information design tool is a new modeling tool for the semantic layer that enables you to manipulate metadata
SAP How-To Guide: Develop a Custom Master Data Object in SAP MDG (Master Data Governance)
SAP How-To Guide: Develop a Custom Master Data Object in SAP MDG (Master Data Governance) Applies to: SAP Master Data Governance running on SAP ERP 6 EhP 6 Master Data Governance. The Guide can also be
