SAP Fiori. Overview of SSL + SAML 2.0 Configuration
|
|
- Imogene Chambers
- 8 years ago
- Views:
Transcription
1 SAP Fiori Overview of SSL + SAML 2.0 Configuration
2 SAP Fiori and SSL + SAML 2.0 A Typical Connection Scenario
3 SAP Fiori Apps: A Typical Use Case A typical use case for SAP Fiori apps is where access should be granted from the public internet. In this case, single sign-on can be implemented using SAML 2.0 based authentication in conjunction with IdP (Identity Provider) software such as SAP IDP, Ping Federate or Microsoft s Active Directory Federation Service (AD FS). The user will need to authenticate themselves in a process known as Service Provider based authentication. SAML 2.0 IdP Proxy SAP NW Gateway SAP ECC Public Internet Corporate DMZ Internal Corporate Network 2013 SAP AG. All rights reserved. 3
4 Authentication Flow: 1/11 The client sends a request to SAP NW Gateway via a proxy server. This request could be either unauthenticated or expired (due to a timeout). The request issued by the client refers to an external URL for the SAP Fiori App that is specific to the particular customer s situation. SAML 2.0 IdP Proxy SAP NW Gateway SAP ECC 1 Unauthenticated access request Public Internet Corporate DMZ Internal Corporate Network 2013 SAP AG. All rights reserved. 4
5 Authentication Flow: 2/11 The proxy rewrites the URL to its internal equivalent and forwards the request to SAP NW Gateway. SAML 2.0 IdP Proxy URL rewritten & forwarded SAP NW Gateway SAP ECC 2 Public Internet Corporate DMZ Internal Corporate Network 2013 SAP AG. All rights reserved. 5
6 Authentication Flow: 3/11 SAP NW Gateway recognises that the request is unauthenticated and could respond in one of two ways: either using an HTTP POST or an HTTP 302 redirect. In the case shown here, an HTTP 302 redirect is being used. Either way, the Gateway server responds to the client by saying: I don t know who you are; go talk to the SAML 2.0 IdP server All URLs passing through the proxy server (in either direction) are rewritten as required. SAML 2.0 IdP Proxy HTTP 302 redirect SAP NW Gateway SAP ECC 3 Public Internet Corporate DMZ Internal Corporate Network 2013 SAP AG. All rights reserved. 6
7 Authentication Flow: 4/11 The client follows the HTTP 302 redirect URL, and sends the request to the SAML 2.0 IdP server. In this case, the SAML 2.0 IdP server is located behind the firewall, so the IdP request goes through the proxy. However, if the SAML 2.0 IdP server is cloud based (i.e. publicly available), it would be a direct request. SAML 2.0 IdP Proxy SAP NW Gateway SAP ECC 4 HTTP 302 redirect Public Internet Corporate DMZ Internal Corporate Network 2013 SAP AG. All rights reserved. 7
8 Authentication Flow: 5/11 The SAML 2.0 IdP server challenges the client to identify itself. At this point, the SAML 2.0 IdP server can be configured to accept whatever form of authentication is required by the customer s security standards for instance, basic authentication, form or an X.509 certificate etc. SAML 2.0 IdP Proxy Who are you? 5 SAP NW Gateway SAP ECC Public Internet Corporate DMZ Internal Corporate Network 2013 SAP AG. All rights reserved. 8
9 Authentication Flow: 6/11 The client responds by supplying the required credentials for instance, an X.509 certificate. SAML 2.0 IdP Proxy SAP NW Gateway SAP ECC 6 I am (X.509 Certificate) Public Internet Corporate DMZ Internal Corporate Network 2013 SAP AG. All rights reserved. 9
10 Authentication Flow: 7/11 If the SAML 2.0 IdP server determines the user credentials to be valid, it responds with another HTTP 302 to redirect the client back to the Gateway server; however, this response now additionally carries a SAML artifact. SAML 2.0 IdP Proxy HTTP 302 redirect + SAML artifact 7 SAP NW Gateway SAP ECC Public Internet Corporate DMZ Internal Corporate Network 2013 SAP AG. All rights reserved. 10
11 Authentication Flow: 8/11 The client follows the HTTP 302 redirect URL and in doing so, passes the SAML artifact back to the Gateway server. SAML 2.0 IdP Proxy SAP NW Gateway SAP ECC 8 Access request + SAML artifact Public Internet Corporate DMZ Internal Corporate Network 2013 SAP AG. All rights reserved. 11
12 Authentication Flow: 9/11 In order to double-check the validity of the SAML artifact, the Gateway server sends it back to the SAML 2.0 IdP server for resolution as a back-channel Web Service (SOAP) request. Here, the Gateway server is saying to the SAML 2.0 IdP server: "I've just received a SAML artifact that claims to have come from you. Did you really create this artifact?" This type of double-check is designed to prevent 3 rd parties from spoofing SAML artifacts. SAML 2.0 IdP Resolve artifact 9 Proxy SAP NW Gateway SAP ECC Public Internet Corporate DMZ Internal Corporate Network 2013 SAP AG. All rights reserved. 12
13 Authentication Flow: 10/11 The SAML 2.0 IdP Server resolves the artifact and returns an assertion that says: "Yes, the artifact came from me and it identifies user such-and-such" SAP NW Gateway then validates the user name in the assertion and if successful, the user's request is considered authentic and an ABAP session is created. SAML 2.0 IdP SAML assertion Proxy 10 SAP NW Gateway SAP ECC Public Internet Corporate DMZ Internal Corporate Network 2013 SAP AG. All rights reserved. 13
14 Authentication Flow: 11/11 The OData service in SAP NW Gateway now starts and sends data to the client. From this point onwards, the SAML 2.0 IdP server takes no further part in communication between the client and the SAP NW Gateway server. Once the user either explicitly logs off, closes their browser window or allows their session to timeout, any further client requests will be considered unauthenticated and the whole authentication flow process described in the preceding slides will be repeated. SAML 2.0 IdP 11 Proxy SAP NW Gateway SAP ECC Public Internet Corporate DMZ Internal Corporate Network 2013 SAP AG. All rights reserved. 14
15 SSL + SAML 2.0 Configuration Configuration steps needed to implement this particular scenario Caveat: The instructions in the following section of this presentation are not intended to act as a cookbook or how-to guide. Instead, they provide an overview of the steps performed during an SAP Fiori implementation and links to the standard SAP Help Portal information on each of the relevant topics.
16 Outline of Configuration Steps The following configuration steps need to be performed in the SAP NetWeaver AS ABAP server acting as the Gateway hub: 1. Setup SSL Communication Enable the webserver within SAP NW AS ABAP to communicate using the Secure Sockets Layer. This allows all HTTP based communication with the server to be encrypted. 2. Perform SAML 2.0 Configuration This configuration defines how SAP NW Gateway and the external SAML 2.0 IdP server should communicate with each other, and should only be performed once the SSL configuration has been successfully completed. 3. Perform Proxy Configuration The proxy used to protect access to the corporate network must be configured to rewrite at least the fully qualified hostname and port number contained within all HTTP traffic passing between the SAP NW Gateway server and the client device running the SAP Fiori application SAP AG. All rights reserved. 16
17 SSL Configuration Enabling SAP NW Gateway to use the Secure Sockets Layer (HTTPS)
18 SSL Configuration Instructions for installing the cryptographic libraries and configuring SSL on a NetWeaver AS ABAP can be found in the SAP Help Portal. Once the cryptographic libraries are installed and the kernel profile parameters modified (examples shown below), you must bounce the AS ABAP server. Notice that the standard HTTPS port number of 443 is being used 2013 SAP AG. All rights reserved. 18
19 Using Ports Numbers Less Than 1024 The standard port number for unencrypted HTTP communication is 80, and for encrypted HTTP communication using the Secure Sockets Layer is 443. However, for security reasons, all variants of the Unix operating system prevent any process from binding to a port number less than 1024 unless that process has super user (root) authority. If you wish your AS ABAP server to use the default port numbers for HTTP and HTTPS communication, you must use an SAP delivered program called icmbnd. This privileged program binds to port numbers less than 1024, then returns the listening socket to the SAP server instance. In this way, it acts as a proxy through which the SAP instance can communicate on those ports. In this case, we are concerned only with the configuration for port In directory /usr/sap/<sid>/sys/exe/run, change the ownership of program icmbnd using the command chown root:sapsys icmbnd 2. Check that the profile parameter for your webserver is set in the instance profile. In this case, the value is icm/server_port_1 = PROT=HTTPS,PORT=443,TIMEOUT=30,EXTBIND=1 3. Restart the SAP server instance 2013 SAP AG. All rights reserved. 19
20 SSL Kernel Profile Parameters What not to do! Commonly used profile parameter values (such as path names) can be defined as variables and then referenced as part of other profile parameter values. E.G. DIR_INSTANCE = /usr/sap/dg9/dvebmgs15 DIR_EXECUTABLE = $(DIR_INSTANCE)/exe Therefore, when configuring the path name to the SSL encryption executable, it might seem logical to do the following: ssl/ssl_lib = $(DIR_EXECUTABLE)/libsapcrypto.so Unfortunately, this does not work as expected. The variable name $(DIR_EXECUTABLE) in the value of parameter ssl/ssl_lib is not evaluated. Consequently, when the NW Gateway system is restarted, you ll find that you are unable to log on with a normal user because this erroneous configuration has invalidated the system s license! 2013 SAP AG. All rights reserved. 20
21 PSEs and Certificates Overview Transaction STRUST is used to manage the configuration of your system s SSL certificates and the secure containers within which they are stored (known as PSEs). A Personal Security Environment (PSE) is a secure, operating system level file, managed by an SAP system that holds both the public and private information of either a user or a component. This information includes the owner s public-key certificate, a private address book of certificates and their private key. Each component within an SAP system that requires the use of SSL based communication typically has its own PSE. Each PSE can contain a list of trusted certificates that will be used during communication with a particular secure server SAP AG. All rights reserved. 21
22 PSEs and Certificates Check SSL Library Versions In transaction STRUST, select the menu option Environment Display SSF Version. At the time of writing this presentation (May, 2013), the latest version is patch level SAP AG. All rights reserved. 22
23 PSEs and Certificates 1/5 The Own Certificate held in this PSE is used only for the generation of SSO2 cookies. The first PSE to create is the System PSE SAP AG. All rights reserved. 23
24 PSEs and Certificates 2/5 CN=*.blahblah.com, OU=I , OU=SAP Web AS The Canonical Name by which this SSL server is known Next, create the SSL Server Standard PSE. This is the PSE that holds your SSL server s certificate SAP AG. All rights reserved. 24
25 PSEs and Certificates 3/5 CN=sso.blahblah.com, OU=IT, O=Blah Ltd, L=London The root certificate of the SAML 2.0 IdP Server The SSL Client (Standard) PSE holds a list of trusted certificates used when NW Gateway acts as an HTTPS client. E.G. During back-channel communication with the Identity Provider SAP AG. All rights reserved. 25
26 PSEs and Certificates 4/5 The PSEs called SSF SAML2 Service Provider E and SSF SAML2 Service Provider - S belong to SAP s Secure Store & Forward (SSF) component. Unless you need to use non-standard settings, do not create these PSEs manually. They are created for you when the SAML2 configuration wizard is run. SSF SAML2 Service Provider E Used by SSF to encrypt data sent to the Identity Provider. SSF SAML2 Service Provider S Used by SSF to sign data sent to the Identity provider. Signed data can be sent either in encrypted form or as plain text SAP AG. All rights reserved. 26
27 PSEs and Certificates 5/5 CN=SFDC, O=Blah Ltd, C=GB The certificate of the Identity Provider used for data signing You do not need to add this certificate yourself. It is added automatically by the SAML2 configuration wizard and is required by the Service Provider to verify the data it receives from the Identity Provider SAP AG. All rights reserved. 27
28 PSEs and Certificates Check HTTPS Connectivity After the SSL configuration steps have been performed, you should be able to issue a URL to the NW Gateway server using the HTTPS protocol. If the browser warns you that the certificate issued by the secure server is not trusted, then this is probably because your SSL server certificate is self-signed. The browser could also warn you that the certificate does not belong to the hostname that sent it. Self-signed certificates are fine for the purposes of testing and building PoC applications, but when creating a public certificate, it should be signed by a recognised certification authority (CA) for instance, VeriSign SAP AG. All rights reserved. 28
29 SAML 2.0 Configuration Enabling SAP NW Gateway to accept user authentication via SAML 2.0
30 Activate Session Security Using transaction SICF_SESSIONS, activate session security for the client in which you are working. For more information, see the SAP Help Portal. This particular system has session security active only for client SAP AG. All rights reserved. 30
31 SAML 2.0 Configuration The standard SAP documentation for configuring SAML 2.0 based authentication can be found in the SAP Help library. Warning If SSL communication is not working correctly, do not attempt to start any SAML 2.0 configuration! Not only will it be impossible to complete the SAML 2.0 configuration, but the SAML 2.0 configuration will need to be repeated after the SSL configuration has been corrected. In NW Gateway, start transaction SAML2. This will start your browser and then start a Web Dynpro application to perform the SAML configuration SAP AG. All rights reserved. 31
32 SAML Configuration 1/6 The first thing to do is create and enable a Local Provider. This identifies your NW Gateway server as a system that can accept SAML based authentication. The signing and encryption key pairs are derived from the SSL SAML2 Service Provider E and SSL SAML2 Service Provider S PSEs shown on slide SAP AG. All rights reserved. 32
33 SAML Configuration 2/6 Once the Local Provider SAML settings have been defined and enabled for the NW Gateway server, you should export this information. The Metadata button allows you to export the SAML 2.0 service provider metadata so that it can be imported into the external SAML 2.0 identity provider 2013 SAP AG. All rights reserved. 33
34 SAML Configuration 3/6 The easiest way to set up a new Trusted Provider is to ask the administrator of the SAML 2.0 IdP server to export their server s configuration as an XML Metadata file. BlahBlahDev An XML configuration file can be imported directly by this wizard. "BlahBlahDev" HTTP 302 redirects will be used to bind to the external SAML 2.0 IdP server 2013 SAP AG. All rights reserved. 34
35 SAML Configuration 4/6 SAML 2.0 can accept user names in various different formats. BlahBlahDev "BlahBlahDev" In this particular case, the format is open; therefore, the NameID format of Unspecified is configured. In this particular case, the user name supplied by the SAML 2.0 assertion is identical to the userid in SAP NW Gateway 2013 SAP AG. All rights reserved. 35
36 SAML Configuration 5/6 BlahBlahDev During the import process, the wizard guides you through several pages, on each of which you can accept the default values, except On the Signature and Encryption tab "BlahBlahDev" CN=SFDC, O=Blah Ltd, C=GB Under Artifact Profile, the Require Signature field must be set to Never 2013 SAP AG. All rights reserved. 36
37 SAML Configuration 6/6 BlahBlahDev During the import process, the wizard guides you through several pages, on each of which you can accept the default values, except And the Authentication Requirements tab "BlahBlahDev" Under Authentication Response, the Binding field must be set to HTTP Artifact 2013 SAP AG. All rights reserved. 37
38 SAML Enabling a Gateway Service Enabling a NW Gateway server to accept user authentication via SAML artifacts and assertions
39 SAML Enable a Gateway Service 1/3 Once the SAML configuration has been completed, you must adapt the logon policy for the Gateway Services behind the SAP Fiori apps to use SAML 2.0 Authentication. This is done in transaction SICF on the NW Gateway Server. Locate the ICF node that corresponds to the SAP Fiori app you are implementing and double click on it. The Invoice Tracking SAP Fiori app is implemented as ICF node sra021_srv 2013 SAP AG. All rights reserved. 39
40 SAML Enable a Gateway Service 2/3 Select the Logon Data tab and change the Procedure field from Standard to Alternative Logon Procedure. SAML based authentication is activated by changing the logon procedure Change the Security Requirement to SSL 2013 SAP AG. All rights reserved. 40
41 SAML Enable a Gateway Service 3/3 SAML based authentication will now be used in the event that the HTTP header does not contain the required user information Once the Alternative Logon Procedure has been changed, you can scroll down within the Logon Data tab area and you will see a list of Logon Procedures. By default, SAML Logon is item 7 in the list. To change this order, simply overtype the number in the left-hand column with 1 (or 2). The list is then automatically sorted according to the new order, but Logon Through HTTP Fields will always be item one. Save your changes and when you execute the Gateway service, the client will be redirected to the logon screen of the external SAML 2.0 IdP server SAP AG. All rights reserved. 41
42 Proxy Configuration Using a proxy to protect access from the public internet
43 Proxy Configuration Due to the fact that there are many different proxy products available and each is configured slightly differently, it is not possible to give exact instructions at this point. Irrespective of how your particular proxy is configured to rewrite URLs, the following URL information must be forwarded: The pathname to the SAP Fiori app All HTTP header fields The entire URL query string SAML 2.0 IdP Proxy SAP NW Gateway SAP ECC Public Internet Corporate DMZ Internal Corporate Network 2013 SAP AG. All rights reserved. 43
44 Proxy Configuration: A Possible Error 1/2 If the URL information passed through to SAP NW Gateway is incomplete, you could get the error message shown here: No default application path is configured for ACS endpoint What this means is that although the proxy is passing through the application path and HTTP headers, it is not passing through the query string parameters. Therefore, SAP NW Gateway receives a valid, authenticated request, but without any app name (held in the query string parameter called "Relay State"). Since the app name is missing, Gateway then tries to run a default application, but since none is configured, the above error is displayed SAP AG. All rights reserved. 44
45 Proxy Configuration: A Possible Error 2/2 Incidentally, if you want to configure a default application to run in the event that none is specified, it can be done in the SAML2 configuration wizard under Local Provider Service Provider Settings. Important This is not required for any of the SAP Fiori apps! Only used in case of IdP-initiated SSO because in this case, the service provider does not know what app to run after authentication SAP AG. All rights reserved. 45
46 Trouble Shooting What to do if it all goes horribly wrong
47 Trouble Shooting If you find an error in your configuration, the following tools are available: 1. SAP Help Portal on how to diagnose SAML 2.0 problems 2. SDN Wiki Page for SAML Common problems encountered when configuring SAML 2.0 for AS ABAP 4. Trouble shooting SAML 2.0 scenarios 5. When testing the SAP Fiori apps from a non-mobile client (say your desktop browser), some of these apps require the following query string parameter to be added to the URL: sap-ui-xx-fakeos=<os_name> where <os_name> is ios or android or bb 2013 SAP AG. All rights reserved. 47
48 2013 SAP AG. All rights reserved No part of this publication may be reproduced or transmitted in any form or for any purpose without the express permission of SAP AG. The information contained herein may be changed without prior notice. Some software products marketed by SAP AG and its distributors contain proprietary software components of other software vendors. Microsoft, Windows, Excel, Outlook, and PowerPoint are registered trademarks of Microsoft Corporation. IBM, DB2, DB2 Universal Database, System i, System i5, System p, System p5, System x, System z, System z10, System z9, z10, z9, iseries, pseries, xseries, zseries, eserver, z/vm, z/os, i5/os, S/390, OS/390, OS/400, AS/400, S/390 Parallel Enterprise Server, PowerVM, Power Architecture, POWER6+, POWER6, POWER5+, POWER5, POWER, OpenPower, PowerPC, BatchPipes, BladeCenter, System Storage, GPFS, HACMP, RETAIN, DB2 Connect, RACF, Redbooks, OS/2, Parallel Sysplex, MVS/ESA, AIX, Intelligent Miner, WebSphere, Netfinity, Tivoli and Informix are trademarks or registered trademarks of IBM Corporation. Linux is the registered trademark of Linus Torvalds in the U.S. and other countries. Adobe, the Adobe logo, Acrobat, PostScript, and Reader are either trademarks or registered trademarks of Adobe Systems Incorporated in the United States and/or other countries. Oracle is a registered trademark of Oracle Corporation. UNIX, X/Open, OSF/1, and Motif are registered trademarks of the Open Group. Citrix, ICA, Program Neighborhood, MetaFrame, WinFrame, VideoFrame, and MultiWin are trademarks or registered trademarks of Citrix Systems, Inc. HTML, XML, XHTML and W3C are trademarks or registered trademarks of W3C, World Wide Web Consortium, Massachusetts Institute of Technology. Java is a registered trademark of Sun Microsystems, Inc. JavaScript is a registered trademark of Sun Microsystems, Inc., used under license for technology invented and implemented by Netscape. SAP, R/3, SAP NetWeaver, Duet, PartnerEdge, ByDesign, SAP BusinessObjects Explorer, StreamWork, and other SAP products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of SAP AG in Germany and other countries. Business Objects and the Business Objects logo, BusinessObjects, Crystal Reports, Crystal Decisions, Web Intelligence, Xcelsius, and other Business Objects products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of Business Objects Software Ltd. Business Objects is an SAP company. Sybase and Adaptive Server, ianywhere, Sybase 365, SQL Anywhere, and other Sybase products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of Sybase, Inc. Sybase is an SAP company. All other product and service names mentioned are the trademarks of their respective companies. Data contained in this document serves informational purposes only. National product specifications may vary. The information in this document is proprietary to SAP. No part of this document may be reproduced, copied, or transmitted in any form or for any purpose without the express prior written permission of SAP AG. This document is a preliminary version and not subject to your license agreement or any other agreement with SAP. This document contains only intended strategies, developments, and functionalities of the SAP product and is not intended to be binding upon SAP to any particular course of business, product strategy, and/or development. Please note that this document is subject to change and may be changed by SAP at any time without notice. SAP assumes no responsibility for errors or omissions in this document. SAP does not warrant the accuracy or completeness of the information, text, graphics, links, or other items contained within this material. This document is provided without a warranty of any kind, either express or implied, including but not limited to the implied warranties of merchantability, fitness for a particular purpose, or non-infringement. SAP shall have no liability for damages of any kind including without limitation direct, special, indirect, or consequential damages that may result from the use of these materials. This limitation shall not apply in cases of intent or gross negligence. The statutory liability for personal injury and defective products is not affected. SAP has no control over the information that you may access through the use of hot links contained in these materials and does not endorse your use of third-party Web pages nor provide any warranty whatsoever relating to third-party Web pages SAP AG. All rights reserved. 48
49 2013 SAP AG. Alle Rechte vorbehalten. Weitergabe und Vervielfältigung dieser Publikation oder von Teilen daraus sind, zu welchem Zweck und in welcher Form auch immer, ohne die ausdrückliche schriftliche Genehmigung durch SAP AG nicht gestattet. In dieser Publikation enthaltene Informationen können ohne vorherige Ankündigung geändert werden. Die von SAP AG oder deren Vertriebsfirmen angebotenen Softwareprodukte können Softwarekomponenten auch anderer Softwarehersteller enthalten. Microsoft, Windows, Excel, Outlook, und PowerPoint sind eingetragene Marken der Microsoft Corporation. IBM, DB2, DB2 Universal Database, System i, System i5, System p, System p5, System x, System z, System z10, z10, z/vm, z/os, OS/390, zenterprise, PowerVM, Power Architecture, Power Systems, POWER7, POWER6+, POWER6, POWER, PowerHA, purescale, PowerPC, BladeCenter, System Storage, Storwize, XIV, GPFS, HACMP, RETAIN, DB2 Connect, RACF, Redbooks, OS/2, AIX, Intelligent Miner, WebSphere, Tivoli, Informix und Smarter Planet sind Marken oder eingetragene Marken der IBM Corporation. Linux ist eine eingetragene Marke von Linus Torvalds in den USA und anderen Ländern. Adobe, das Adobe-Logo, Acrobat, PostScript und Reader sind Marken oder eingetragene Marken von Adobe Systems Incorporated in den USA und/oder anderen Ländern. Oracle und Java sind eingetragene Marken von Oracle und/oder ihrer Tochtergesellschaften. UNIX, X/Open, OSF/1 und Motif sind eingetragene Marken der Open Group. Citrix, ICA, Program Neighborhood, MetaFrame, WinFrame, VideoFrame und MultiWin sind Marken oder eingetragene Marken von Citrix Systems, Inc. HTML, XML, XHTML und W3C sind Marken oder eingetragene Marken des W3C, World Wide Web Consortium, Massachusetts Institute of Technology. Apple, App Store, ibooks, ipad, iphone, iphoto, ipod, itunes, Multi-Touch, Objective-C, Retina, Safari, Siri und Xcode sind Marken oder eingetragene Marken der Apple Inc. IOS ist eine eingetragene Marke von Cisco Systems Inc. RIM, BlackBerry, BBM, BlackBerry Curve, BlackBerry Bold, BlackBerry Pearl, BlackBerry Torch, BlackBerry Storm, BlackBerry Storm2, BlackBerry PlayBook und BlackBerry App World sind Marken oder eingetragene Marken von Research in Motion Limited. Google App Engine, Google Apps, Google Checkout, Google Data API, Google Maps, Google Mobile Ads, Google Mobile Updater, Google Mobile, Google Store, Google Sync, Google Updater, Google Voice, Google Mail, Gmail, YouTube, Dalvik und Android sind Marken oder eingetragene Marken von Google Inc. INTERMEC ist eine eingetragene Marke der Intermec Technologies Corporation. Wi-Fi ist eine eingetragene Marke der Wi-Fi Alliance. Bluetooth ist eine eingetragene Marke von Bluetooth SIG Inc. Motorola ist eine eingetragene Marke von Motorola Trademark Holdings, LLC. Computop ist eine eingetragene Marke der Computop Wirtschaftsinformatik GmbH. SAP, R/3, SAP NetWeaver, Duet, PartnerEdge, ByDesign, SAP BusinessObjects Explorer, StreamWork, SAP HANA und weitere im Text erwähnte SAP-Produkte und Dienstleistungen sowie die entsprechenden Logos sind Marken oder eingetragene Marken der SAP AG in Deutschland und anderen Ländern. Business Objects und das Business-Objects-Logo, BusinessObjects, Crystal Reports, Crystal Decisions, Web Intelligence, Xcelsius und andere im Text erwähnte Business-Objects-Produkte und Dienstleistungen sowie die entsprechenden Logos sind Marken oder eingetragene Marken der Business Objects Software Ltd. Business Objects ist ein Unternehmen der SAP AG. Sybase und Adaptive Server, ianywhere, Sybase 365, SQL Anywhere und weitere im Text erwähnte Sybase-Produkte und -Dienstleistungen sowie die entsprechenden Logos sind Marken oder eingetragene Marken der Sybase Inc. Sybase ist ein Unternehmen der SAP AG. Crossgate, EDDY, B2B 360, B2B 360 Services sind eingetragene Marken der Crossgate AG in Deutschland und anderen Ländern. Crossgate ist ein Unternehmen der SAP AG. Alle anderen Namen von Produkten und Dienstleistungen sind Marken der jeweiligen Firmen. Die Angaben im Text sind unverbindlich und dienen lediglich zu Informationszwecken. Produkte können länderspezifische Unterschiede aufweisen. Die in dieser Publikation enthaltene Information ist Eigentum der SAP. Weitergabe und Vervielfältigung dieser Publikation oder von Teilen daraus sind, zu welchem Zweck und in welcher Form auch immer, nur mit ausdrücklicher schriftlicher Genehmigung durch SAP AG gestattet SAP AG. All rights reserved. 49
SAP NetWeaver Gateway Throughput & Scalability. David Freidlin
SAP NetWeaver Gateway Throughput & Scalability David Freidlin Agenda Gateway Throughput Gateway Data Scalability Gateway Scaling Out Gateway High Availability 2013 SAP AG. All rights reserved. 2 Gateway
More informationUpdate on the SAP GUI Family Q3/2012
Update on the SAP GUI Family Q3/2012 Disclaimer This presentation outlines our general product direction and should not be relied on in making a purchase decision. This presentation is not subject to your
More informationBuilding a multi-source universe
September 10-13, 2012 Orlando, Florida Building a multi-source universe Pierpaolo Vezzosi 2011 SAP AG. All rights reserved. Public 1 Learning points Learn the details of the multi-source universe technology
More informationBudget Control by Cost Center
SAP Business One Budget Control by Cost Center Ecosystem & Channels Readiness July 2011 Allows a precise follow up of costs booked using the cost accounting dimensions functionality as introduced in SAP
More informationGetting Started with Scope and Effort Analyzer (SEA) ALM Solution Management, AGS, SAP AG
Getting Started with Scope and Effort Analyzer (SEA) ALM Solution Management, AGS, SAP AG Introduction Upgrade Planning with Scope and Effort Analyzer (SEA) SAP Solution Manager - Scope and Effort Analyzer
More informationEmpowering Partners to Run Better. Ecosystem and Channels Authorized Reseller Program
Empowering Partners to Run Better Ecosystem and Channels Authorized Reseller Program Award-Winning Partner Program For Award-Winning Partners Grow faster Accelerate engagements Earn high margins Enhance
More informationHow To Install The Sap Business Explorer 7.X 2.X (Sap) On A Windows 7.30 Computer (Windows 7)
SAP Business Explorer 7.X Copyright Copyright 2012 SAP AG. All rights reserved. No part of this publication may be reproduced or transmitted in any form or for any purpose without the express permission
More informationSAP Enterprise Master Data Management - Licensing Agreements and Recommendations
SAP Enterprise Master Data Management ASUG Influence Council 2014 Scott Braker-Abene, Solution Management, SAP Labs, LLC June 2014 0708 Legal Disclaimer The information in this presentation is confidential
More informationSAP NetWeaver Decision Service Management in SAP CRM for Utilities
SAP NetWeaver Decision Service Management in SAP CRM for Utilities Volker Rein Product Owner SAP CRM for Utilities SAP AG Christian Kleingerdes Development Architect SAP CRM for Utilities SAP AG Dr. Wolfgang
More informationCapital Project and Portfolio Management
Capital Project and Portfolio Management Agenda Introduction Capital Project and Portfolio Management Process New Functions and Features for Capital Project and Portfolio Management Process Variant Leveraging
More informationUser Experience in Custom Apps
User Experience in Custom Apps p o w e r e d b y t h e S A P M o b i l e P l a t f o r m S e a n L o n g U X A r c h i t e c t M a n u e l S a e z - D i r e c t o r M o b i l e I n n o v a t i o n C e
More informationAn Overview of the SAP Business One Cloud Landscape. SAP Business One Cloud Landscape Workshop
An Overview of the SAP Business One Cloud Landscape SAP Business One Cloud Landscape Workshop Section Objectives This section of the course will enable you to: Understand the different components that
More informationUpgrading SAP Public Budget Formulation (PBF) PBF Development Team October 2012
Upgrading SAP Public Budget Formulation (PBF) PBF Development Team October 2012 SAP Public Budget Formulation Upgrading from PBF 7.1 to PBF 8.0 SP02 Agenda PBF 8.0 System Pre-Requisites PBF 8.0 Functional
More informationSAP CRM on HANA HANA Limited Runtime SAP 360 Customer. December 19 th, 2012
SAP on HANA HANA Limited Runtime December 19 th, 2012 Legal disclaimer The information in this presentation is confidential and proprietary to SAP and may not be disclosed without the permission of SAP.
More informationSetting up the Environment for Creating or Extending SAP Fiori Apps
Setting up the Environment for Creating or Extending SAP Fiori Apps February 2014 Copyright Copyright 2014 SAP AG. All rights reserved SAP Library document classification: PUBLIC No part of this publication
More informationUSDL XG WP3 SAP use case. Kay Kadner
XG WP3 SAP use case Kay Kadner Customer Marketplace Company B Runtime Company D Innovation & Community Community Company A Repository Company C Repository Provider Provider 2 Integrated Demonstrator -
More informationInnovation Summit Philadelphia, July 12 th 13 th User Experience
Innovation Summit Philadelphia, July 12 th 13 th User Experience Agenda User Experience as a Strategic Topic New Usages and new Capabilities Understanding Work Practices From Configuration to App Breakouts
More informationSAP Road Map for SAP NetWeaver Single Sign-On
SAP Road Map for SAP NetWeaver Single Sign-On Legal disclaimer The information in this presentation is confidential and proprietary to SAP and may not be disclosed without the permission of SAP. This presentation
More informationSAP BusinessObjects Dashboards Influence Session. Scott Leaver Solution Management François Imberton Product Management
Influence Session Scott Leaver Solution Management François Imberton Product Management Influence Session What is this about? Contribute to Dashboards Product Release Content Give feedback on potential
More informationBuilding your SAP Business One Cloud Landscape. SAP Business One Cloud Landscape Workshop
Building your SAP Business One Cloud Landscape SAP Business One Cloud Landscape Workshop Section Objectives This section of the course will enable you to: Complete the steps necessary to build a SAP Business
More informationBackup Strategy for Oracle
Backup Strategy for Oracle White Paper: Oracle Database Administration February 01 TABLE OF CONTENTS INTRODUCTION... 3 EXAMPLE 1... 4 EXAMPLE... 6 EXAMPLE 3... 7 SUMMARY... 8 ADDITIONAL INFORMATION...
More informationJob Scheduling Management Integration with SAP CPS by Redwood SAP Solution Manager 7.1. SAP AG August, 2011
Job Scheduling Management Integration with SAP CPS by Redwood SAP Solution Manager 7.1 SAP AG August, 2011 Disclaimer This presentation outlines our general product direction and should not be relied on
More informationGrowing pressures that are here to stay
SAP BusinessObjects Planning and Consolidation April 2012 Growing pressures that are here to stay Volatility in markets, commodity prices and stocks Increasing globalization Increased focus on risk Pressure
More informationSettlement in TM 9.0 New functionalities with TM 9.0. Ananth Bhat SAP Development, Transportation & Logistics December 2012
Settlement in TM 9.0 New functionalities with TM 9.0 Ananth Bhat SAP Development, Transportation & Logistics December 2012 Agenda Shipper Functionality Freight Cost Distribution LSP / Freight Forwarder
More informationOData in a Nutshell. August 2011 INTERNAL
OData in a Nutshell August 2011 INTERNAL Objectives At the end of this module, you will be able to: Understand the OData Standard and how it works. Understand how OData uses the Atom Protocol. Understand
More informationSAP's Journey of Implementing SAP Disclosure Management and Notes Management Session 2002
SAP's Journey of Implementing SAP Disclosure Management and Notes Management Session 2002 Sonja Simon/Corporate Financial Reporting and Kirk Anderson/EPM Solution Management, May, 2012 Agenda Overview:
More informationSizing and Deployment of the SAP Business One Cloud Landscape. SAP Business One Cloud Landscape Workshop
Sizing and Deployment of the SAP Business One Cloud Landscape SAP Business One Cloud Landscape Workshop Section Objectives This section of the course will enable you to: Understand the sizing metrics that
More informationVirtual Causeway Inbound Lead Engine SME (6 Month) Premium Package
Virtual Causeway Inbound Lead Engine SME (6 Month) Premium Package Rick Endrulat President Marlene Keay Manager, Business Development Services April 10, 2013 Agenda Why Virtual Causeway Who is Virtual
More informationVirtual Causeway Try Before You Buy, Inbound/Outbound Canada Premium Package
Virtual Causeway Try Before You Buy, Inbound/Outbound Canada Premium Package Rick Endrulat President Marlene Keay Manager, Business Development Services August 30, 2012 Agenda Why Virtual Causeway Who
More informationIntelligent Business Operations Chapter 1: Overview & Strategy
Intelligent Business Operations Chapter 1: Overview & Strategy Legal Disclaimer The information in this presentation is confidential and proprietary to SAP and may not be disclosed without the permission
More informationITSCM at SAP Best practices
ITSCM at SAP Best practices ITSCM - Goals and scope ITSCM helps to establish Business Continuity it Management related processes within Global IT as one of SAP Lines of Business (LOB s ) ITSCM assists
More informationSAP Business ByDesign Reference Systems. Scenario Outline. SAP ERP Integration Scenarios
SAP Business ByDesign Reference Systems Scenario Outline SAP ERP Integration Scenarios Content Scenario Overview Business Scenarios in a Reference System Introduction Typical Usage Process Illustration
More informationDemand Planning. SAP Business ByDesign
SAP Business ByDesign Table of Content 1 About this Document... 3 1.1 Purpose... 3 1.2 Reference System and Model Company... 3 2 Master and Organizational Data... 4 3 Business Process Tasks... 5 3.1 Demand
More informationAccounts Receivable. SAP Best Practices
Accounts Receivable SAP Best Practices Purpose, Benefits, and Key Steps Purpose This scenario deals with posting accounting data for customers in Accounts Receivable. Benefits The Accounts Receivable is
More informationSetup Guide for Business Process Operations Dashboards SAP Solution Manager 7.1. SAP AG August, 2011
Setup Guide for Business Process Operations Dashboards SAP Solution Manager 7.1 SAP AG August, 2011 Disclaimer This presentation outlines our general product direction and should not be relied on in making
More informationRUN BETTER Become a Best-Run Business with Remote Support Platform for SAP Business One
RUN BETTER Become a Best-Run Business with Remote Support Platform for SAP Business One September 2013 Customer External Become a Best-Run Business with Remote Support Platform for SAP Business One Run
More informationSAP Enterprise Portal 6.0 KM Platform Delta Features
SAP Enterprise Portal 6.0 KM Platform Delta Features Please see also the KM Platform feature list in http://service.sap.com/ep Product Management Operations Status: January 20th, 2004 Note: This presentation
More informationR/3 and J2EE Setup for Digital Signature on Form 16 in HR Systems
R/3 and J2EE Setup for Digital Signature on Form 16 in HR Systems Agenda 1. R/3 - Setup 1.1. Transaction code STRUST 1.2. Transaction code SM59 2. J2EE - Setup 2.1. Key Storage 2.2. Security Provider 2.3.
More informationSAP Service Tools for Performance Analysis
SAP Service Tools for Performance Analysis Kerstin Knebusch Active Global Support Month 05, 2013 Public Performance Analysis Wait event based Focus on statements causing high load and / or high wait time
More informationHow to Configure Access Control for Exchange using PowerShell Cmdlets A Step-by-Step guide
SAP How-to Guide Mobile Device Management SAP Afaria How to Configure Access Control for Exchange using PowerShell Cmdlets A Step-by-Step guide Applicable Releases: SAP Afaria 7 SP3 HotFix 06, SAP Afaria
More informationMobility in the Mining Industry. Why? How? What? Stefan Soeller, SAP IBU Mill Products & Mining. Mobility. Mining. IS-Mine
Mobility in the Mining Industry. Why? How? What? Stefan Soeller, SAP IBU Mill Products & Mining Mobility IS-Mine Mining Legal Disclaimer The information in this presentation is confidential and proprietary
More informationOverview of integrated business planning with SAP Planning and Consolidation. Isabel Wichmann, Presales Specialist, SAP September 2012
Overview of integrated business planning with SAP Planning and Consolidation Isabel Wichmann, Presales Specialist, SAP September 2012 Legal disclaimer The information 2 in this presentation is confidential
More informationSAP NetWeaver Landscape. Jeff Anders/Solution Management January 2012
SAP NetWeaver Landscape Virtualization Management Overview Jeff Anders/Solution Management January 2012 What Customers Have Told Us Managing the transformation to virtual/cloud infrastructure Hybrid business
More informationSAP Sourcing / Contract Lifecycle Mgmt Mail Configurations. April 2013 Vikram Shanmugasundaram, SAP Sourcing/CLM Center of Excellence
SAP Sourcing / Contract Lifecycle Mgmt Mail Configurations April 2013 Vikram Shanmugasundaram, SAP Sourcing/CLM Center of Excellence SAP Sourcing / CLM 2013 Webcast Series Goal Spread the knowledge about
More informationSOP through Long Term Planning Transfer to LIS/PIS/Capacity. SAP Best Practices
SOP through Long Term Planning Transfer to LIS/PIS/Capacity SAP Best Practices Purpose, Benefits, and Key Steps Purpose Check if the budgeted sales quantities can be produced, assess material requirements
More informationSAP Transportation Management
SAP Transportation Management Overview of SAP TM 9.0 for Shipper Industries Product Management, SAP Transportation Management SAP AG SAP Supply Chain Execution Introduction Supply Chain Execution is a
More informationSAP BI Visualization Showcase 2013 Edition - External Prepared by Terry Penner
SAP BI Visualization Showcase 2013 Edition - External Prepared by Terry Penner Legal Disclaimer The information in this presentation is confidential and proprietary to SAP and may not be disclosed without
More informationAriba Network Integration to SAP ECC
Ariba Network Integration to SAP ECC Mark Willner Principal Technical Solutions Consultant Ariba an SAP Company» October 2014 ERP Materials Management Core Integration Scenario Ariba Collaborative Commerce,
More informationSAPFIN. Overview of SAP ERP Financials COURSE OUTLINE. Course Version: 15 Course Duration: 2 Day(s)
SAPFIN Overview of SAP ERP Financials. COURSE OUTLINE Course Version: 15 Course Duration: 2 Day(s) SAP Copyrights and Trademarks 2014 SAP AG. All rights reserved. No part of this publication may be reproduced
More informationSAP Master Data Governance for Financials: What's New with SAP ERP 6.0 Enhancement Package 4 and 5
Orange County Convention Center Orlando, Florida May 15-18, 2011 SAP Master Data Governance for Financials: What's New with SAP ERP 6.0 Enhancement Package 4 and 5 Pete Graham Director, LoB Finance, Solutions
More informationILM Meets HANA Flexible, Holistic and Fast Reporting. Georg Fischer, Ken Campbell Solution Management - Information Lifecycle Management May 2012
ILM Meets HANA Flexible, Holistic and Fast Reporting Georg Fischer, Ken Campbell Solution Management - Information Lifecycle Management May 2012 Legal Disclaimer The information in this presentation is
More informationSAP Central Process Scheduling (CPS) 8.0 by Redwood
SAP Central Process Scheduling (CPS) 8.0 by Redwood What s new in SAP CPS 8.0? November 2010 Agenda 1. SAP Central Process Scheduling by Redwood Architecture Overview 2. Enhanced User Interface 3. New
More informationHR400 SAP ERP HCM Payroll Configuration
HR400 SAP ERP HCM Payroll Configuration. COURSE OUTLINE Course Version: 15 Course Duration: 5 Day(s) SAP Copyrights and Trademarks 2014 SAP AG. All rights reserved. No part of this publication may be reproduced
More informationCustomization of SAP Sales Manager 2.5
SAP How-to Guide SAP Mobility Customization of SAP Sales Manager 2.5 A Branded Service provided by SAP Rapid Innovation Group Applicable Releases: SAP Sales Manager 2.5 Target Audience: CRM consultants
More informationMultiple Components in One Database -
Multiple Components in One Database - Technical Implementation on Different Databases Dr. Georg Leffers SAP AG Technical Setup The following slides show for all databases supported by SAP the technical
More informationPhysical Inventory Management. SAP Business ByDesign
SAP Business ByDesign Table of Content 1 About this Document... 3 1.1 Purpose... 3 1.2 Reference System and Model Company... 3 2 Master and Organizational Data... 4 3 Business Process Tasks... 5 3.1 Logistics
More informationApplication Lifecycle Management
Application Lifecycle Management Best Practice Process Document ALM Process: ITSM - Incident Management Application Lifecycle Management Process ITSM Incident Management Problem Description: How to create,
More informationNext Generation Digital Banking with SAP
Next Generation Digital Banking with SAP Thorsten Weinrich, Director Business Development, Banking, SAP EMEA October, 2014 Use this title slide only with an image Legal Disclaimer The information in this
More informationMatthias Steiner SAP. SAP HANA Cloud Platform A guided tour
Matthias Steiner SAP SAP HANA Cloud Platform A guided tour SAP HANA Cloud Platform A guided tour Matthias Steiner April, 2011 Overview Platform Capabilities Portal Mobile Collaboration Integration Analytics
More informationAC200. Basics of Customizing for Financial Accounting: General Ledger, Accounts Receivable, Accounts Payable COURSE OUTLINE
AC200 Basics of Customizing for Financial Accounting: General Ledger, Accounts Receivable, Accounts Payable. COURSE OUTLINE Course Version: 15 Course Duration: 5 Day(s) SAP Copyrights and Trademarks 2015
More informationSAP's Supply Chain Execution Strategy & Roadmap. Transportation & Logistics Development, SAP AG January, 2013
SAP's Supply Chain Execution Strategy & Roadmap Transportation & Logistics Development, SAP AG January, 2013 SAP Customers are Producing. 86% Of sport shoes worldwide 70% Of chocolate worldwide 50% Of
More informationProcess Archiving using NetWeaver Business Process Management
Process Archiving using NetWeaver Business Process Management Applies to: NetWeaver Composition Environment 7.2, 7.3. For more information, visit the Business Process Modeling homepage. Summary This document
More informationIntelligent driven Security at SAP Good Practice Maximilian Adrian IT Security & Risk Office, SAP AG. July 2013
Intelligent driven Security at SAP Good Practice Maximilian Adrian IT Security & Risk Office, SAP AG July 2013 Agenda 1. Introduction 2. SAP IT Security & Risk Office 3. IT Security Approach@SAP 2013 SAP
More informationTable of Contents. How to Find Database Index usage per ABAP Report and Creating an Index
How to Find Database Index usage per ABAP Report and Creating an Index Applies to: SAP NETWEAVER WEB AS ABAP. For more information, visit the ABAP homepage Summary The aim of this article is to show how
More informationSAP Business One for iphone and ipad. Version 1.5.x January 2012
Version 1.5.x January 2012 Legal disclaimer The information in this presentation is confidential and proprietary to SAP and may not be disclosed without the permission of SAP. This presentation is not
More informationWorking in a ubiquitous computing environment
Working in a ubiquitous computing environment Challenges for an application software manufacturer Dr. Thomas Ziegert, SAP Corporate Research SAP Corporate Research Overview SAP Corporate Research Investigates
More informationEnterprise Software - Applications, Technologies and Programming
Enterprise Software - Applications, Technologies and Programming Dr. Uwe Kubach, Dr. Gregor Hackenbroich, Dr. Ralf Ackermann SAP Research 2010 SAP AG. All rights reserved. / Page 1 Abstract This lecture
More informationSecure MobiLink Synchronization using Microsoft IIS and the MobiLink Redirector
Secure MobiLink Synchronization using Microsoft IIS and the MobiLink Redirector A whitepaper from ianywhere Author: Joshua Savill, Product Manager This whitepaper was written in the context of SQL Anywhere
More informationUI Framework Simple Search in CRM WebClient based on NetWeaver Enterprise Search (ABAP) SAP Enhancement Package 1 for SAP CRM 7.0
UI Framework Simple Search in CRM WebClient based on NetWeaver Enterprise Search (ABAP) SAP Enhancement Package 1 for SAP CRM 7.0 1 Objectives At the end of this unit, you will be able to: Use the new
More informationSAP NetWeaver Identity Management Compliant provisioning using SAP Access Control Architectural overview
SAP NetWeaver Identity Management Compliant provisioning using SAP Access Control Architectural overview Version 7.2 Rev 8 2013 SAP AG or an SAP affiliate company. All rights reserved. No part of this
More informationThird Party Digital Asset Management Integration
Third Party Digital Asset Management Integration Objectives At the end of this unit, you will be able to: Assign Digital Assets to CRM Objects Work with the Where-Used List Describe the necessary customizing
More informationHow To Improve Your Business Process With Sap
Business Process Analytics & Improvement SAP Solution Manager 7.1 SAP AG August, 2011 Disclaimer This presentation outlines our general product direction and should not be relied on in making a purchase
More informationIntegration of SAP Netweaver User Management with LDAP
Integration of SAP Netweaver User Management with LDAP Applies to: SAP Netweaver 7.0/7.1 Microsoft Active Directory 2003 Summary The document describes the detailed steps of configuring the integration
More informationHow To Configure SFTP Adapter in SAP PI
SAP NetWeaver How-To Guide How To Configure SFTP Adapter in SAP PI Applicable Releases: SAP PI 7.11 Onwards Version 1.0 September 2012 Copyright 2012 SAP AG. All rights reserved. No part of this publication
More informationUnderstanding HR Schema and PCR with an Example
Understanding HR Schema and PCR with an Example Applies to: SAP ECC 6.0 version, SAP HCM module. For more information, visit the Enterprise Resource Planning homepage. Summary This document will provide
More informationSupply Chain Summit Transportation Deep Dive. Bill King, SAP Solutions Management Bjorn Bernard, GOPA-IT
Supply Chain Summit Transportation Deep Dive Bill King, SAP Solutions Management Bjorn Bernard, GOPA-IT SAP Supply Chain Execution Introduction Supply Chain Execution is a Challenging Environment Customer
More informationUnified Service Description Language Enabling the Internet of Services
Unified Service Description Language Enabling the Internet of Services Dr. Kay Kadner, SAP AG, SAP Research, Chair USDL XG kay.kadner@sap.com, 2011-05-16 Growth due to increasing service orientation Source:
More informationAC 10.0 Centralized Emergency Access
AC 10.0 Centralized Emergency Access Customer Solution Adoption June 2011 Version 2.0 Purpose of this document This document is a detailed guide on the emergency access capability of Access Control 10.0.
More informationSAP Master Data Governance- Hiding fields in the change request User Interface
SAP Master Data Governance- Hiding fields in the change request User Interface Applies to: ERP 6 Ehp 5 SAP Master Data Governance. For more information, visit the Master Data Management homepage. Summary
More informationManagement and Monitoring of a J2EE Server and Applications Using JMX. Reinhold Kautzleben, Gregor Frey Speaker Title, SAP AG
Management and Monitoring of a J2EE Server and Applications Using JMX Reinhold Kautzleben, Gregor Frey Speaker Title, SAP AG How much JMX is required to be in J2EE? JMX 1.2 belongs to the list of required
More informationHCM Core Renovation Overview SAP HCM Renewal 1.0
HCM Core Renovation Overview SAP HCM Renewal 1.0 SOLUTION INTRODUCTION & DEMO September, 2012 Legal Disclaimer The information in this presentation is confidential and proprietary to SAP and may not be
More informationSingle Sign-On between SAP Portal and SuccessFactors
Single Sign-On between SAP Portal and SuccessFactors Dimitar Mihaylov 7/1/2012 Contents 1. Overview... 3 2. Trust between SAP Portal 7.3 and SuccessFactors... 5 2.1. Initial configuration in SAP Portal
More informationTM111. ERP Integration for Order Management (Shipper Specific) COURSE OUTLINE. Course Version: 15 Course Duration: 2 Day(s)
TM111 ERP Integration for Order Management (Shipper Specific). COURSE OUTLINE Course Version: 15 Course Duration: 2 Day(s) SAP Copyrights and Trademarks 2014 SAP SE. All rights reserved. No part of this
More informationFixed Asset in SAP Business One 9.0
Fixed Asset in SAP Business One 9.0 Hilko Mueller, Solution Management,SAP AG May 2013 2013 SAP AG. All rights reserved. 1 Agenda Fixed Asset Overview Fixed Asset Setup Fixed Asset Application Product
More informationAuto-Servicio de data discovery con SAP LUMIRA. David Pérez, Senior Solution Specialist SAP Analytics
Auto-Servicio de data discovery con SAP LUMIRA David Pérez, Senior Solution Specialist SAP Analytics Retos para la versión única de la verdad 2014 SAP AG. All rights reserved. 2 Reaparición de Silos 2014
More informationFinding the Leak Access Logging for Sensitive Data. SAP Product Management Security
Finding the Leak Access Logging for Sensitive Data SAP Product Management Security Disclaimer This document does not constitute a legally binding proposal, offer, quotation or bid on the part of SAP. SAP
More informationSAP HANA Security Overview Session 3909. Andrea Kristen, Holger Mack, SAP ASUG Annual Conference 2013
SAP HANA Security Overview Session 3909 Andrea Kristen, Holger Mack, SAP ASUG Annual Conference 2013 Disclaimer This presentation outlines our general product direction and should not be relied on in making
More informationProduction Subcontracting (External Processing) SAP Best Practices
Production Subcontracting (External ing) SAP Best Practices Purpose, Benefits, and Key Steps Purpose During the Manufacturing process, when a "Planned Order" for Production is converted to a "Production
More information" # Portal Integration SAP AG 2004, 3
! SAP AG 2004, 2 " # Portal Integration SAP AG 2004, 3 $ %"&' # SAP Netweaver People Integration Multi Channel access Portal Coll Information Integration Information Broadcasting Pre-Calculated, online
More informationBusiness One in Action - How can we post bank fees and charges while posting Incoming or Outgoing Payment transactions?
Business One in Action - How can we post bank fees and charges while posting Incoming or Outgoing Payment transactions? Applies to: SAP Business One, Accounting, Banking and Reconciliation Summary: This
More informationDesktop Connection for SAP CRM Professional Edition 2.0 SP01. April 2014
Desktop Connection for SAP CRM Professional Edition 2.0 SP01 April 2014 Disclaimer This document outlines our general product direction and should not be relied on in making a purchase decision. This presentation
More informationThe Future of Business Planning: Trends, Möglichkeiten & Ausblick
BI-Kongress 2015 COMBINED THINKING FOR SUCCESS. The Future of Business Planning: Trends, Möglichkeiten & Ausblick Stephan Weber Frankfurt, 09. Juni 2015 CubeServ BI-Kongress 2015 / 1 Trends, Möglichkeiten
More informationDesktop Intelligence Compatibility Pack. Thomas B Kuruvilla Solution Management Business Intelligence September, 2013
Desktop Intelligence ompatibility Pack Thomas B Kuruvilla Solution Management Business Intelligence September, 2013 Legal Disclaimer The information in this presentation is confidential and proprietary
More informationHow to Schedule Report Execution and Mailing
How To Guide SAP Business One Document Version: 1.0 2012-09-02 Applicable Releases: SAP Business One 8.81 PL10 and higher, SAP Business One 8.82 Typographic Conventions Type Style Example Description Words
More informationHow to Create a Support Message in SAP Service Marketplace
How to Create a Support Message in SAP Service Marketplace Summary This document explains how to create a message (incident) on the SAP Service Marketplace. It is assumed that the customer has never logged
More informationSAP Database Administration for Oracle
SAP Database Administration for Oracle White Paper: Oracle Database Administration February 2012 TABLE OF CONTENTS OVERVIEW... 3 FEATURES OF BR*TOOLS FOR ORACLE DBA... 4 SPACE MANAGEMENT... 5 Analyses...
More informationPortfolio and Project Management 5.0: Excel Integration for Financial and Capacity Planning
Portfolio and Project Management 5.0: Excel Integration for Financial and Capacity Planning Applies to: Portfolio and Project Management 5.0 Summary Financial and Capacity planning for item, initiative
More informationMichael Collet 28th January 2005, Frankfurt, GI -Fachgruppe SECMGT
Management@SAP Michael Collet 28th January 2005, Frankfurt, GI -Fachgruppe SECMGT If business has no risk, don t do it! ( frei nach Tom DeMarco & Timothy Lister) Scope of Corporate Management Roll-out
More informationK in Identify the differences between the universe design tool and the information design tool
K in Identify the differences between the universe design tool and the information design tool The information design tool is a new modeling tool for the semantic layer that enables you to manipulate metadata
More information