SAML in UI based SOA Scenarios



Similar documents
Run SAP Implementation Partner Program Guide 2009 ADOPTING THE RUN METHODOLOGY INTO YOUR SAP IMPLEMENTATIONS

SAP Perfect Plant Manufacturing Solution. SAP Taiwan Allen Lin 林 信 宇

SAP Solution Manager Change Request Management. SAP Solution Manager Product Management SAP AG

SAP ERP 6.0 Enterprise Compensation Management

Anpassung von Projektmanagement Standards Nutzungsmöglichkeiten von Konstruktionstechniken aus der Referenzmodellierung

SAP GLOBAL DIVERSITY POLICY

Performance Testing Results & Sizing Guidelines for your SAP MII Implementation. Salvatore Castro (SAP) Ravi Hegde (Intel)

SAP CRM Detailed View SAP CRM Web Service Tool

SAP NetWeaver Mobile. Capabilities, Customer Experiences, Roadmap. Gerhard Henig, Product Management, SAP AG

Next Generation BPM. Michael Hill Product Manager SAP Technology Group Market Development and Enablement SAP Labs, LLC

Accelerated Application Delivery

SAP Solution Manager for Implementing SAP Business Suite. Product Management SAP Solution Manager SAP AG

SAP NetWeaver Composite Application Framework (CAF)

Overview of SAP NetWeaver Business Rules Management with SAP NetWeaver Composition Environment

SAP Solution Manager for Customizing Synchronization

SAP BI - Data Quality with Business Objects Data Services

SAP CRM 7.0 Detailed View

SAP Solution Manager: Scenarios. Product Management SAP Solution Manager SAP AG

SAP Supplier Relationship Management 7.0

SAP Business One 8.81

SAP Solution Manager Value Proposition. Walldorf, April 2007

SAP Governance, Risk & Compliance Access Control 5.3. Post-Installation Enterprise Role Management Part I: Configuration

SAP Solution Manager - Solution Reporting. SAP Solution Manager Product Management SAP AG

Enhancement Framework What it means to you

Core Manufacturing. Arne Manthey SAP AG 06/2010

SAP Service and Asset Management Solution Map. Release 2005

SAP Enterprise Architecture:

TREX SAP NetWeaver s Search and Classification Engine. SAP NetWeaver Product Management July 2008

Use of DB2 purescale with SAP Applications

mysap ERP Application Map

Making Programs Unicode Enabled

LCM263 Managing MaxDB with Database Studio

SAP Solutions for Information Management Overview, Strategy, & Roadmap. Kristin McMahon May 2013

SAP Sourcing/CLM Webcast Query & User/Contact Maintenance Web Service

Enhanced Reporting in SAP All-In-One

Managing MaxDB SPC150. Version 7.6

BRFplus Field Configuration for Portfolio Management

SAP NetWeaver Gateway Throughput & Scalability. David Freidlin

SMP Security & Identity Management An Introduction

" # Portal Integration SAP AG 2004, 3

Project Cost Reporting for PPM

BRSPACE Online Reorganizations

Advanced Manufacturing Summit SAP Manufacturing Execution

SAP Enterprise Portal 6.0 KM Platform Delta Features

SAP Product Road Map SAP Mobile Documents

Customer Surveys with SAP Contact Center

mysap ERP Technology Facts

mysap Supply Chain Management Solution Map Release 2005

Making SAP s User Experience Strategy Reality Nis Boy Naeve, Andreas Hauser SAP SE SESSION CODE: UX204

Application Map Release 2005

Capital Project and Portfolio Management

Heterogeneous ABAP System Copy Technical Overview

SAP xmii Deployment Made Easy. Mo Ghanem, SAP Labs LLC

Certificate SAP INTEGRATION CERTIFICATION

Building a multi-source universe

A short update on. SAP s User Experience Strategy Sam Yen, Andreas Hauser, Nis Boy Naeve, Volker Zimmermann, Gerrit Kotze - SAP AG April 2014

Setup Guide for Business Process Operations Dashboards SAP Solution Manager 7.1. SAP AG August, 2011

SAP NetWeaver Single Sign-On. Product Management SAP NetWeaver Identity Management & Security June 2011

Job Scheduling Management Integration with SAP CPS by Redwood SAP Solution Manager 7.1. SAP AG August, 2011

Sabine Reich SAP. Test Workbench - Introduction

Perforce Best SAP. Claudia Loff, SAP AG Thomas Kroll, SAP AG Walldorf, Germany, 2006/08/14

How To Develop In Java (J2Ee) And J2Ee (Sap) Together (Sapp)

Jeff Gebo NetWeaver RIG, SAP Labs LLC

Simplifying Workflow with SAP NetWeaver. Alan Rickayzen Product Manager, SAP AG

Predictive Analytics and the Big Data Challenge

Optimize Your Business with SAP Enterprise Dashboards (SAP Smart Business) Powered by SAP HANA

Growing pressures that are here to stay

SAP ERP Financials. Vision, Strategy & Roadmap. Dr. Jens Baumann ERP Solution Management, SAP AG

Working in a ubiquitous computing environment

SAP Fiori. Overview of SSL + SAML 2.0 Configuration

SAP BusinessObjects Dashboards Influence Session. Scott Leaver Solution Management François Imberton Product Management

Monitoring and Management of Landscapes with SAP NetWeaver Administrator. Dieter Krieger, SAP AG

Dell One Identity Cloud Access Manager How to Configure for SSO to SAP NetWeaver using SAML 2.0

SAP NetWeaver Landscape. Jeff Anders/Solution Management January 2012

Multiple Components in One Database -

Settlement in TM 9.0 New functionalities with TM 9.0. Ananth Bhat SAP Development, Transportation & Logistics December 2012

SAP's Journey of Implementing SAP Disclosure Management and Notes Management Session 2002

Enabling Federation and Web-Single Sign-On in Heterogeneous Landscapes with the Identity Provider and Security Token Service Supplied by SAP NetWeaver

SAP NetWeaver MDM 5.5 SP3 SAP Portal iviews Installation & Configuration. Ron Hendrickx SAP NetWeaver RIG Americas Foundation Team

SAML 2.0 Configurations at SAP NetWeaver AS ABAP and Microsoft ADFS

mysap Customer Relationship Management - Enterprise Solution Map Edition 2004

Using SAP Logon Tickets for Single Sign on to Microsoft based web applications

Developing Applications for Integration between PI and SAP ERP in Different Network Domains or Landscapes

SAP Master Data Governance for Financials: What's New with SAP ERP 6.0 Enhancement Package 4 and 5

Management and Monitoring of a J2EE Server and Applications Using JMX. Reinhold Kautzleben, Gregor Frey Speaker Title, SAP AG

ITSCM at SAP Best practices

Transcription:

SAML in UI based SOA Scenarios SAP NetWeaver Product Management Security June 2008

Agenda 1. Typical Authentication and SSO Scenarios in SOA 2. Windows Integration Authentication using Kerberos with SAP NetWeaver 3. Authentication with SAML 4. Single Sign-On using SAML Token Profile 5. Outlook SAP 2008 Page 2

Access Management and the User Authentication Lifecycle in SOA Secure authentication or SSO of users accessing enterprise resources Authorize user access to enterprise system resources with user s own role and permission assignments Audit user access to enterprise system resources Portal Service Client Service Consumer Service Provider Bob HTTP Bob SOAP RFC RMI Bob Initial User Authentication or SSO to Portal or Desktop application User Identity Propagation for Service Call SAP 2008 Page 3

Single Sign-On Single Sign-On (SSO) User authenticates once against a security system User is then seamlessly authenticated to access other systems Authentication against other applications is transparent for the user Identity Management for SSO Synchronization, provisioning or mapping of user identities for SSO User identities for SSO must match to avoid unintended user impersonations Central user identity management to avoid redundant user information Mainstream Integrated Authentication and SSO Solutions in SAP NetWeaver X.509 Client Certificates and PKIs Windows Integrated Authentication and Kerberos SAP Logon Tickets and Trusted Systems SAML Assertions with Trusted Systems Header Variables Custom JAAS or GSS-API v2 based integration SAP 2008 Page 4

Standardizing End to End SSO Scenarios on SAML 1 Portal SAML Identity Provider SAP NetWeaver Portal or CE 7.1 1. Integrated User Authentication against Portal Web Service Provider SAP NetWeaver AS ABAP Initial User Authentication Any Supported Solution e.g. SPNego for Windows integrated authentication SSO for Web browser applications SAML Browser/Artifact Profile SSO for Web Services WSS SAML Token Profile 2 2. SSO with SAML Browser Artifact Synchronize User Identities Synchronized for SSO with User Ids SAP for NetWeaver SSO via Identity IdM Management or User or User Mapping Mapping 3 3. Access to Resource with WSS SAML Token Profile Web Service Consumer SAP NetWeaver AS ABAP SAP 2008 Page 5

The Big Picture IBM/Lotus applications Microsoft based applications HR WebDynpro IdM other SAP Systems J2EE / EE 5 Application LTPA SSO SAP DSAPI Filter SAP ISAPI Filter or SSO22KerbMap SSO SSO UME (Web AS Java) SSO SSO User data SSO SAP NetWeaver Portal UME (Web AS Java) Create and modify users Use as user repository Synchronize user data Use as user repository KERB IdM / LDAP Directory SSO Authentication SAP 2008 Page 6

Agenda 1. Typical Authentication and SSO Scenarios in SOA 2. Windows Integration Authentication using Kerberos with SAP NetWeaver 3. Authentication with SAML 4. Single Sign-On using SAML Token Profile 5. Outlook SAP 2008 Page 7

In this Section: Focus on Windows Integrated Authentication The Big Picture IBM/Lotus applications Microsoft based applications HR WebDynpro IdM other SAP Systems J2EE / EE 5 Application LTPA SSO SAP DSAPI Filter SAP ISAPI Filter or SSO22KerbMap SSO SSO UME (Web AS Java) SSO SSO User data SSO SAP NetWeaver Portal UME (Web AS Java) KERB SSO Create and modify users Use as user repository Authentication Synchronize user data Use as user repository IdM / LDAP Directory Microsoft Active Directory and Windows Domain SAP 2008 / SAP TechEd 08 / SIM203 / Page 7 SAP 2008 Page 8

Kerberos for User Authentication in SAP NetWeaver SSO Process Domain Controller (KDC) 8. Username 7. Ticket verification and user ID resolution Intranet CRM 1. Initial logon in Domain 4. Kerberos Ticket Request 5. Kerberos Ticket Response 2. Call Portal URL Business Apps BI 3. Error 401 Req. Kerberos Ticket 6. Forward Kerberos Ticket 9. Resource Collaborate Other Authenticate once to Domain SAP 2008 Page 9 SSO Access to Information Content Available from Portal Server iviews

Enabling User Authentication with Kerberos on the SAP NetWeaver Portal: SPNegoLoginModule Integrated User Authentication from Browser to SAP NetWeaver AS Java/ Portal by natively leveraging Microsoft Windows credentials (Kerberos) for authentication Prerequisites Microsoft Windows domain Authentication of users is delegated to the Windows Domain Controller 1. User authenticates against Windows domain on his or her workstation 2. On portal access user s browser sends Kerberos Session Ticket to SAP NetWeaver AS Java or Portal 3. UME of AS Java/Portal resolves user id from User Principal Name in Windows Domain 4. Further user interactions with Portal and backend systems in iviews with SSO tickets 1. Windows domain Logon 2. Browser Sends windows credentials Active Directory / Windows domain controller 3. SPNego checks via JVM credentials against DC and UME resolves user id Typical deployment scenarios Intranet scenarios 4. SAP Logon Ticket issued SAP NetWeaver AS Java / Portal SAP 2008 Page 10

JAAS SPNego LoginModule: Authentication Flow on the Wire SAP 2008 Page 11

SPNego Use Cases SPNego can see application for authentication in many scenarios SAP NetWeaver Portal in intranet SAP NetWeaver Portal in intranet + external access with SSO tickets or SAML to Portal applications: Web Dynpro applications ABAP applications, e.g. SAP BW web reports, BSP pages, Integrated ITS (as of 6.40 onwards) Duet scenario for service-based access and SSO to SAP NetWeaver applications...and others Security considerations In the JVM 1.4.x versions, Kerberos tokens are only 56-bit encrypted Good passwords for the J2EE user account in AD are important for the security of the solution The Kerberos Key Table represents the J2EE engine s identity; Malicious users who obtain the Key Table can setup a phishing site by impersonating the J2EE engine Generate the Key Table with encryption type DES-CBC-MD5; do not use DES-CBC-CRC Keep the Key Table file in a safe place. Allow only <SID>adm and SAPService<SID> to access the Key Table In a high security environment, change the service user s password (and the Key Table) periodically SAP 2008 Page 12

SPNego Configuration Wizard 1 SAP Note #994791 Available scenarios: DB, ADS, multiple ADS as data source SUN JDK IBM JDK Launch the Wizard using: http://<server>:<port>/spnego SAP 2008 Page 13

SPNego Configuration Wizard 2 SAP 2008 Page 14

SPNego Configuration Wizard 3 Includes the test facility for the selected user resolution mode SAP 2008 Page 15

SPNego Configuration Wizard 4 Summary of configuration for confirmation SAP 2008 Page 16

Configuration on The Browser Clients Configuration on the browser clients Windows integrated authentication must be switched on NetWeaver AS host must be explicitly assigned to local intranet Automatic logon in intranet zone must be allowed SAP 2008 Page 17

Summary SPNego leverages the Kerberos security standard, which is a built-in capability of a Microsoft Windows user desktop environment, to securely authenticate users to SAP NetWeaver AS Java applications Prerequisites: SAP NetWeaver J2EE 6.40 SP15 or higher SAP NetWeaver 7.0 J2EE SP6 or higher SAP NetWeaver 7.1 Composition Environment SPNego enables integrated Windows authentication to the SAP NetWeaver Portal and AS Java Subsequent single sign-on (SSO) to SAP business applications in Portal, AS Java or AS ABAP, displayed in Portal iviews AS Java Configuration Wizard under application alias /spnego Useful SAP Notes: 968191 SPNego: Central Note 957666 Diagtool for Troubleshooting Security Configuration SAP 2008 Page 18

Agenda 1. Overview SOA Scenarios 2. Windows Integration Authentication using Kerberos with SAP NetWeaver 3. Authentication with SAML 3.1 Overview of SAML 3.2 SAML Browser/Artifact Profile 3.3 Configuration 4. Single Sign-On using SAML Token Profile 5. Outlook SAP 2008 Page 19

Benefits of Security Assertions Markup Language (SAML) Interoperable security solution to allow systems integration with great ease and minimal resources SAML can be used across different security domains (e.g. In a B2B scenario) Domain A SSO SSO Domain B SAML is a protocol for encoding security related information (assertions) into XML and exchanging this information in a request/response fashion Provides standard based mechanisms to exchange security information using SOAP, HTTP(s) SAML is an OASIS standard, which is widely adopted in the industry and vendor independent SAP 2008 Page 20

SAML Based Scenarios SAML Identity Provider SAML Service Provider Web Service based SSO SAML Token Profile Web Service Security Standard Web Browser based SSO SAML Browser/Artifact Profile SAML Standard 1. Authentication 2. Access to Resource Service Consumer SAP 2008 Page 21

Security Assertion Markup Language (SAML) Building Blocks Assertions: statements about a subject. This could be an authentication, attribute information, or authorization permissions Protocols: SAML defines request/response protocols for obtaining assertions Protocol Bindings: defines how SAML protocols map to transport and messaging protocols, e.g. SAML SOAP Binding Profiles Bindings Assertions and Protocol SAML Assertion Profiles: define how assertions, protocols, and bindings are combined for particular use cases SAP 2008 Page 22

SAML Assertion SAML Issuing Authorities produce Assertions in response to client requests. An SAML Assertion can consist of Authentication Statement: Piece of data that represents an act of authentication performed on a subject (user) by the SAML Issuing Authority Other Statements: Attribute Statement, Authorization Decision Statement SAML Assertion Authentication Statement Other Statements Other Statements SAP 2008 Page 23

SAML Request / Response SAML Identity Provider SOAP Envelope SOAP Header SOAP Body SAML Request SAML Identity Provider SOAP Envelope SOAP Header SOAP Body SAML Response Assertion Service Provider SAP 2008 Page 24

SAML Request / Response Request <samlp:request.. RequestID="ID563AD51D8FE16A713C4E 38C279492DDEDAB65A5A" xmlns:samlp="urn:oasis:names:tc:s AML:1.0:protocol"> <samlp:assertionartifact>aah7boow 79mDzbpq7B35WtLF4MP0rzC3J3BM16F+g m0elufkaaaaaaaa</samlp:assertiona rtifact> </samlp:request> Response <samlp:response InResponseTo="ID563AD51D8FE16A713C4E38C279492DDED AB65A5A".. ResponseID="ID67AB48DAFA08159A35AE6B4BAB109D8E0AF 063E9.. <saml:assertion AssertionID="ID9BB9590058FBC303414444F2D8D81C52D9 1D640B".. Issuer="www.samlssodemo.com".. <saml:authenticationstatement.. AuthenticationMethod="urn:ietf:rfc:1510"> <saml:subject> <saml:nameidentifier>saml_dest</saml:nameidentifi er> </saml:subject> </saml:authenticationstatement> </saml:assertion> </samlp:response> SAP 2008 Page 25

Agenda 1. Overview SOA Scenarios 2. Windows Integration Authentication using Kerberos with SAP NetWeaver 3. Authentication with SAML 3.1 Overview of SAML 3.2 SAML Browser/Artifact Profile 3.3 Configuration 4. Single Sign-On using SAML Token Profile 5. Outlook SAP 2008 Page 26

SAML Browser/Artifact Profile for Web SSO Source Web Site SAML Identity Provider SAML Service SAP NW Portal SAML Responder 3. SAML Assertion Request 4. SAML Response with Assertion Destination Web Site SAML Service Provider SAML Service Determine IdP based on SourceID provided with the Artifact Analyze Assertion Initial logon 1. Request for a Resource 2. Redirect URL + Artifact Resource ICF/SAML LoginModule Authenticate User ( User Mapping ) Service Consumer 5. Resource SAML Create Artifact and Assertion Service Determine SAML Artifact Receiver URL Artifact Receiver Redirect SAP 2008 Page 27

SAP Landscape Source Web Site SAML Identity Provider Destination Web Site SAML Service Provider SAML Service SAML Responder Resource SAP NetWeaver Portal ICF SAP NW ABAP SAML Login Module SAP NW Java SAML Service SAP NW Java Service Consumer Artifact Receiver SAP NW Java SAP 2008 Page 28

Agenda 1. Overview SOA Scenarios 2. Windows Integration Authentication using Kerberos with SAP NetWeaver 3. Authentication with SAML 3.1 Overview of SAML 3.2 SAML Browser/Artifact Profile 3.3 Configuration 4. Single Sign-On using SAML Token Profile 5. Outlook SAP 2008 Page 29

Configuration of SAML With NW Portal as Source Site Prerequisites: You have configured SSL request Source get assertion Destination NW AS ABAP or NW AS Java response Create a role with the action SAML Responder and assign it to the technical user that is used by the Destination Site to get the assertion Configuring NW AS ABAP or NW AS Java as Destination Site Maintain configuration data for the destination sites (SAML outbound partner definition) Create a system object for the NW AS ABAP and system alias Maintain Portal Content (e.g. iview) SAP 2008 Page 30

Maintain Configuration Data for the Destination Sites (SAML Outbound Partner Definition) NWA: Configuration Management Infrastructure Trusted Systems- SAML Browser/Artifact Profile Outbound Partners SAP 2008 Page 31

Create a System Object for the NW AS ABAP and System Alias Portal: System Administration System Configuration New Property: SAML Partnername New Logon Method value: SAML Browser/Artifact SAP 2008 Page 32

Configuration of SAML With NW AS ABAP as Destination Site Prerequisites: You have configured SSL Source request get assertion HTTPS 1 2 3 NW AS Java RFC 4 Destination NW AS ABAP Configuring the Portal as a SAML Source Site response HTTPS Establishing a Connection between AS ABAP and AS Java (RFC) 5 Configuring AS Java as a SAML Destination Site (Partner Inbound) Activating SAML for Resources in the AS ABAP (SAML Login Module) Mapping SAML Principals to AS ABAP User ID s (VUSREXTID) SAP 2008 Page 33

Configuring AS Java as a SAML Destination Site (Partner Inbound) NWA: Configuration Management Infrastructure Trusted Systems- SAML Browser/Artifact Profile Inbound Partners SAP 2008 Page 34

Activating SAML for Resources in the AS ABAP (SAML Login Module) Transaction SICF: Logon Procedure: Alternative Logon Procedure Logon Procedure: SAML Authentication Maintain RFC Destination on AS ABAP SAP 2008 Page 35

Mapping SAML Principals to AS ABAP User ID s (VUSREXTID) Transaction SM30: VUSREXTID New External ID type: SA for SAML NameIdentifier SAP 2008 Page 36

Configuration of SAML With NW AS Java as Destination Site Prerequisites: You have configured SSL request Source get assertion Destination NW AS Java response Configuring the Portal as a SAML Source Site Configuring AS Java as a SAML Destination Site (Partner Inbound) Adjust login module stack SAP 2008 Page 37

Support of SAML Browser/Artifact Profile Support for the SAML Browser/Artifact Profile as Destination Site Functionality NW04 NW 7.00 NW >=7.10 SAML Browser/Artifact Profile Java X X X SAML Browser/Artifact Profile - ABAP - - X Support for the SAML Browser/Artifact Profile as Source Site Functionality NW04 NW 7.00 NW >=7.10 SAML Browser/Artifact Profile SAP NetWeaver Portal - - X SAP 2008 Page 38

Agenda 1. Overview SOA Scenarios 2. Windows Integration Authentication using Kerberos with SAP NetWeaver 3. Authentication with SAML 4. Single Sign-On using SAML Token Profile 4.1 Overview 4.2 Configuration 5. Outlook SAP 2008 Page 39

SAML Based Scenarios SAML Identity Provider SAML Service Provider Web Service based SSO SAML Token Profile Web Service Security Standard Web Browser based SSO SAML Browser/Artifact Profile SAML Standard 1. Authentication 2. Access to Resource Service Consumer SAP 2008 Page 40

WS-Security Overview The OASIS WS-Security Standard extends a SOAP message by one or more WS-Security Headers (wsse:security) which contains security information for each recipient This new SOAP Header contains all relevant security metadata to secure a SOAP message, such as Security Tokens to carry security information (e.g. user authentication data, X.509 certificates) A Timestamp to protect against Replay Attacks Signatures to protect against message tampering* Encrypted Keys and Data to protect confidential information Single Sign-On is provided by using e.g. SAML Security Tokens * The act of altering something secretly or improperly SOAP Envelope SOAP Header WS-Security Header SOAP Body Data Security Token Timestamp Signature Encrypted Key + Data SAP 2008 Page 41

Relationship between WS Security SAML Token Profile and the SAML Standard SAML WS-Security SOAP Message Security Profiles SAML Confirmation Methods Username Token Profile... SAML Token Profile Bindings Assertions and Protocol SAML Assertions Authentication, Attribute and Authorization Information references SAP 2008 Page 42

SAML Token Profile A Short Primer The SAML Token Profile defines the use of SAML Assertions as Security Tokens in the WS-Security Header The SAML Token is used by the service provider to authenticate the user based on the identity information in the SAML Assertion in incoming requests from service consumers SAML Assertion Authentication Statement SOAP Envelope SOAP Header WS-Security SAML Token SOAP Body Data SAP 2008 Page 43

Web Services SSO with SAML General Message Exchange 1. Web Service (WS) Consumer authenticates at the Token Issuer (Security Token Service, STS) and requests a SAML Token 2. Token Issuer authenticates the User and issues a SAML Token to the WS Consumer 3. WS Consumer uses the SAML Token for authentication at the WS Provider 4. WS Provider must trust the assertion in the SAML Token to authenticate the WS Consumer and sends back the response 1 Web Service Consumer 2 Token Issuer (STS) 3 4 SOAP Envelope SOAP Header WS-Security SAML Token Web Service Provider SOAP Body The SAML Token profile addresses two major questions: How can the SAML assertions be bound to the SOAP message so that the service provider can be sure that they belong together? How can the service provider be sure that the sender of the message is really the subject in the assertion? SAP 2008 Page 44 Data

Confirmation of the Subject Identity SAML Confirmation Methods Overview Sender-Vouches: Basis of trust is the WS Consumer s certificate Web Service Consumer Web Service Provider Sender-Vouches (SV) Subject Confirmation Method SAP 2008 Page 45 Token Issuer (STS) The WS Consumer cryptographically binds the assertion to the body of the SOAP message by signing both with its private key The WS Provider compares the identity information from the message signature with the subject information in the assertion Holder-of-Key (HoK) Subject Confirmation Method Holder-of-Key: Basis of trust is the Token Issuer s certificate The assertion holds a key that is used by the WS Consumer to cryptographically bind (sign) the assertion and the body of the SOAP message The WS Provider uses the same key to verify the signature. The subject in the assertion is the party that can demonstrate that it is the holder of the key

Benefits of WS-Security WS Consumer End-to-End security WS Provider WS-Security The Reverse Proxy terminates the SSL connection between WS Consumer and WS Provider Reverse Proxy DMZ SSL Only Point-to- Point security SAP 2008 Page 46

SAML Token Profile: WS-Security Header Example of SAML Token Profile Usage <wsse:security> <saml:assertion AssertionID="SAML_ID" Issuer="www.example.org"...> <saml:conditions NotBefore="..." NotOnOrAfter="..."/> <saml:authenticationstatement AuthenticationMethod="urn:...:password" AuthenticationInstant="2005-03-19T...Z" <saml:subject> <saml:nameidentifier>muellerthom2</saml:nameidentifier> <saml:subjectconfirmation> <saml:confirmationmethod> urn:oasis:names:tc:saml:1.0:cm:sender-vouches </saml:confirmationmethod> <ds:keyinfo>... </ds:keyinfo> </saml:subjectconfirmation> </saml:subject> </saml:authenticationstatement> <ds:signature> <ds:signedinfo>... <ds:reference URI="SAML_ID">... </ds:reference>... </ds:signedinfo> </ds:signature> </saml:assertion> </wsse:security> SAP 2008 Page 47

Agenda 1. Overview SOA Scenarios 2. Windows Integration Authentication using Kerberos with SAP NetWeaver 3. Authentication with SAML 4. Single Sign-On using SAML Token Profile 4.1 Overview 4.2 Configuration 5. Outlook SAP 2008 Page 48

Configuring SSO With SAML Token Profiles Configuring SAML Trust Connection between ABAP systems In the consumer system, start the Trust Manager In the system PSE, find the certificate of the consumer system that issues SAML assertions Export this system s certificate In the provider system import the consumer system s certificate WS Consumer export import system WS Provider STRUST SAP 2008 Page 49

Configuring SSO With SAML Token Profiles Enabling SSO with SAML Token Profile Configure a WS service endpoint for providing a Web Service Configure a WS port for consuming a Web Service WS Consumer WS port Maintain User Mapping User Mapping SOAMANAGER WS service endpoint WS Provider SE38 - RSUSREXTID SAP 2008 Page 50

Configure a WS Service Endpoint for Providing a Web Service Transaction: SOAMANAGER Application and Scenario Communication Single Service Administration: Service Configuration SAP 2008 Page 51

Configure a WS Port for Consuming a Web Service Transaction: SOAMANAGER Application and Scenario Communication Single Service Administration: Consumer Proxy Configuration SAP 2008 Page 52

Maintain User Mapping Transaction SE38 : RSUSREXTID SAP 2008 Page 53

Support of WS Security with the SAP NetWeaver Platform Support for the SAML-Token Profile for Web Services Functionality NW04 NW 7.00 NW >=7.10 WSS SAML Token Profile - Java - - X WSS SAML Token Profile - ABAP - X X Support for the XML Signature/ XML Encryption for Web Services Functionality NW04 NW 7.00 NW >=7.10 XML Signature/ XML Encryption Java - x x XML Signature/ XML Encryption ABAP - x X SAP 2008 Page 54

Agenda 1. Overview SOA Scenarios 2. Windows Integration Authentication using Kerberos with SAP NetWeaver 3. Authentication with SAML 4. Single Sign-On using SAML Token Profile 5. Outlook SAP 2008 Page 55

SSO in the SAP NetWeaver Roadmap Role & Authorization Mgmt. Identity Management Enterprise SOA and Standards Security Management Meta-roles definition and assignment Central Identity Management for heterogeneous landscapes Standards-based principal propagation Enhanced support for WS-* standards Harmonization of security administration Role management simplification and TCO reduction Business process integrated identity management Standards-based single sign-on infrastructure (SAML) Identity federation support (SAMLv2) Add. WS-* standards (WS-Sec.Conversation, WS-Trust) Centralized policybased security administration Trust Configuration using X.509 System Harmonized Certificates authorization concepts Secure Single Sign On and Single Log Out for Trusted Systems in Heterogeneous Business role Landscapes management User Mapping, Account Linking and Identity Federation from Extended Authentication SOA scenario support Protocols Model driven security management SAP 2008 Page 56 2007/2008 2010 and beyond 2009

Copyright 2008 SAP AG All Rights Reserved No part of this publication may be reproduced or transmitted in any form or for any purpose without the express permission of SAP AG. The information contained herein may be changed without prior notice. Some software products marketed by SAP AG and its distributors contain proprietary software components of other software vendors. SAP, R/3, xapps, xapp, SAP NetWeaver, Duet, SAP Business ByDesign, ByDesign, PartnerEdge and other SAP products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of SAP AG in Germany and in several other countries all over the world. All other product and service names mentioned and associated logos displayed are the trademarks of their respective companies. Data contained in this document serves informational purposes only. National product specifications may vary. The information in this document is proprietary to SAP. No part of this document may be reproduced, copied, or transmitted in any form or for any purpose without the express prior written permission of SAP AG. This document is a preliminary version and not subject to your license agreement or any other agreement with SAP. This document contains only intended strategies, developments, and functionalities of the SAP product and is not intended to be binding upon SAP to any particular course of business, product strategy, and/or development. Please note that this document is subject to change and may be changed by SAP at any time without notice. SAP assumes no responsibility for errors or omissions in this document. SAP does not warrant the accuracy or completeness of the information, text, graphics, links, or other items contained within this material. This document is provided without a warranty of any kind, either express or implied, including but not limited to the implied warranties of merchantability, fitness for a particular purpose, or non-infringement. SAP shall have no liability for damages of any kind including without limitation direct, special, indirect, or consequential damages that may result from the use of these materials. This limitation shall not apply in cases of intent or gross negligence. The statutory liability for personal injury and defective products is not affected. SAP has no control over the information that you may access through the use of hot links contained in these materials and does not endorse your use of third-party Web pages nor provide any warranty whatsoever relating to third-party Web pages. Weitergabe und Vervielfältigung dieser Publikation oder von Teilen daraus sind, zu welchem Zweck und in welcher Form auch immer, ohne die ausdrückliche schriftliche Genehmigung durch SAP AG nicht gestattet. In dieser Publikation enthaltene Informationen können ohne vorherige Ankündigung geändert werden. Einige von der SAP AG und deren Vertriebspartnern vertriebene Softwareprodukte können Softwarekomponenten umfassen, die Eigentum anderer Softwarehersteller sind. SAP, R/3, xapps, xapp, SAP NetWeaver, Duet, SAP Business ByDesign, ByDesign, PartnerEdge und andere in diesem Dokument erwähnte SAP-Produkte und Services sowie die dazugehörigen Logos sind Marken oder eingetragene Marken der SAP AG in Deutschland und in mehreren anderen Ländern weltweit. Alle anderen in diesem Dokument erwähnten Namen von Produkten und Services sowie die damit verbundenen Firmenlogos sind Marken der jeweiligen Unternehmen. Die Angaben im Text sind unverbindlich und dienen lediglich zu Informationszwecken. Produkte können länderspezifische Unterschiede aufweisen. Die in dieser Publikation enthaltene Information ist Eigentum der SAP. Weitergabe und Vervielfältigung dieser Publikation oder von Teilen daraus sind, zu welchem Zweck und in welcher Form auch immer, nur mit ausdrücklicher schriftlicher Genehmigung durch SAP AG gestattet. Bei dieser Publikation handelt es sich um eine vorläufige Version, die nicht Ihrem gültigen Lizenzvertrag oder anderen Vereinbarungen mit SAP unterliegt. Diese Publikation enthält nur vorgesehene Strategien, Entwicklungen und Funktionen des SAP -Produkts. SAP entsteht aus dieser Publikation keine Verpflichtung zu einer bestimmten Geschäfts- oder Produktstrategie und/oder bestimmten Entwicklungen. Diese Publikation kann von SAP jederzeit ohne vorherige Ankündigung geändert werden. SAP übernimmt keine Haftung für Fehler oder Auslassungen in dieser Publikation. Des Weiteren übernimmt SAP keine Garantie für die Exaktheit oder Vollständigkeit der Informationen, Texte, Grafiken, Links und sonstigen in dieser Publikation enthaltenen Elementen. Diese Publikation wird ohne jegliche Gewähr, weder ausdrücklich noch stillschweigend, bereitgestellt. Dies gilt u. a., aber nicht ausschließlich, hinsichtlich der Gewährleistung der Marktgängigkeit und der Eignung für einen bestimmten Zweck sowie für die Gewährleistung der Nichtverletzung geltenden Rechts. SAP haftet nicht für entstandene Schäden. Dies gilt u. a. und uneingeschränkt für konkrete, besondere und mittelbare Schäden oder Folgeschäden, die aus der Nutzung dieser Materialien entstehen können. Diese Einschränkung gilt nicht bei Vorsatz oder grober Fahrlässigkeit. Die gesetzliche Haftung bei Personenschäden oder Produkthaftung bleibt unberührt. Die Informationen, auf die Sie möglicherweise über die in diesem Material enthaltenen Hotlinks zugreifen, unterliegen nicht dem Einfluss von SAP, und SAP unterstützt nicht die Nutzung von Internetseiten Dritter durch Sie und gibt keinerlei Gewährleistungen oder Zusagen über Internetseiten Dritter ab. Alle Rechte vorbehalten. SAP 2008 Page 57