Preview

Principle Propogation in Sap Netweaver

Good Essays
Open Document
Open Document
7071 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Principle Propogation in Sap Netweaver
SAP NetWeaver
Process Integration 7.1
Principal Propagation in SAP NetWeaver
Process Integration 7.1

SAP Regional Implementation Group
SAP NetWeaver Product Management
December 2007

SAP NetWeaver Process Integration 7.1

1

Agenda

1.
2.
3.
4.

Introduction
Principal Propagation for SAP NW 7.0
Web Service Security and SAML
Principal Propagation for SAP NW 7.1

SAP NetWeaver Process Integration 7.1

2

Agenda

1.
2.
3.
4.

Introduction
Principal Propagation for SAP NW 7.0
Web Service Security and SAML
Principal Propagation for SAP NW 7.1

SAP NetWeaver Process Integration 7.1

3

Principal Propagation Concept
Goal:
Securely pass the identity of user ‘U’ across SAP PI to receiver system Run the receiver application under the same identity as the sender application Benefits:
Dynamic configuration at the PI receiver channel
Permissions of the receiver application are checked against the original user
User can be audited in receiver system
Sender System
Sender
Application

Receiver System
M

PI

M

User
U

Receiver
Application
User
U

Authentication as of today, exemplarily shown with XI 3.0 protocol
– Communication paths are statically configured in the following sense:
-

Sender to IS: For Java proxies, an XI internally configured connection is always used. For ABAP proxies, the communication path is configured globally as an SM59 HTTP destination where the credentials (user/password or certificate) are usually stored within the destination. Nevertheless, it is possible to configure the destination as using the actual application user for logging into the IS.

-

IS to receiver: In the XI directory, a set of receiver channels with static connection attributes and user credentials similar to SM59 destinations are configured. However, in each channel user credentials must be defined for logging into the receiver system. On message execution, a certain channel is
dynamically

You May Also Find These Documents Helpful

  • Satisfactory Essays

    -In reference to previous network plan U1A1 GPO and AD will be created and upheld for the internal network. GPO will be in place to provide username and password security policy for external network users. (System/Application Domain)…

    • 565 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Bcom275 Week 1

    • 443 Words
    • 2 Pages

    What channel was used to send the message? In this instance, the misunderstanding was due to the lack of communication.…

    • 443 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt1310 Unit 8 Lab 1

    • 421 Words
    • 2 Pages

    10. Single sign-on (SSO) is a property of access control of multiple related, but independent software systems. With this property a user logs in once and gains access to all systems without being prompted to log in again at each of them. Microsoft SharePoint Server…

    • 421 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    lab 4

    • 527 Words
    • 3 Pages

    1. Automatically chooses the MDI or MDIX configuration to properly match the other end of the link.…

    • 527 Words
    • 3 Pages
    Good Essays
  • Good Essays

    It260 Midterm Study Guide

    • 629 Words
    • 3 Pages

    12 – IIS7 supports several authentication methods. Of these, the only method that is integrated into an IIS7…

    • 629 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    This layer makes sure that information sent by one application layer protocol from a remote system is readable by another application layer protocol in a…

    • 426 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    | No incoming messages except from the user who can open and close the door…

    • 287 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    The ____ defines an interface that applications can use to request network services, rather than referring directly to applications themselves.…

    • 694 Words
    • 3 Pages
    Powerful Essays
  • Better Essays

    The current environment, for Riordan 's departments, is requiring increased labor in order to process information. The slow consolidation of the operational processes of two divisions with different operation software has become a financial threat to Riordan Manufacturing. Each of the divisions lacks modern technology that is needed to run a highly efficient corporation. Therefore, there is not enough information being shared between customers, sales, finance, manufacturing, and management. The upgrades will make their performance consistent with more rapidly and more efficient company locations; corporate headquarters, and China. Finally, there is a need to alleviate the duplication of data entry by establishing compatibility of systems between each of the locations. This condition was recognized as a problem area in the receiving, inventory management, and financial management, shipping, and customer relations management functionalities.…

    • 3678 Words
    • 15 Pages
    Better Essays
  • Good Essays

    Understanding a SIP Trunk

    • 511 Words
    • 3 Pages

    References: [RFC4458] Jennings, C., Audet, F., and J. Elwell, "Session Initiation Protocol (SIP) URIs for Applications such as Voicemail and Interactive Voice Response (IVR)", RFC 4458, April 2006.…

    • 511 Words
    • 3 Pages
    Good Essays
  • Better Essays

    The fifth stage is message decoded the receiver now has to interpret your message, e.g. what…

    • 1116 Words
    • 5 Pages
    Better Essays
  • Good Essays

    it can also transfer files using the associated Secure FTP (SFTP) or Secure Copy (SCP) protocols.…

    • 2464 Words
    • 15 Pages
    Good Essays
  • Powerful Essays

    The session initiation protocol has elements that incorporate user agents that can function in two ways. First, the user agent client can produce requests and transmit them to the servers. Secondly, the user agent server receives the request, handles them and produces the responses. So in…

    • 2044 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    The ‘C-DOT Access Network - Rax’ (AN-RAX) will provide the second level of remoting. AN-RAX might be connected to a RSU or directly to the Local Exchange (LE). The AN-RAX supports V 5.2 protocol, and handles the functionality of second level of remoting.…

    • 1993 Words
    • 8 Pages
    Powerful Essays
  • Powerful Essays

    Erp Ntpc

    • 2549 Words
    • 11 Pages

    NTPC Limited (formerly National Thermal Power Corporation) (BSE: 532555 , NSE: NTPC) is the largest Indian state-owned electric utilities company based in New Delhi, India. It is listed in Forbes Global 2000 for 2011 ranked it 348th in the world. It is an Indian public sector company listed on the Bombay Stock Exchange in which at present the Government of India holds 84.5% (after divestment the stake by Indian government on 19 October 2009) of its equity. With a…

    • 2549 Words
    • 11 Pages
    Powerful Essays