User Authentication and Single Sign-On
Authentication on the SAP Web Application Server ABAP
Using Logon Tickets
Configuring the System for Issuing Logon Tickets
Obtaining a Certificate Signed by the SAP CA
Using a Self-Signed Certificate
Changing from a Self-Signed Certificate to a Certificate Signed
Configuring the System to Accept Logon Tickets
Configuring SAP Web AS ABAP to Accept Logon Tickets from Another
Configuring SAP Web AS ABAP to Accept Logon Tickets from the J2E
Protecting User Information
Using X.509 Client Certificates
Configuring the System for Using X.509 Client Certificates
Pluggable Authentication Services for External Authentication
Authentication Mechanisms Supported by the PAS
Authentication Using Windows NTLM
Verifying User ID/Password on the Windows NT Domain Controller
Authentication Using X.509 Client Certificates
Authentication Using an LDAP Bind to a Directory Server
Authentication Using an Arbitrary Mechanism on the Web Server
Authentication Using a Mechanism Provided by a Partner
Prerequisites for Using PAS
Logon Tickets
Prerequisites for Using Windows NTLM Authentication
Prerequisites for Verifying Users on the Domain Controller
Prerequisites for Using X.509 Client Certificates
Prerequisites for Using an LDAP Bind to a Directory Server
Prerequisites for Using an Arbitrary Mechanism on the Web Server
Prerequisites for Using a Partner Mechanism
Secure Network Communications
Configuring the PAS
Configuring the Use of Logon Tickets
Configuring Windows NTLM Authentication on the Web Server
Configuring SNC
Configuring SNC on the Application Server
Configuring SNC on the AGate
Configuring SNC on the WGate
Installing the PAS
Configuring the PAS Service File
Examples
Specifying the HTTP Header Variable to Use
Maintaining the User Mapping in the SAP System
Configuring the PAS for Providing the SAP User ID Directly
Testing the Configuration
Testing the Configuration Using the ITS Administration Tool
Testing the Use of SNC
Testing Logon Tickets and PAS
Checking the HTTP Header Variable
Sample Trace File: SNC Initialization
Sample Trace File (AGate): Successful PAS Authentication Using N
Sample Trace File (AGate): SAP User ID not Found
Authentication on the J2EE Engine
Declarative and Programmatic Authentication
Login Modules and Login Module Stacks
Login Modules
Login Module Stacks
Managing Login Modules
Managing Policy Configurations
Authentication Schemes
Authentication Scheme
Changing the authschemes.xml File
Defining an Authentication Scheme
Defining References to Authentication Schemes
Assigning an Authentication Scheme to an iView
Authentication Schemes Shipped with SAP NetWeaver AS Java
Configuring Authentication Mechanisms
Using Basic Authentication (User ID and Password)
Using Client Certificates for User Authentication
Configuring the Use of Client Certificates for Authentication
Configuring the Use of Client Certificates via an Intermediary S
Login Module Stack for Client Certificate Authentication
Maintaining the User's Certificate Information
Attribute Mapping for Client Certificates
Using Security Session IDs for Single Sign-On Between Applicatio
Using Logon Tickets for Single Sign-On
Configuring the Use of Logon Tickets
Adjusting the Login Module Stacks for Using Logon Tickets
Sample Login Module Stacks for Using Logon Tickets
Specifying the J2EE Engine Client to Use for Logon Tickets
Replacing the Public-Key Certificate to Use for Logon Tickets
Configuring the J2EE Engine to Accept Logon Tickets
Testing the Use of Logon Tickets
Changing the Login Module Options for Creating Logon Tickets
Configuring SAP Web AS ABAP to Accept Logon Tickets from the J2E
Using Single Sign-On with Resource Adapters
Using Header Variables or Integrated Windows Authentication for
Adjusting the Login Module Stacks for Using Header Variables
Configuring Integrated Windows Authentication in the Portal
Installing the IisProxy Module
Testing the IisProxy Module
Configuring the IIS for Integrated Windows Authentication
Adjusting the Login Module Stacks
Using Integrated Windows and User ID/Password Authentication
Using SAML Assertions for Single Sign-On
Mapping SAML Principals to SAP J2EE Engine User IDs
Configuring the Use of SAML
Configuring the SAML Parameters
Adjusting the Login Module Stacks for Using SAML
Accessing an Application that Accepts SAML Assertions
Changing the Startup Mode for the SAML Service
The SAML Test Application
Setting Up the SAML Test Application
Using the SAML Test Application
Outbound Partner Parameters Used by the Test Application
Example SAML Mapping Module Used by the SAML Test Application
Using Anonymous Logon to Access the Portal
Configuring Anonymous Logon with Named Anonymous Users
Authentication on the Portal
Single Sign-On in a Complex System Landscape
Scenario: SSO Between Portal, Web Dynpro, and ABAP Systems
Testing That Web Dynpro System Accepts Tickets From Portal
Testing Single Sign-On Between the Portal and the ABAP System
Single Sign-On to Non-SAP Systems and Applications
Using Authentication When Developing Applications on the J2EE En
Authentication for Web Applications Users on the J2EE Engine
Overview of the Login Process in JAAS
Using Login Modules to Protect Web Applications
Example Login Module
Create and Configure a Login Module
Creating a New Java Project
Implementing the Login Module
Setting the Classpath and Compiling the Java Project
Exporting the Login Module Class in a JAR File
Creating a New Library Project
Making Reference to the Security Provider Service
Setting the Classpath to the JAR of the Login Module
Making Reference to the JAR File
Building SDA File
Deploying the SDA to the J2EE Engine
Configuring the Login Module on the J2EE Engine
Configuring the Login Module Usage
Adding a Reference to the Classloader of the Security Provider
Configuring an Application to Use the Login Module
Example Login Module
Login Modules Over HTTP
SAP Specific HTTP Callbacks
Using the HTTP Callback Classes
Changing the User Password
Single Sign-on for J2EE Web Applications
Propagation of Security Principals to Other Containers on the J2
Remote Authentication
Security Sessions
Obtaining the Current Security Session