As an alternative to authenticating with a user ID and passwords, users can present X.509 client certificates for accessing Web applications. In this case, user authentication takes place using the underlying Secure Sockets Layer (SSL) protocol and users do not need to interactively enter a password for logon.
For an overview of the authentication process flow when using X.509 certificates, see the figure below.
Authentication with X.509 certificates uses a Public Key Infrastructure (PKI) to securely authenticate users. After users receive their X.509 certificates from a certificate issuing Certification Authority (CA), they can use them to securely access SAP NetWeaver, as well as non-SAP systems. The SAP NetWeaver and the non-SAP system can authorize access requests, based on an established trust relationship with the CA.
In addition, users can use their X.509 certificates to authenticate their access to systems located on the Internet and within your company Intranet. Thereby, you can use certificates for authentication in open environments such as the Internet.
SAP Single Sign-On can issue X.509 certificates. SAP Single Sign-On includes a PKI infrastructure specially made for the requirements of SAP systems.
You have deployed a public key infrastructure to support issuing public key certificates to users.
X.509 certificates use industry standard cryptographic mechanisms to securely authenticate user access. The exchange of the authentication credentials between the front-end Web client and the SAP or non-SAP system is secured through the use of public key cryptography and the underlying SSL protocol. For additional security, you can also enable mutual authentication, where both the front-end client and the back-end application server exchange X.509 certificates to mutually establish their identities.
When using X.509 client certificates and SSL for user authentication, note the following:
When using authentication with client certificates, each user needs to possess a key pair, consisting of a public and a private key. The public key is contained in the X.509 client certificate and can be made public. However, the user's private key needs to be kept safe.
The possibilities available for securing the private key depend on the Web browser that you use. (For example, you may be able to protect it with a password or you may be able to use smart cards.) If the private key is stored on the front-end client, your users should use screensavers protected with a password.
As long as the operating system separates and protects user data at the operating system level (for example, Windows NT), then the private key stored on the Web front-end client is protected by the operating system.
We recommend that you do not store the private key on the Web client frontend when using an operating system that does not separate user data (for example, Windows 95).