Configuring Authentication and Single Sign-On
Authentication Concepts
Authentication for Web Based Access
Anonymous Logon
Basic Authentication (User ID and Password)
Logon Tickets
X.509 Client Certificates
SAML Assertions
Kerberos Authentication
Header Variables
Authentication for Web Services
HTTP Transport Level Authentication
SOAP Message Level Authentication
Authentication for Communication between Systems
Authentication Infrastructure
AS Java Authentication Infrastructure
Declarative and Programmatic Authentication
Login Modules
Managing Login Modules
Policy Configurations and Authentication Stacks
Managing Authentication Policy for AS Java Components
User Mapping and the AS Java
Portal Authentication Infrastructure
Authentication Schemes
Changing the authschemes.xml File
Defining an Authentication Scheme
Defining References to Authentication Schemes
Assigning an Authentication Scheme to an iView
User Mapping and the Portal
Single Sign-On to Back-End ABAP Systems
Using an LDAP Directory for User Mapping with Tickets for SSO
Example: User Mapping with LDAP and Tickets
Integration in Single Sign-On (SSO) Environments
Single Sign-On for Web-Based Access
Using Anonymous Logon to Access the Portal
Configuring Anonymous Logon with Named Anonymous Users
Using User ID and Password Authentication
Logon Using User ID and Password on the AS Java
Configuring User Mapping with User ID and Password on an AS Java
Logon Using User ID and Password on the Portal
Configuring User Mapping with User ID and Password on a Portal
Accessing Back-End Systems with a Different User ID
Configuring User Mappings on the Behalf of Users
Mapping Users: User Enters Own Data
Configuring a Reference System for User Mapping
Using Logon Tickets
Using Logon Tickets with AS Java
Configuring the AS Java to Issue Logon Tickets
Specifying the Client to Use for Logon Tickets
Replacing the Key Pair to Use for Logon Tickets
Configuring the AS Java to Accept Logon Tickets
Manual AS Java Configuration for Accepting Logon Tickets
Testing the Use of Logon Tickets
Sample Login Module Stacks for Using Logon Tickets
Using Logon Tickets with the Portal
Configuring the Portal for SSO with Logon Tickets
Configuring Component Systems to Accept Portal Logon Tickets
Using Transaction STRUSTSSO2 in SAP System >= 4.6C
Importing Portal Certificate into SAP System >= 4.6C
Importing Portal Certificate into SAP System < 4.6C
Using More Than One Portal
Logon Tickets for Multiple Domains
How it Works
Configuring Logon Tickets for Multiple Domains
Configuring User Mapping with Tickets for SSO
Using an LDAP Directory for User Mapping with Tickets for SSO
Configuring User Mappings on the Behalf of Users
Using X.509 Client Certificates on the AS Java
Configuring the Use of Client Certificates for Authentication
Modifying Client Certificate Authentication Options
Using Stored Certificate Mappings
Maintaining the User's Certificate Information
Maintaining Certificate Mappings Automatically
Using Rules Based on Client Certificate Subject Names
Using Rules Based on Client Certificate V3 Extensions
Defining Rules for Filtering Client Certificates
Using Client Certificates via an Intermediary Server
Enabling Certificate Revocation
How the Certificate Check Revocation Service Works
Modifying Additional Settings
Checking Certificates Manually
Removing or Updating CRL Cache Entries
Using SAML Browser Artifacts
Configuring AS Java as a SAML Destination Site
Adjusting the Login Module Stacks for Using SAML
Using SAP NetWeaver for a SAML Source Site
Changing the Startup Mode for the SAML Service
Configuring the Portal as a SAML Source Site
Accessing an Application that Accepts SAML Assertions
Integrating a SAML-Enabled Application in the Portal
Example: Accessing Web Dynpro Application in a Portal Using SAML
The SAML Test Application
Setting Up the SAML Test Application
Using the SAML Test Application
SAML Parameters
Inbound Partner Parameters
Outbound Partner Parameters
General SAML Settings
Using Kerberos Authentication
Key Distribution Center Configuration
Configuring the UME
Configuring the UME when Using ADS Data Sources for Kerberos
Configuring the UME when Using Non-ADS Data Sources
Wizard-based Configuration for Kerberos Authentication
Step 1: Prerequisites
Step 2: Kerberos Realm
Step 3: Resolution Mode
Step 4: Policy Configuration
Step 5: Confirmation
Troubleshooting
Accessing AS Java with Kerberos Authentication
Using Header Variables
Single Sign-On for Web Services
Using Transport Level Authentication
Configuring Transport Authentication with User ID/Password
Configuring Transport Authentication with X.509 Certificates
Configuring Transport Authentication with Assertion Tickets
Using Message Level Authentication
Configuring the UsernameToken Profile with HTTPS (AS Java)
Configuring SSO with X.509 Certificate Token Profiles
Configuring SSO with SAML Token Profiles
Subject Confirmation Methods for SAML Token Profiles
Configuring Trusted Partners and Attesters for SAML
Enabling SSO with SAML Token Profile
Using Strong Message Authentication
Single Sign-On for Interaction Between Systems
Single Sign-On for Java Remote Method Invocation
Authentication for RMI-P4 Clients
Using P4 Protocol Over a Secure Connection
Security for RMI-IIOP Applications
Configuring the AS Java for IIOP Security
Single Sign-On for Resource Adapters and JCA