Configuring Attribute Mapping for the ABAP User ID 
If users have different IDs in the LDAP directory and in the connected ABAP systems, the J2EE user management must be configured to use ABAP user IDs from the LDAP directory. You can use an existing attribute in your LDAP directory to store the users’ ABAP user IDs. As a result, administrators or users do not have to define user mapping for each user.
Caution
The ABAP user IDs are stored in the LDAP directory in unencrypted form. To prevent manipulation of these IDs, you must make sure that no unauthorized users have write-access to the LDAP directory, in particular to the attribute containing the ABAP user ID.
If these IDs are manipulated, users' logon tickets could contain a different user ID. Thus a malicious user could gain access to ABAP systems as a different user with more extensive authorizations in the ABAP system.
You are using an LDAP directory as a data source. In the LDAP directory, one of the user attributes is defined to contain the user’s ABAP user ID.
Note
The LDAP object class that contains the user attribute for the ABAP user ID must already be assigned to the users, otherwise you cannot save user mapping data for users.
Choose the Data Sources tab.
Choose Data Source and download the configuration file you have selected with the file download function.
Open the data source configuration file in an editor and change it as follows:
Note
The REFERENCE_SYSTEM_USER attribute appears twice in the XML file. You must check the first appearance of this attribute and change the attribute name in the second appearance.
Check that the logical user attribute REFERENCE_SYSTEM_USER is in the <responsibleFor> section of the LDAP data source:
Example
...
<dataSources>
...
<dataSource id="CORP_LDAP" ...>
...
<responsibleFor>
...
<principal type="user">
...
<nameSpace name="$usermapping$">
<attributes>
<attribute name="REFERENCE_SYSTEM_USER"/>
</attributes>
</nameSpace>
...
</principal>
...
</responsibleFor>
...
</dataSource>
</dataSources>
Define the attribute mapping from the logical attribute REFERENCE_SYSTEM_USER to the physical attribute that actually stores the ABAP user ID in your LDAP directory.
Example
...
<dataSources>
...
<dataSource id="CORP_LDAP" ...>
...
<attributeMapping>
<principals>
...
<principal type="user">
...
<nameSpace name="$usermapping$">
<attributes>
<attribute name="REFERENCE_SYSTEM_USER">
<physicalAttribute name="r3user"/>
</attribute>
</attributes>
</nameSpace>
...
</principal>
</principals>
</attributeMapping>
...
</dataSource>
</dataSources>
Optional: If the attribute for the ABAP user ID is in an additional object class, declare this object class in the data source configuration.
Note
When you use the User Management Engine to create a user, this object class is assigned to the new user. However, you should make sure that existing users in the LDAP directory are already assigned this object class.
Example
In the following example, the sapuser object class contains the r3user attribute, which contains the user's ABAP user ID.
...
<dataSources>
...
<dataSource id="CORP_LDAP" ...>
...
<privateSection>
...
<ume.ldap.access.auxiliary_objectclass.user>
sapuser
</ume.ldap.access.auxiliary_objectclass.user>
...
</privateSection>
</dataSource>
</dataSources>
Upload the modified configuration file on the Data Source tab page.
Change the UME properties listed below:
ume.usermapping.refsys.mapping.type = attribute.
This property defines that the UME gets the user's ABAP user ID from the LDAP directory in the logical user attribute REFERENCE_SYSTEM_USER.
ume.r3.mastersystem = UME Internal Reference System
This property is set to allow users to access all ABAP systems in which they have the same user ID as in the ABAP central instance of the Enterprise Search appliance using logon tickets.
Optionally, you can also change the property ume.usermapping.admin.pwdprotection.
This property defines whether administrators have to enter a password when they change a user’s user mapping data.
Proceed as outlined in Editing UME Properties in the SAP NetWeaver 7.0 documentation.