User Authentication and Single Sign-On
SAP NetWeaver Single Sign-On
Authentication on the AS ABAP
Using Logon Tickets
Configuring the System for Issuing Logon Tickets
Configuring the System to Accept Logon Tickets
Configuring SAP Web AS ABAP to Accept Logon Tickets from Another
Configuring SAP Web AS ABAP to Accept Logon Tickets from the J2E
Protecting User Information
Using X.509 Client Certificates
Configuring the System for Using X.509 Client Certificates
Using SAP Passports Provided by the SAP Trust Center Service
Configuring the System to Use the SAP Trust Center Service
Assigning Users an Existing Certificate for Single Sign-On with
Authentication for Web Services
HTTP Transport Level Authentication
SOAP Message Level Authentication
SAML Token Profile
WS Security UsernameToken
X.509 Certificate Token Profile
Using SAML 2.0
SAML 2.0
SSO with SAML 2.0
SLO with SAML 2.0
Identity Federation
Common Domain and Identity Provider Discovery
Activating HTTP Security Session Management on AS ABAP
Adding an Identity Provider to Your Network
Configuring AS ABAP as a Service Provider
Enabling the SAML Service Provider
Configuring Front-Channel Communication
Configuring Back-Channel Communication
Configuring Support for Enhanced Client or Proxy
Identity Federation in AS ABAP
Configuring Federation Type Persistent Users
Configuring Identity Federation with Persistent Name ID Format
Managing Name IDs
Mapping Users in table USREXTID
Configuring Federation Type Service Users
Authentication with Service Users
Example of Federation Type Service Users
Trusting an Identity Provider
Protecting Web Applications with SAML
Securing SAML Bindings
Influencing the Identity Provider Used by the Service Provider
Identity Provider Discovery Service of the AS ABAP
Accessing the Metadata XML of a SAML Service Provider of an AS A
Including Legacy Systems in Your SAML 2.0 Landscape
Enabling Service Providers to Share Persistent Name IDs
Mapping Relay States to Applications
Configuring the Default Application Path
Triggering Identity Provider Proxy
Adding Custom Authentication Contexts
Overriding the Service Provider Configuration with URL Parameter
Accessing the SAML 2.0 Configuration Application with a Web Brow
Disabling the SAML Service Provider
Diagnosing SAML 2.0 Problems with the Security Diagnostic Tool f
Authentication on the AS Java
Declarative and Programmatic Authentication
Login Modules and Login Module Stacks
Login Modules
Login Module Stacks
Managing Login Modules
Managing Policy Configurations
Authentication Schemes
Authentication Scheme
Changing the authschemes.xml File
Defining an Authentication Scheme
Defining References to Authentication Schemes
Assigning an Authentication Scheme to an iView
Authentication Schemes Shipped with SAP NetWeaver AS Java
Configuring Authentication Mechanisms
Using Basic Authentication (User ID and Password)
Using Client Certificates for User Authentication
Configuring the Use of Client Certificates for Authentication
Modifying Client Certificate Authentication Options
Using Stored Certificate Mappings
Maintaining the User's Certificate Information
Maintaining Certificate Mappings Automatically
Using Rules Based on Client Certificate Subject Names
Using Rules Based on Client Certificate V3 Extensions
Defining Rules for Filtering Client Certificates
Using Client Certificates via an Intermediary Server
Using Security Session IDs for Single Sign-On Between Applicatio
Using Logon Tickets for Single Sign-On
Configuring the Use of Logon Tickets
Adjusting the Login Module Stacks for Using Logon Tickets
Sample Login Module Stacks for Using Logon Tickets
Specifying the J2EE Engine Client to Use for Logon Tickets
Replacing the Key Pair to Use for Logon Tickets
Configuring the J2EE Engine to Accept Logon Tickets
Checking or Updating the Certificates of Trusted Systems
Exporting the Ticket-Issuing Server's Public-key Certificate
Testing the Use of Logon Tickets
Changing the Login Module Options for Creating Logon Tickets
Configuring SAP Web AS ABAP to Accept Logon Tickets from the J2E
Using Single Sign-On with Resource Adapters
Using SAML Assertions for Single Sign-On
Mapping SAML Principals to SAP J2EE Engine User IDs
Configuring the Use of SAML
Configuring the SAML Parameters
Adjusting the Login Module Stacks for Using SAML
Accessing an Application that Accepts SAML Assertions
Changing the Startup Mode for the SAML Service
The SAML Test Application
Setting Up the SAML Test Application
Using the SAML Test Application
Outbound Partner Parameters Used by the Test Application
Example SAML Mapping Module Used by the SAML Test Application
Using Kerberos Authentication for Single Sign-On
Key Distribution Center Configuration
Configuring the UME
Configuring the UME when Using ADS Data Sources for Kerberos
Configuring the UME when Using Non-ADS Data Sources
Wizard-based Configuration for Kerberos Authentication
Step 1: Prerequisites
Step 2: Kerberos Realm
Step 3: Resolution Mode
Step 4: Policy Configuration
Step 5: Confirmation
Troubleshooting
Accessing AS Java with Kerberos Authentication
Using Header Variables for User Authentication
Adjusting the Login Module Stacks for Using Header Variables
Using Anonymous Logon to Access the Portal
Configuring Anonymous Logon with Named Anonymous Users
Authentication on the Portal
Single Sign-On in a System Landscape
SSO Between Portal, Web Dynpro, and ABAP Systems
Testing That Web Dynpro System Accepts Tickets From Portal
Testing Single Sign-On Between the Portal and the ABAP System
Single Sign-On for Web Services
Using Transport Level Authentication
Using Message Level Authentication
Message-Based Authentication with WS-Security
Configuring Single Sign-On with SAML Token Profiles
Provider Configuration
Subject Confirmation Methods
Configuring a Web Services Endpoint with SAML and Sender-Vouches
Configuring a Web Services Endpoint with SAML and Holder-of-key
Trusting a Security Token Service
Protecting Web Services with SAML
Consumer Configuration
Configuring a Logical Port for SAML with WS-Policy
Configuring an STS as a Token Issuer
Reference
Configuring a Trust Relationship for SAML Token Profiles Without
Preparing the SAML-Token-Profile-Issuing WS Consumer AS ABAP
Preparing the WS Provider AS ABAP for Accepting SAML Token Profi
Preparing the WS Provider AS ABAP for Accepting SAML Token Profi
Exporting the AS ABAP Certificate
Single Sign-On with an External Security Token Service
STS Scenario with Symmetric Key for Message Protection (Signatur
STS Scenario with Symmetric Key for Endorsing Signature (Authent
STS Scenario with Asymmetric WS Consumer Key for Endorsing Signa
Configuring Single Sign-On with an External Security Token Servi
Configuring SSO/STS Scenario SAML Holder-of-key in the WS Provid
Configuring SSO/STS Scenario SAML Holder-of-key in the WS Consum
Single Sign-On to Non-SAP Systems and Applications
Using Authentication When Developing J2EE Engine Applications
Authentication for Web Applications Users on the J2EE Engine
Overview of the Login Process in JAAS
Using Login Modules to Protect Web Applications
Example Login Module
Create and Configure a Login Module
Creating a New Java Project
Implementing the Login Module
Setting the Classpath and Compiling the Java Project
Exporting the Login Module Class in a JAR File
Creating a New Library Project
Making Reference to the Security Provider Service
Setting the Classpath to the JAR of the Login Module
Making Reference to the JAR File
Building SDA File
Deploying the SDA to the J2EE Engine
Configuring the Login Module on the J2EE Engine
Configuring the Login Module Usage
Adding a Reference to the Classloader of the Security Provider
Configuring an Application to Use the Login Module
Example Login Module
Login Modules Over HTTP
SAP Specific HTTP Callbacks
Using the HTTP Callback Classes
Changing the User Password
Single Sign-on for J2EE Web Applications
Propagation of Security Principals to Other Containers on the J2
Remote Authentication
Security Sessions