https://raw.githubusercontent.com/ajmaradiaga/feeds/main/scmt/members/sap-champions/Martin-Pankraz.xmlSAP Community - Martin Pankraz2026-03-05T01:00:02.089119+00:00python-feedgenMartin Pankraz in SAP Communityhttps://community.sap.com/t5/technology-blog-posts-by-sap/sap-private-link-service-use-cases-for-sap-cloud-integration-and-sap-build/bc-p/14062161#M180308Re: SAP Private Link service use cases for SAP Cloud Integration and SAP Build Work Zone, Standard E2025-03-31T16:23:42.443000+02:00Martin-Pankrazhttps://community.sap.com/t5/user/viewprofilepage/user-id/143781<P><a href="https://community.sap.com/t5/user/viewprofilepage/user-id/607904">@stag_pune</a> SAP BTP is a Internet-facing app by design. SAP Private Link is the only option for hyperscaler specific private networking options by the platform uni-directional from BTP. Some individual SAP SaaS apps implemented further options for VPN or ExpressRoute without BTP as a platform. As it stands today you need to <A href="https://influence.sap.com/" target="_blank" rel="noopener noreferrer">file a feature request to SAP</A> to request further private networking features.</P>2025-03-31T16:23:42.443000+02:00https://community.sap.com/t5/technology-blog-posts-by-members/sap-principal-propagation-without-secrets-how-managed-identity-in-apim/ba-p/14091769SAP Principal Propagation without Secrets: How Managed Identity in APIM Simplifies Everything2025-05-02T11:01:42.574000+02:00Martin-Pankrazhttps://community.sap.com/t5/user/viewprofilepage/user-id/143781<P><SPAN>Dear community,</SPAN></P><P><SPAN>SAP Principal Propagation (for simplicity often also referred to as SSO) is the gold standard for app integration – especially when it comes to 3rd party apps such as Microsoft Power Platform. Building on top of <A href="https://community.powerplatform.com/blogs/post/?postid=c6a609ab-3556-ef11-a317-6045bda95bf0" target="_blank" rel="noopener nofollow noreferrer">my prior blog</A> on API Management usage for SAP SSO, I am sharing today how you can fully <STRONG>eliminate the passwords or certificates for the token exchange</STRONG> previously required.</SPAN></P><P><FONT face="courier new,courier"><STRONG>No more password storing or rotation. No certificates to renew. No manual key rollover scripts.</STRONG></FONT></P><P><SPAN>Thank god!</SPAN></P><P><SPAN>The Microsoft Entra ID authentication handshakes with services such as SAP BTP, SuccessFactors, Azure, or M365 apps like Power Platform allows these apps to become native, dynamic, and <STRONG>self-maintaining</STRONG>.</SPAN></P><P><SPAN>This shift not only tightens security by reducing the attack surface but also significantly accelerates project delivery, improves compliance with modern Zero Trust principles, and cuts down on administrative overhead. It’s a <STRONG>small architectural change with a big real-world impact</STRONG> — and a logical next step for enterprise-grade app integrations in the SAP ecosystem.</SPAN></P><P> </P><H1 id="toc-hId-1580991830"><SPAN>A glimpse under the hood</SPAN></H1><P><SPAN>The magic? It’s called <A href="https://learn.microsoft.com/entra/identity/managed-identities-azure-resources/overview#use-managed-identity-as-a-federated-identity-credential-fic-on-an-entra-id-app" target="_blank" rel="noopener nofollow noreferrer">Managed Identity</A> for Azure. With a user-assigned managed identity in API Management, the platform takes care of the authentication for you — clean, automatic, and secret-free. Building on top of <A href="https://learn.microsoft.com/entra/workload-id/workload-identity-federation-config-app-trust-managed-identity?tabs=microsoft-entra-admin-center" target="_blank" rel="noopener nofollow noreferrer">Workload Identity Federation</A> enables using a managed identity as a credential, just like certificate or password, on Entra ID Applications.</SPAN></P><P><SPAN>See following updated flow diagram from the prior blog. It highlights with red and yellow arrows where it was possible to “eliminate” credentials.</SPAN></P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="MartinPankraz_0-1746174903862.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/257026iDC03090A954A1500/image-size/large?v=v2&px=999" role="button" title="MartinPankraz_0-1746174903862.png" alt="MartinPankraz_0-1746174903862.png" /></span></P><P><SPAN>When browsing Microsoft Learn or additional blogs, look for the technical term “Federated Identity Credential” for additional details.</SPAN></P><P><SPAN>Solving this challenge on Azure API Management level enables scaling the approach to arbitrary many different consumer solutions.</SPAN></P><P>Find the updated policy on the Azure API Management repos for SAP ECC and S/4HANA <SPAN><A href="https://github.com/Azure/api-management-policy-snippets/blob/master/examples/Request%20OAuth2%20access%20token%20from%20SAP%20using%20AAD%20JWT%20token.xml" target="_blank" rel="noopener nofollow noreferrer">here</A></SPAN> and for SuccessFactors <SPAN><A href="https://github.com/Azure/api-management-policy-snippets/blob/master/examples/Request%20OAuth2%20access%20token%20from%20SuccessFactors%20using%20AAD%20JWT%20token.xml" target="_blank" rel="noopener nofollow noreferrer">here</A></SPAN>.</P><P><SPAN>Learn more about this space in general from the <A href="https://community.sap.com/t5/technology-blogs-by-members/principal-propagation-in-a-multi-cloud-solution-between-microsoft-azure-and/ba-p/13482071" target="_blank">blog series</A> by my magnificent colleague <A href="https://community.sap.com/t5/user/viewprofilepage/user-id/171519" target="_blank">Martin Raepple</A>.</SPAN></P><P> </P><H2 id="toc-hId-1513561044"><SPAN>Create a user-assigned managed identity for your Azure API Management instance</SPAN></H2><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="MartinPankraz_1-1746174903874.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/257027i368AD4324CA6A896/image-size/large?v=v2&px=999" role="button" title="MartinPankraz_1-1746174903874.png" alt="MartinPankraz_1-1746174903874.png" /></span></P><P> </P><P><SPAN>See additional details on <A href="https://learn.microsoft.com/azure/api-management/api-management-howto-use-managed-service-identity#create-a-user-assigned-managed-identity" target="_blank" rel="noopener nofollow noreferrer">this Microsoft Learn article</A>.</SPAN></P><P> </P><H2 id="toc-hId-1317047539"><SPAN>Create a “managed credential”</SPAN></H2><P><SPAN>This step is being referred to by <A href="https://learn.microsoft.com/entra/workload-id/workload-identity-federation-config-app-trust-managed-identity?tabs=microsoft-entra-admin-center#configure-a-federated-identity-credential-on-an-application" target="_blank" rel="noopener nofollow noreferrer">Microsoft Learn</A> as Federated Identity Credential (FIC).</SPAN></P><UL><LI><SPAN>Click Add Credential as per below screenshot from the manage secrets pane of your Entra ID app registration which represents your API Management instance.</SPAN></LI><LI><SPAN>Choose scenario “Managed Identity”,</SPAN></LI><LI><SPAN>Select the id of your user-assigned-managed identity created before, and</SPAN></LI><LI><SPAN>Make sure the audience is listed as “api://AzureADTokenExchange”.</SPAN></LI></UL><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="MartinPankraz_2-1746174903901.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/257028i5DDBDFF9AA0EA9BF/image-size/large?v=v2&px=999" role="button" title="MartinPankraz_2-1746174903901.png" alt="MartinPankraz_2-1746174903901.png" /></span></P><P> </P><H2 id="toc-hId-1120534034"><SPAN>Import the updated policy</SPAN></H2><P><SPAN>Navigate to your <A href="https://learn.microsoft.com/azure/api-management/sap-api?tabs=odata" target="_blank" rel="noopener nofollow noreferrer">SAP OData API</A> on Azure API Management and use the <A href="https://portal.azure.com/?#browse/Microsoft.ApiManagement%2Fservice" target="_blank" rel="noopener nofollow noreferrer">Azure portal UI</A> to paste <A href="https://github.com/Azure/api-management-policy-snippets/blob/master/examples/Request%20OAuth2%20access%20token%20from%20SAP%20using%20AAD%20JWT%20token.xml" target="_blank" rel="noopener nofollow noreferrer">the policy</A> as code, or leverage infrastructure-as-code with your devops pipeline to apply SAP Principal Propagation at scale. See this <A href="https://github.com/Azure-Samples/app-service-javascript-sap-cloud-sdk-quickstart" target="_blank" rel="noopener nofollow noreferrer">Azure Developer CLI sample</A> using Bicep for reference.</SPAN></P><P><SPAN>See the <A href="https://github.com/Azure/api-management-policy-snippets/blob/master/examples/Request%20OAuth2%20access%20token%20from%20SAP%20using%20AAD%20JWT%20token.xml" target="_blank" rel="noopener nofollow noreferrer">APIM policy line</A> doing the magical <A href="https://learn.microsoft.com/azure/api-management/authentication-managed-identity-policy#use-managed-identity-and-set-header-manually" target="_blank" rel="noopener nofollow noreferrer">managed identity request</A>. It is as simple as that:</SPAN></P><pre class="lia-code-sample language-markup"><code><authentication-managed-identity resource="api://azureadtokenexchange" client-id="{{APIMUserAssignedManagedIdentityId}}" output-token-variable-name="msi-access-token" ignore-error="false" /></code></pre><P><SPAN>The rest happens under the hood.</SPAN></P><P><EM><SPAN>Learn more about policy creation including Microsoft Copilot usage from </SPAN></EM><SPAN><A href="https://learn.microsoft.com/azure/api-management/api-management-howto-policies#get-assistance-creating-policies-using-microsoft-copilot-in-azure-preview" target="_blank" rel="noopener nofollow noreferrer"><EM>this article</EM></A><EM> and </EM><A href="https://www.youtube.com/watch?v=N9Sp7iPjIDs" target="_blank" rel="noopener nofollow noreferrer"><EM>this video</EM></A><EM>. In case you fancy GitHub Copilot apply the VS Code extension. See </EM><A href="https://techcommunity.microsoft.com/t5/apps-on-azure-blog/github-copilot-for-azure-api-management-policies/ba-p/3884229" target="_blank" rel="noopener nofollow noreferrer"><EM>this community post</EM></A><EM> for further inspiration.</EM></SPAN></P><P><EM><SPAN>Consider the governance and security trade-offs between mighty policies and SAP OAuth clients authorized for everything vs. a multitude of clients for each API and scope.</SPAN></EM></P><P> </P><H2 id="toc-hId-924020529"><SPAN>Configure the policy using named values</SPAN></H2><P><SPAN>The configuration exercise is 99% the same as outlined in the earlier blog “</SPAN><SPAN><A href="https://community.powerplatform.com/blogs/post/?postid=c6a609ab-3556-ef11-a317-6045bda95bf0" target="_blank" rel="noopener nofollow noreferrer">SAP OData connector now supports OAuth2 and SAP Principal Propagation</A>” before</SPAN><SPAN>. However, now we replace the client secret setting for the Entra ID app registration that represents your API Management instance with the client id of your <A href="https://learn.microsoft.com/azure/api-management/api-management-howto-use-managed-service-identity#create-a-user-assigned-managed-identity" target="_blank" rel="noopener nofollow noreferrer">user-assigned managed identity</A>.</SPAN></P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="MartinPankraz_3-1746174903908.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/257029iE21138B47F2B5949/image-size/large?v=v2&px=999" role="button" title="MartinPankraz_3-1746174903908.png" alt="MartinPankraz_3-1746174903908.png" /></span></P><P> </P><P><SPAN>Fill the values as per your environment:</SPAN></P><TABLE><TBODY><TR><TD width="200"><P><STRONG><SPAN>Key</SPAN></STRONG></P></TD><TD width="200"><P><STRONG><SPAN>Value sample</SPAN></STRONG></P></TD><TD width="200"><P><STRONG><SPAN>Hints</SPAN></STRONG></P></TD></TR><TR><TD width="200"><P><STRONG><SPAN>AADTenantId</SPAN></STRONG></P></TD><TD width="200"><P><SPAN>12a345bc-1234-56ab-78ab-zzzzzzzzz</SPAN></P></TD><TD width="200"><P><SPAN>Find it on the Azure portal (e.g. <A href="https://portal.azure.com/?feature.customportal=false#view/Microsoft_AAD_IAM/ActiveDirectoryMenuBlade/~/Overview" target="_blank" rel="noopener nofollow noreferrer">here</A>)</SPAN></P></TD></TR><TR><TD width="200"><P><STRONG><SPAN>APIMAADRegisteredAppClientId</SPAN></STRONG></P></TD><TD width="200"><P><SPAN>999abce-7777-abcd-a6c9-zzzzzzzzzzz</SPAN></P></TD><TD width="200"><P><SPAN>The Application (client) id of the Entra ID app registration representing your Azure API Management instance.</SPAN></P></TD></TR><TR><TD width="200"><P><STRONG>APIMUserAssignedManagedIdentityId</STRONG></P></TD><TD width="200"><P><SPAN>7777abce-7777-abcd-a6c9-zzzzzzzzzzz</SPAN></P></TD><TD width="200"><P><SPAN>Client ID of user-assigned managed identity of APIM instance</SPAN></P></TD></TR><TR><TD width="200"><P><STRONG><SPAN>AADSAPResource</SPAN></STRONG></P></TD><TD width="200"><P><SPAN><A href="https://a4h100" target="_blank" rel="noopener nofollow noreferrer">https://a4h100</A></SPAN></P></TD><TD width="200"><P><SPAN>The provider’s name from your NetWeaver SAML setup. Typically, a URL with <A href="https://SID" target="_blank" rel="noopener nofollow noreferrer">SID</A> followed Client number</SPAN></P></TD></TR><TR><TD width="200"><P><STRONG><SPAN>sap-oauth-client-username</SPAN></STRONG></P></TD><TD width="200"><P><SPAN>ODATAOAUTH</SPAN></P></TD><TD width="200"><P><SPAN>User name provided on SOAUTH2 transaction (/sap/bc/webdynpro/sap/oauth2_config?sap-client=100)</SPAN></P><P><SPAN> </SPAN></P><P><SPAN>Create a named user on SU01 with minimum rights (S_SCOPE, S_SERVICE) and reference that on SOAUTH2.</SPAN></P><P><SPAN>Don’t forget to assign authorized scope.</SPAN></P></TD></TR><TR><TD width="200"><P><STRONG><SPAN>sap-oauth-client-password</SPAN></STRONG></P></TD><TD width="200"><P><SPAN>Password for that oauth user</SPAN></P></TD><TD width="200"><P><SPAN>This is only used to request tokens not to authenticate to SAP.</SPAN></P></TD></TR><TR><TD width="200"><P><STRONG><SPAN>sap-oauth-scope</SPAN></STRONG></P></TD><TD width="200"><P><SPAN>ZPRODUCTSVIEW_CDS_0001</SPAN></P></TD><TD width="200"><P><SPAN>The scope assigned on SOAUTH2</SPAN></P></TD></TR><TR><TD width="200"><P><STRONG><SPAN>SAPOAuthRefreshExpiry</SPAN></STRONG></P></TD><TD width="200"><P><SPAN>86400</SPAN></P></TD><TD width="200"><P><SPAN>Option to set refresh token expiry (default on SAP 2 years). It is not part of the token response.</SPAN></P></TD></TR><TR><TD width="200"><P><STRONG><SPAN>SAPOAuthServerAdressForTokenEndpoint</SPAN></STRONG></P></TD><TD width="200"><P><SPAN>a4h-internal.cloudapp.net:44301</SPAN></P></TD><TD width="200"><P><SPAN>Host and port of the target SAP OAuth server. When SAP cloud connector is used, put the virtual hostname and port.</SPAN></P></TD></TR></TBODY></TABLE><H1 id="toc-hId-598424305"><SPAN>Hints on troubleshooting</SPAN></H1><P><SPAN>There was good feedback on the <A href="https://github.com/MartinPankraz/AzureSAPODataReader/blob/master/Templates/AAD_APIM_SAP_Principal_Propagation.postman_collection.json" target="_blank" rel="noopener nofollow noreferrer">Postman collection</A> to verify proper SAP Principal Propagation setup. Be aware that the on-behalf-of flow step to request the SAML assertion from Entra involving the managed identity cannot be tested via a REST client from your local device, because only Azure services are trusted for the request.</SPAN></P><P><SPAN>In general, I would recommend testing the auth flow with the least components involved as possible to reduce problem surface. Meaning, test with a REST client of your choice with client secrets to make sure that your SAP SSO setup and OAuth settings are working. Keep the API Management part and managed identity to after successful initial integration with SAP.</SPAN></P><H1 id="toc-hId-401910800"> </H1><H1 id="toc-hId-205397295"><SPAN>The wider integration context</SPAN></H1><P><SPAN>Q: Does Managed Identity for Azure work only for SAP on Azure?</SPAN></P><P><SPAN>A: No, using <A href="https://learn.microsoft.com/azure/api-management/self-hosted-gateway-overview" target="_blank" rel="noopener nofollow noreferrer">Azure API Managment self-hosted Gateway</A> you can bring that capability any-premises. Besides deploying the gateway directly into your local network, consider also Azure public cloud routing options (ExpressRoute, NVAs, VPN, etc.)</SPAN></P><P><SPAN>Q: SAP Cloud Connector already supports Principal Propagation for on-premises. Why would I choose this managed identity approach?</SPAN></P><P><SPAN>A: SAP Integration Suite using SAP Cloud Connector for instance is a prime choice - well established and mature. Nothing wrong with that. Still the credentials need to be managed. You may consider a hybrid where Integration Suite realizes connectivity, while Managed Identity for Azure provides passwordless token requests. Be aware to avoid configuring Principal Propagation twice (OAuth2SAMLBearer flow vs. the Cloud Connector setting with short-lived x.509 certs)</SPAN></P><P> </P><H1 id="toc-hId-8883790"><SPAN>Thoughts on production readiness</SPAN></H1><P><SPAN>Managed Identities are a well-established platform feature on Azure with large scale adoption across services. Furthermore, it is <STRONG>the recommended way</STRONG> of configuring service to service authentication.</SPAN></P><P><SPAN>Credentials remain in place for the SAP OAuth server as per its <A href="https://help.sap.com/docs/SAP_NETWEAVER_750/e815bb97839a4d83be6c4fca48ee5777/de1b14d589fa46b383ec43fd33dace86.html" target="_blank" rel="noopener noreferrer">OAuth2 flow capabilities</A>. Halfway there so to say. Luckily, token users have a much lower risk profile than actual users.</SPAN></P><H1 id="toc-hId--187629715"> </H1><H1 id="toc-hId-385596863"><SPAN>Final Words</SPAN></H1><P><SPAN>That’s a wrap </SPAN><span class="lia-unicode-emoji" title=":burrito:">🌯</span><SPAN>. Today you saw how SAP Principal Propagation goes secret-less on Microsoft Entra ID — no passwords, and no certificates. Entra ID with Managed Identity handles it all, mapping Microsoft identities to SAP users while keeping your authorizations intact.</SPAN></P><P><SPAN>This is what native, secure integration should look like.</SPAN></P><P><span class="lia-unicode-emoji" title=":backhand_index_pointing_right:">👉</span><SPAN><STRONG>If you’re still managing credentials manually in 2025, it’s time for an upgrade. It only gets worse from here: Certificate authorities agreed to <A href="https://www.bleepingcomputer.com/news/security/ssl-tls-certificate-lifespans-reduced-to-47-days-by-2029/" target="_blank" rel="noopener nofollow noreferrer">reduce lifespan to 47 days</A> in stages over the next 1-3 years.</STRONG></SPAN></P><P><SPAN>Cheers </SPAN><SPAN>Martin</SPAN></P>2025-05-02T11:01:42.574000+02:00https://community.sap.com/t5/technology-blog-posts-by-members/sap-leanix-integrating-microsoft-defender-for-cloud-apps/ba-p/14089439SAP LeanIX integrating Microsoft Defender for Cloud Apps2025-05-06T10:33:38.725000+02:00Martin-Pankrazhttps://community.sap.com/t5/user/viewprofilepage/user-id/143781<H2 id="toc-hId-1709386380">When Enterprise Architects and IT Security Speak the Same Language</H2><P><EM>This blog was co-authored by <a href="https://community.sap.com/t5/user/viewprofilepage/user-id/1578736">@Michelle10</a> (<A href="https://www.linkedin.com/in/michelle-n-9a2192118/" target="_blank" rel="noopener nofollow noreferrer">PM</A> @ SAP LeanIX)</EM></P><P><SPAN>Dear community,</SPAN></P><P><SPAN>In most enterprises, IT security and enterprise architecture are two critical disciplines, each with their own priorities, tools, and perspectives. One is laser-focused on threat detection, compliance, and access control. The other is mapping capabilities, rationalizing applications, and shaping long-term IT strategy.</SPAN></P><P><SPAN>What happens when these personas complement each other – not just in theory, but in tooling?</SPAN></P><P><SPAN>That’s exactly where the integration between <A href="https://www.leanix.net/" target="_blank" rel="noopener nofollow noreferrer">SAP LeanIX</A> and <A href="https://learn.microsoft.com/defender-cloud-apps/what-is-defender-for-cloud-apps" target="_blank" rel="noopener nofollow noreferrer">Microsoft Defender for Cloud Apps</A> comes in.</SPAN></P><P><SPAN>But wait, what about my managed apps governed by my corporate identity provider? No worries, SAP LeanIX may be integrated with <A href="http://aka.ms/entraSAPHub" target="_blank" rel="noopener nofollow noreferrer">Microsoft Entra ID</A> for discovery and keeping track which apps have SSO etc. as well.</SPAN></P><P><div class="video-embed-center video-embed"><iframe class="embedly-embed" src="https://cdn.embedly.com/widgets/media.html?src=https%3A%2F%2Fwww.youtube.com%2Fembed%2FXQCKUGEbu9w%3Ffeature%3Doembed&display_name=YouTube&url=https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DXQCKUGEbu9w&image=https%3A%2F%2Fi.ytimg.com%2Fvi%2FXQCKUGEbu9w%2Fhqdefault.jpg&type=text%2Fhtml&schema=youtube" width="400" height="225" scrolling="no" title="#242 - TOW SAP LeanIX and Microsoft Defender for Cloud Apps (Michelle Niedernhuber, M. Pankraz)" frameborder="0" allow="autoplay; fullscreen; encrypted-media; picture-in-picture;" allowfullscreen="true"></iframe></div></P><P> </P><H1 id="toc-hId-1383790156"><SPAN>Connecting Two Worlds</SPAN></H1><P><SPAN>Microsoft Defender for Cloud Apps is your frontline for SaaS security and governance to detect threat attacks that arise from your SaaS app interactions and reduce the exposure to such attacks. Furthermore, it helps security teams uncover shadow IT, assess risk, and monitor data flows across </SPAN></P><P><SPAN>SAP LeanIX, meanwhile, gives enterprise architects the visibility they need to manage complexity – mapping applications to business capabilities, tracking lifecycle data, and supporting IT transformation.</SPAN></P><P><SPAN>The magic happens when you combine them.</SPAN></P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="MartinPankraz_0-1745927891074.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/256071iFE69DF396D5D9AAC/image-size/large?v=v2&px=999" role="button" title="MartinPankraz_0-1745927891074.png" alt="MartinPankraz_0-1745927891074.png" /></span></P><P> </P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="MartinPankraz_1-1745927891133.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/256073iD396C1026D652602/image-size/large?v=v2&px=999" role="button" title="MartinPankraz_1-1745927891133.png" alt="MartinPankraz_1-1745927891133.png" /></span></P><P> </P><H1 id="toc-hId-1187276651"><SPAN>From Discovery to Decision-Making</SPAN></H1><P><SPAN>With this integration, you can pull application usage and risk data from Defender for Cloud Apps directly into SAP LeanIX. That means:</SPAN></P><P><EM><SPAN>Security teams discover new or risky SaaS apps…</SPAN></EM></P><P><EM><SPAN>…Architects contextualize those apps within business functions and processes.</SPAN></EM></P><P><SPAN> </SPAN><SPAN>You’re no longer just identifying what’s out there - you’re aligning it with your architecture strategy. This turns ad-hoc discovery into intentional governance.</SPAN></P><P> </P><H1 id="toc-hId-990763146"><SPAN>Business Outcomes</SPAN></H1><UL><LI><SPAN>Eliminate shadow IT with traceable business context.</SPAN></LI><LI><SPAN>Support rationalization with usage-driven decisions.</SPAN></LI><LI><SPAN>Align security and strategy with shared data and mutual visibility.</SPAN></LI></UL><P> </P><H1 id="toc-hId-794249641"><SPAN>Why It Matters</SPAN></H1><P><SPAN>This integration fosters collaboration between two personas that often operate in parallel but rarely intersect. With Microsoft Defender for Cloud Apps and SAP LeanIX, they do - bringing security and architecture into a shared conversation around risk, capability, and value.</SPAN></P><P><SPAN>The result? Better decisions, stronger governance, and a much clearer view of your SaaS landscape. All powered from the Defender and Entra ID APIs. Not too bad, huh?</SPAN></P><P><SPAN>This is how modern IT operates: cross-functional, data-driven, and strategically aligned.</SPAN></P><P> </P><H1 id="toc-hId-597736136">Get Started</H1><P>Anyone curious about uncovering shadow IT and making better SaaS app decisions? Just reach out to me and Michelle or leave a comment.</P><P> </P><P>Cheers</P><P>Martin & Michelle</P><P>______________</P><P>References:</P><UL><LI><SPAN><A href="https://learn.microsoft.com/defender-cloud-apps/api-introduction" target="_blank" rel="noopener nofollow noreferrer">Defender for Cloud Apps REST API | Microsoft Learn</A></SPAN></LI><LI><SPAN><A href="https://learn.microsoft.com/graph/api/resources/security-cloudappdiscovery-overview?view=graph-rest-beta&viewFallbackFrom=graph-rest-1.0" target="_blank" rel="noopener nofollow noreferrer">Microsoft Defender for Cloud apps API in Microsoft Graph | Microsoft Learn</A></SPAN></LI><LI><SPAN><A href="https://docs-eam.leanix.net/docs/microsoft-defender-for-cloud-apps" target="_blank" rel="noopener nofollow noreferrer">Microsoft Defender for Cloud Apps (MDCA) Integration for SaaS Discovery | LeanIX User Docs</A></SPAN></LI><LI><SPAN><A href="https://docs-eam.leanix.net/docs/microsoft-entra-id" target="_blank" rel="noopener nofollow noreferrer">Microsoft Entra ID Integration for SaaS Discovery | LeanIX User Docs</A></SPAN></LI></UL>2025-05-06T10:33:38.725000+02:00https://community.sap.com/t5/technology-blog-posts-by-members/sap-principal-propagation-without-secrets-how-managed-identity-in-apim/bc-p/14094417#M173273Re: SAP Principal Propagation without Secrets: How Managed Identity in APIM Simplifies Everything2025-05-06T13:32:27.628000+02:00Martin-Pankrazhttps://community.sap.com/t5/user/viewprofilepage/user-id/143781<P><a href="https://community.sap.com/t5/user/viewprofilepage/user-id/178477">@vbalko-claimate</a> good question. Added a small Q/A section on that.</P>2025-05-06T13:32:27.628000+02:00https://community.sap.com/t5/enterprise-resource-planning-blog-posts-by-members/integrating-low-code-solutions-with-microsoft-using-sap-integration-suite/bc-p/14095347#M71403Re: Integrating low code solutions with Microsoft using SAP Integration Suite has never been easier!2025-05-07T13:15:39.896000+02:00Martin-Pankrazhttps://community.sap.com/t5/user/viewprofilepage/user-id/143781<P><a href="https://community.sap.com/t5/user/viewprofilepage/user-id/1458002">@JorgeCalderon</a> the jwt token from caller is part of the standard Authorization header. The sender in my scenario was the SAP OData connector in PowerAutomate. Cheers Martin</P>2025-05-07T13:15:39.896000+02:00https://community.sap.com/t5/enterprise-resource-planning-blog-posts-by-members/how-to-customize-your-sap-logserv-solution-in-microsoft-sentinel-part-2/ba-p/14110388How to customize your SAP LogServ solution in Microsoft Sentinel - Part 22025-05-23T16:18:26.636000+02:00Martin-Pankrazhttps://community.sap.com/t5/user/viewprofilepage/user-id/143781<P><EM>Find your way to our central blog series entry <A class="" title="https://community.sap.com/t5/enterprise-resource-planning-blog-posts-by-members/ultimate-blog-series-sap-logserv-integration-with-microsoft-sentinel/ba-p/14126401" href="https://community.sap.com/t5/enterprise-resource-planning-blog-posts-by-members/ultimate-blog-series-sap-logserv-integration-with-microsoft-sentinel/ba-p/14126401" target="_blank">here</A>.</EM></P><P>Dear community,</P><P>Following the <A href="https://community.sap.com/t5/enterprise-resource-planning-blog-posts-by-sap/sap-logserv-integration-with-microsoft-sentinel-for-sap-rise-customers-is/ba-p/14085387" target="_blank">product release blog</A> by SAP regarding the integration of SAP LogServ and Microsoft Sentinel, I am going to share some details on customizing the solution to your needs.</P><P>The SAP LogServ service in SAP RISE, private cloud edition, gets you <STRONG>access to all the logs</STRONG> produced by the underlying services managed by SAP ECS. Microsoft Sentinel without LogServ is limited to the application layer only. LogServ holds the promise to get a glimpse into the inner workings of RISE to…</P><UL><LI>Satisfy your auditing needs, and</LI><LI>Integration with the SIEM solution Microsoft Sentinel.</LI></UL><P>However, ALL logs are a bit much for many of you and the security value varies a lot. This blog gets you started to make cost conscious decisions while not compromising too much on threat protection insights. The most discussed log in my conversations so far was SAP HANA database.</P><P> </P><H1 id="toc-hId-1602199239">Which logs should I choose?</H1><P>That needs to be answered based on your needs, what is available, and what you want to achieve. Some just want all logs to store beyond the 365 days covered by LogServ, others only want the HANA DB log, and some want a specific subset across gateways, network, and database. For an up-to-date list always check with SAP.</P><P>Here is my opinionated subset that serves as an intro to the topic with no ambition for completeness. Otherwise, this becomes a master thesis kind of thing<span class="lia-unicode-emoji" title=":winking_face:">😉</span></P><P> </P><TABLE><TBODY><TR><TD width="139px" height="152px"><P><STRONG>LogServ source</STRONG></P></TD><TD width="113.146px" height="152px"><P><STRONG>In Scope of your shared responsibility</STRONG></P></TD><TD width="114px" height="152px"><P><STRONG>Threat Protection value</STRONG></P></TD><TD width="128px" height="152px"><P><STRONG>Chattiness</STRONG></P><P>(volume indication in t-shirt sizes)</P></TD><TD width="133px" height="152px"><P><STRONG>Comment</STRONG></P></TD></TR><TR><TD width="139px" height="132px"><P><STRONG>OS (Linux + Windows)</STRONG></P></TD><TD width="113.146px" height="132px"><P>No</P></TD><TD width="114px" height="132px"><P>Medium</P></TD><TD width="128px" height="132px"><P>L</P></TD><TD width="133px" height="132px"><P>Without integration into your EDR less relevant</P></TD></TR><TR><TD width="139px" height="104px"><P><STRONG><FONT color="#FF00FF">Database</FONT> </STRONG><STRONG>(HANA, ASE, DB2, etc.)</STRONG></P></TD><TD width="113.146px" height="104px"><P>Yes</P></TD><TD width="114px" height="104px"><P>High</P></TD><TD width="128px" height="104px"><P>M</P></TD><TD width="133px" height="104px"><P>Audit relevant</P></TD></TR><TR><TD width="139px" height="132px"><P><STRONG>Web Application Firewall</STRONG></P></TD><TD width="113.146px" height="132px"><P>No</P></TD><TD width="114px" height="132px"><P><FONT color="#FF00FF">Medium</FONT></P></TD><TD width="128px" height="132px"><P>XL</P></TD><TD width="133px" height="132px"><P>Only http connection info and routing without context</P></TD></TR><TR><TD width="139px" height="132px"><P><STRONG>Load Balancer</STRONG></P></TD><TD width="113.146px" height="132px"><P>No</P></TD><TD width="114px" height="132px"><P>Low</P></TD><TD width="128px" height="132px"><P>L</P></TD><TD width="133px" height="132px"><P>Layer 4 /TCP/IP) communication only without context</P></TD></TR><TR><TD width="139px" height="132px"><P><STRONG>Network, Flow Logs</STRONG></P></TD><TD width="113.146px" height="132px"><P>No</P></TD><TD width="114px" height="132px"><P>Medium</P></TD><TD width="128px" height="132px"><P>XXXL</P></TD><TD width="133px" height="132px"><P>Useful to trace back lateral movement on a compromise</P></TD></TR><TR><TD width="139px" height="132px"><P><FONT color="#FF00FF"><STRONG>SAP Cloud Connector</STRONG></FONT></P></TD><TD width="113.146px" height="132px"><P>Yes</P></TD><TD width="114px" height="132px"><P><FONT color="#FF00FF">High</FONT></P></TD><TD width="128px" height="132px"><P>M</P></TD><TD width="133px" height="132px"><P>Audit log holds all info on connections from SAP BTP</P></TD></TR><TR><TD width="139px" height="187px"><P><STRONG>SAP Web Dispatcher</STRONG></P></TD><TD width="113.146px" height="187px"><P>No</P></TD><TD width="114px" height="187px"><P>Medium</P></TD><TD width="128px" height="187px"><P>L</P></TD><TD width="133px" height="187px"><P>Only http connection info and routing with IPs from last hop rather than original client.</P></TD></TR><TR><TD width="139px" height="104px"><P><STRONG>ICM</STRONG></P></TD><TD width="113.146px" height="104px"><P>No</P></TD><TD width="114px" height="104px"><P>Medium</P></TD><TD width="128px" height="104px"><P>L</P></TD><TD width="133px" height="104px"><P>Same challenge as with Web Dispatcher.</P></TD></TR><TR><TD width="139px" height="242px"><P><STRONG>SAP Gateway (OData)</STRONG></P></TD><TD width="113.146px" height="242px"><P>Yes</P></TD><TD width="114px" height="242px"><P>Low</P></TD><TD width="128px" height="242px"><P>M</P></TD><TD width="133px" height="242px"><P>Mostly exceptions on OData requests. SAP Cloud Connector audit log covers this with higher value.</P></TD></TR><TR><TD width="139px" height="50px"><P><STRONG>…</STRONG></P></TD><TD width="113.146px" height="50px"><P> </P></TD><TD width="114px" height="50px"><P> </P></TD><TD width="128px" height="50px"><P> </P></TD><TD width="133px" height="50px"><P> </P></TD></TR></TBODY></TABLE><P> </P><P>For the latest list of LogServ source folder names etc. consult with SAP and their documentation.</P><P><EM>Be aware, for AS ABAP and AS JAVA security audit log integration you still require the agentless Sentinel Solution for SAP. See the overview diagram in <A href="https://community.sap.com/t5/enterprise-resource-planning-blog-posts-by-sap/announcing-limited-preview-of-sap-logserv-integration-with-microsoft/ba-p/13942180" target="_blank">SAP’s blog</A> for more details on the LogServ Addon in combination with the Sentinel for SAP.</EM></P><P> </P><H1 id="toc-hId-1405685734">How do I select those logs?</H1><P>SAP published a native solution to Microsoft Sentinel. By using the Microsoft platform, you may configure the ingestion rule on the Data Collection Rule instance in Azure.</P><P>Once you have deployed the LogServ connector on Sentinel, you can browse the same Azure resource group to identify your generated Data Collection rule. It will read something like “-SAPLogServDCR-”. Tailor the existing Kusto Query Language (KQL) transformation to your needs (step 4). The default one takes all logs.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="MartinPankraz_0-1748009301824.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/265525i1082188F1B6CE9C8/image-size/large?v=v2&px=999" role="button" title="MartinPankraz_0-1748009301824.png" alt="MartinPankraz_0-1748009301824.png" /></span></P><P> </P><P>Consider the kql snippet below to filter the log by types. In my sample the data collection rule only accepts HANA db, Linux OS, and DNS.</P><pre class="lia-code-sample language-sql"><code>let fromUnixTime = (t: real) {
datetime(1970-01-01) + t * 1sec
};
source
| extend TimeGenerated = fromUnixTime(_time)
| extend Raw = _raw
| extend UnixTimestamp =_time
| where clz_dir in ("hana", "linux", "dns")
| project-away _raw, _time</code></pre><P>You have full control over your selections. For <STRONG>audit relevant long term retention</STRONG> consider the <STRONG>data lake tier</STRONG>. SAP LogServ data is being mirrored to the <STRONG>Sentinel Data Lake</STRONG> for the same period of time as your Analytics tier setting (typically 30 days). You can extend that period on the lake up to 12 years at low cost. Learn more about security data lake tiers <A href="https://learn.microsoft.com/azure/sentinel/manage-data-overview?#how-data-tiers-and-retention-work" target="_blank" rel="noopener nofollow noreferrer">here</A>. See a video on capabilities <A href="https://www.youtube.com/watch?v=4CUK-eJBNI0" target="_blank" rel="noopener nofollow noreferrer">here</A>.</P><P> </P><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="tiers-retention-defender-portal.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/289637i971470F7EC4D6812/image-size/large?v=v2&px=999" role="button" title="tiers-retention-defender-portal.png" alt="tiers-retention-defender-portal.png" /></span></P><P> </P><P> </P><P>By design the LogServ connector comes with a built-in table in Analytics tier set up for real-time SAP threat protection needs. The table is called SAPLogServ_CL. Weigh retention time, real time needs, and <A href="https://techcommunity.microsoft.com/blog/microsoft-security-blog/microsoft-sentinel-data-lake-pricing-preview/4433919" target="_blank" rel="noopener nofollow noreferrer">storage cost</A>. See <A href="https://learn.microsoft.com/azure/sentinel/manage-data-overview?#compare-the-analytics-and-data-lake-tiers" target="_blank" rel="noopener nofollow noreferrer">this article</A> for additional details and tier comparison.</P><P>Microsoft recommends to distinguish between primary (critical, real-time monitoring) and secondary security data (infrequently needed, compliance data, high-volume). The security data lake tier reflects that with capabilities and cost.</P><P> </P><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="Picture1.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/286520iA39B6980EE12A947/image-size/large?v=v2&px=999" role="button" title="Picture1.png" alt="Picture1.png" /></span></P><P> </P><H1 id="toc-hId-1209172229">What about network traffic cost (ingress)?</H1><P>Great, the data collection rule takes care of cost-efficient log ingest based on customizable filters, but what about the involved network traffic? At the time of writing and since many years all ingress to Azure from outside is free. </P><P>When in doubt, check the official <A href="https://azure.microsoft.com/pricing/details/bandwidth/" target="_blank" rel="noopener nofollow noreferrer">Azure Bandwith pricing page</A> for the latest info.</P><H1 id="toc-hId-1012658724">Final Words</H1><P>That’s a wrap <span class="lia-unicode-emoji" title=":burrito:">🌯</span>. Today you saw how a single line of KQL (Kusto Query Language) makes all the difference between drinking from the SAP RISE logs firehose that is SAP LogServ and selectively choosing SAP logs that mean something to your use case. The Microsoft Sentinel Data Lake powers your long term retention needs while the "hot" Log Analytics tables power your SAP real-time threat protections .</P><P>Get started with your deployment from <A href="https://community.sap.com/t5/enterprise-resource-planning-blog-posts-by-sap/sap-logserv-integration-with-microsoft-sentinel-for-sap-rise-customers-is/bc-p/14089301" target="_blank">here</A>. Stay tune for more detections and security content.</P><P>What use cases and detections are you implementing with LogServ and Microsoft Sentinel? Let me know in the comments or reach out directly.</P><P>Cheers Martin</P>2025-05-23T16:18:26.636000+02:00https://community.sap.com/t5/enterprise-resource-planning-blog-posts-by-members/ultimate-blog-series-sap-logserv-integration-with-microsoft-sentinel/ba-p/14126401Ultimate Blog Series: SAP LogServ Integration with Microsoft Sentinel2025-06-13T09:16:46.846000+02:00Martin-Pankrazhttps://community.sap.com/t5/user/viewprofilepage/user-id/143781<P><EM>TLDR; let me <A href="https://community.sap.com/t5/enterprise-resource-planning-blog-posts-by-sap/sap-logserv-integration-with-microsoft-sentinel-for-sap-rise-customers-is/bc-p/14089301" target="_blank">deploy already</A> (scroll down there to the prerequisites section)! </EM></P><P>Welcome to the landing page of this blog series on the SAP LogServ solution in Microsoft Sentinel. Find all the things you always wanted to know and more.</P><P> </P><H1 id="toc-hId-1603302212">Beyond Application Monitoring: Complete SAP RISE Visibility</H1><P>Running RISE with SAP, S/4HANA Cloud Private Edition, or SAP Cloud ERP private? Microsoft Sentinel by itself already delivers powerful SAP application-layer monitoring – tracking SAP user activity, business transactions, and critical events while correlating them with threat signals across your entire IT estate. <STRONG>That's just the beginning.</STRONG></P><P>SAP LogServ is an optional service in your SAP Cloud ERP private package that unlocks access to all logs from SAP's managed services. It takes your security posture to the next level by extending Sentinel's reach deep into your infrastructure managed by SAP. Think complete HANA database insights, system-level security telemetry, and audit trails - all flowing seamlessly into your existing security operations workflow.</P><P><STRONG>The result</STRONG>: Your security team finally gets full visibility into the managed SAP stack, from business logic to infra to database layer.</P><P> </P><H1 id="toc-hId-1406788707">What This Series Covers</H1><P>Comprehensive guidance from planning your LogServ + Sentinel deployment, log selection, customizing the solution, to advanced threat protection. Blogs are co-authored by SAP SE and Microsoft engineering.</P><P> </P><TABLE><TBODY><TR><TD width="292.177px" height="50px"><P><STRONG>Part</STRONG></P></TD><TD width="438.49px" height="50px"><P><STRONG>Topic</STRONG></P></TD></TR><TR><TD width="292.177px" height="77px"><P><SPAN><A href="https://community.sap.com/t5/enterprise-resource-planning-blog-posts-by-sap/announcing-limited-preview-of-sap-logserv-integration-with-microsoft/ba-p/13942180" target="_blank">Limited Preview Announcement</A></SPAN></P><P><SPAN>Lead author: Hemanth</SPAN></P></TD><TD width="438.49px" height="77px"><P>Initial introduction to the solution and integration between LogServ and Microsoft Sentinel</P></TD></TR><TR><TD width="292.177px" height="77px"><P><SPAN><A href="https://community.sap.com/t5/enterprise-resource-planning-blog-posts-by-sap/sap-logserv-integration-with-microsoft-sentinel-for-sap-rise-customers-is/bc-p/14089301" target="_blank">General Availability Announcement</A></SPAN></P><P><SPAN>Lead author: Hemanth</SPAN></P></TD><TD width="438.49px" height="77px"><P>Deployment overview with <STRONG>Step-by-step SAP LogServ connector setup in Sentinel</STRONG>, insights on prerequisites</P></TD></TR><TR><TD><P><A href="https://community.sap.com/t5/enterprise-resource-planning-blog-posts-by-members/first-smoke-test-after-sap-logserv-solution-deployment-in-microsoft/ba-p/14142675" target="_blank"><SPAN>Part 0: First Smoke test</SPAN></A></P><P><SPAN>Lead author: Martin</SPAN></P></TD><TD><P>Due to the asynchronous integration between SAP LogServ and Microsoft Sentinel, it's advisable to perform a smoke test yourself before sharing your config data with SAP for speedy onboarding. Here is how.</P></TD></TR><TR><TD width="292.177px" height="77px"><P><SPAN><A href="https://community.sap.com/t5/enterprise-resource-planning-blog-posts-by-members/microsoft-sentinel-for-sap-goes-agentless/ba-p/13960238" target="_blank">Part 1: Microsoft Sentinel for SAP goes agentless</A></SPAN></P><P><SPAN>Lead author: Martin</SPAN></P></TD><TD width="438.49px" height="77px"><P>SAP ERP Application layer integration with agentless data connector in Sentinel Solution for SAP</P></TD></TR><TR><TD width="292.177px" height="104px"><P><A href="https://community.sap.com/t5/enterprise-resource-planning-blog-posts-by-members/how-to-customize-your-sap-logserv-solution-in-microsoft-sentinel/ba-p/14110388" target="_blank">Part 2: How to customize your SAP LogServ solution in Microsoft Sentinel</A></P><P><EM><FONT color="#FF00FF">Featuring</FONT>: Sentinel Data Lake</EM></P><P>Lead author: Martin</P></TD><TD width="438.49px" height="104px"><P>Understand log types available in LogServ (volume, cost, threat protection value, etc); how to filter logs, configure long term retention for compliance needs, and how to customize the solution in Sentinel to optimize cost, </P></TD></TR><TR><TD width="292.177px" height="104px"><P><A href="https://community.sap.com/t5/enterprise-resource-planning-blog-posts-by-members/deploy-built-in-sap-logserv-detection-rules-in-microsoft-sentinel-and/ba-p/14141749" target="_blank">Part 3: Deploy built-in detection rules and extend to your needs</A></P><P><SPAN>Lead author: Martin</SPAN></P></TD><TD width="438.49px" height="104px"><P>See the already available analytic rules shipped by SAP, and discover how to craft your own based on your needs</P></TD></TR><TR><TD><P><A href="https://community.sap.com/t5/enterprise-resource-planning-blog-posts-by-members/gaining-operational-insights-with-the-sap-logserv-workbook-on-microsoft/ba-p/14165489" target="_blank">Part 4: Observability of SAP LogServ on Microsoft Sentinel</A></P><P><SPAN>Lead author: Martin</SPAN></P></TD><TD><P data-unlink="true">Gain operational insights with the built-in Workbook on Microsoft Sentinel for SAP LogServ. Understand log ingestion patterns, create alerts for anonmalies, and discover available sources visually.</P></TD></TR></TBODY></TABLE><P> </P><P><STRONG>Target audiences</STRONG>: SAP Basis admins, security architects, SOC analysts, and compliance teams looking to enhance their SAP monitoring capabilities.</P><P> </P><P><div class="video-embed-center video-embed"><iframe class="embedly-embed" src="https://cdn.embedly.com/widgets/media.html?src=https%3A%2F%2Fwww.youtube.com%2Fembed%2FPTKMmzD49zs%3Ffeature%3Doembed&display_name=YouTube&url=https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DPTKMmzD49zs&image=https%3A%2F%2Fi.ytimg.com%2Fvi%2FPTKMmzD49zs%2Fhqdefault.jpg&type=text%2Fhtml&schema=youtube" width="600" height="337" scrolling="no" title="#243 - TOW SAP LogServ integration with Microsoft Sentinel (Hemanth Kusampudi, M. Pankraz, B. Ulke)" frameborder="0" allow="autoplay; fullscreen; encrypted-media; picture-in-picture;" allowfullscreen="true"></iframe></div></P><P> </P><H1 id="toc-hId-1210275202">Architecture Overview</H1><P>Reference diagrams for planning your implementation</P><P><STRONG>Detailed Component Architecture</STRONG></P><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="MartinPankraz_0-1749734996404.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/273643iB86A985C7CCEB99E/image-size/large?v=v2&px=999" role="button" title="MartinPankraz_0-1749734996404.png" alt="MartinPankraz_0-1749734996404.png" /></span></P><P> </P><P><STRONG>High-Level Integration Flow across the whole stack</STRONG></P><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="MartinPankraz_1-1749734996417.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/273644i4ADEBE89941DC908/image-size/large?v=v2&px=999" role="button" title="MartinPankraz_1-1749734996417.png" alt="MartinPankraz_1-1749734996417.png" /></span></P><P> </P><H3 id="toc-hId-1271927135">Ready to transform your SAP Cloud ERP private security posture? Let's get started from <A href="https://community.sap.com/t5/enterprise-resource-planning-blog-posts-by-sap/sap-logserv-integration-with-microsoft-sentinel-for-sap-rise-customers-is/bc-p/14089301" target="_blank">here</A>.</H3><P>Which logs from RISE do you need most? Let me know in the comments or reach out directly.</P><P>Cheers Martin and Hemanth</P>2025-06-13T09:16:46.846000+02:00https://community.sap.com/t5/enterprise-resource-planning-blog-posts-by-members/deploy-built-in-sap-logserv-detection-rules-in-microsoft-sentinel-and/ba-p/14141749Deploy built-in SAP LogServ detection rules in Microsoft Sentinel and extend to your needs - Part 32025-07-02T14:13:55.796000+02:00Martin-Pankrazhttps://community.sap.com/t5/user/viewprofilepage/user-id/143781<P><EM><SPAN>Find your way to our central blog series entry </SPAN></EM><SPAN><A href="https://community.sap.com/t5/enterprise-resource-planning-blog-posts-by-members/ultimate-blog-series-sap-logserv-integration-with-microsoft-sentinel/ba-p/14126401" target="_blank"><EM>here</EM></A><EM>.</EM></SPAN></P><P>Dear community,</P><P>Following the <SPAN><A href="https://community.sap.com/t5/enterprise-resource-planning-blog-posts-by-sap/sap-logserv-integration-with-microsoft-sentinel-for-sap-rise-customers-is/ba-p/14085387" target="_blank">product release blog</A></SPAN> by SAP regarding the integration of SAP LogServ and Microsoft Sentinel, I am going to share some details on the built-in detection rules and how you can build upon them.</P><P>The most discussed log in my customer conversations so far was SAP HANA database. So, let’s start with that.</P><P> </P><H1 id="toc-hId-1605003314">Discover the available built-in detections from the Content Hub</H1><P>Find the relevant section both from the Azure or the unified Defender portal under Rule templates in the Analytics section. They are available from version 3.0.2 of the SAP LogServ solution.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="MartinPankraz_0-1751377056812.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/281358iEBA01CB3C314647B/image-size/large?v=v2&px=999" role="button" title="MartinPankraz_0-1751377056812.png" alt="MartinPankraz_0-1751377056812.png" /></span></P><P> </P><P>Typical database threat scenarios involve tampering with audit log settings, admin authorizations or privileged role assignments.</P><P>We have taken the existing battle-proven Microsoft Sentinel Solution for SAP rules for HANA DB and translated them to be compatible with the LogServ schema. The raw log source is Syslog in both cases. So, the only remaining step was “unboxing” of the JSON wrapper.</P><P>To understand the individual columns of the LogServ output, see SAP’s <SPAN><A href="https://help.sap.com/docs/SAP_HANA_PLATFORM/b3ee5778bc2e4a089d3299b82ec762a7/0a57444d217649bf94a19c0b68b470cc.html" target="_blank" rel="noopener noreferrer">HANA Audit Trail Layout for Trail Target documentation</A></SPAN>. For ease of use we have numbered the columns and applied the same names SAP mentions on their docs.</P><P> </P><H1 id="toc-hId-1408489809">Activate the new rules</H1><P>Navigate to the Analytics pane and select the rule you want, click “Create Rule” from the button with the three dots and follow the configuration wizard. See the severity classification and pre-defined MITRE attack framework mapping. These mappings help streamline your SOC analysts’ triage efforts.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="MartinPankraz_1-1751377056832.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/281356i19AA2ACAEDEEFE09/image-size/large?v=v2&px=999" role="button" title="MartinPankraz_1-1751377056832.png" alt="MartinPankraz_1-1751377056832.png" /></span></P><P> </P><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="MartinPankraz_2-1751377056849.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/281357i9EA86347E8241054/image-size/large?v=v2&px=999" role="button" title="MartinPankraz_2-1751377056849.png" alt="MartinPankraz_2-1751377056849.png" /></span></P><P> </P><P>Verify the rule execution schedule and consider automated responses where feasible. Creating ServiceNow tickets for instance is a popular action. See my <SPAN><A href="https://community.sap.com/t5/enterprise-resource-planning-blog-posts-by-members/from-zero-to-hero-security-coverage-with-microsoft-sentinel-for-your/ba-p/13561790" target="_blank">dedicated blog series</A></SPAN> on SOAR for SAP for inspiration.</P><P>From the “Review + Create” section click save. Your rule is now live!</P><P> </P><H1 id="toc-hId-1211976304">Build upon or extend the provided analytic rules</H1><P>Since the Kusto Query is fully transparent to you (see above screenshot) it is easy to derive your own tailored scenarios from it.</P><P>For instance, take analytic rule “Deactivation of Audit Trail” and extend the client IP address attribute (client_ip_address__col_7) to project in plain English if that is an internal or external IP.</P><pre class="lia-code-sample language-sql"><code>| extend GeoLocation= iff(ipv4_is_private(client_ip_address__col_7),
dynamic({"IsPrivate": true}),
geo_info_from_ip_address(client_ip_address__col_7))</code></pre><P>I have a feeling this might be of interest during your incident triage process <span class="lia-unicode-emoji" title=":winking_face:">😉</span></P><P> </P><H1 id="toc-hId-1015462799">Final Words</H1><P>That’s a wrap<span class="lia-unicode-emoji" title=":burrito:">🌯</span>. You saw today how to discover the built-in analytic rules of the SAP LogServ solution in Microsoft Sentinel and how easy it is to extend them for your own individual needs. The rule catalog gets extended continuously based on customer demand.</P><P>Your existing investments in SAP infrastructure detections in Sentinel can easily be made compatible with the LogServ schema, because SAP simply forwards the logs unaltered as raw messages. The only required step is the unboxing of their JSON root message.</P><P>#Kudos to <a href="https://community.sap.com/t5/user/viewprofilepage/user-id/1619343">@Hemanth_Kusampudi</a> and team for the partnership.</P><P>Get started with your deployment from <SPAN><A href="https://community.sap.com/t5/enterprise-resource-planning-blog-posts-by-sap/sap-logserv-integration-with-microsoft-sentinel-for-sap-rise-customers-is/bc-p/14089301" target="_blank">here</A> today</SPAN>.</P><P>Which detections or analytic rules for RISE do you need most? Let me know in the comments or reach out directly.</P><P>Cheers Martin</P>2025-07-02T14:13:55.796000+02:00https://community.sap.com/t5/enterprise-resource-planning-blog-posts-by-members/first-smoke-test-after-sap-logserv-solution-deployment-in-microsoft/ba-p/14142675First smoke test after SAP LogServ solution deployment in Microsoft Sentinel - Part 02025-07-02T14:34:47.839000+02:00Martin-Pankrazhttps://community.sap.com/t5/user/viewprofilepage/user-id/143781<P><EM><SPAN>Find your way to our central blog series entry </SPAN></EM><SPAN><A href="https://community.sap.com/t5/enterprise-resource-planning-blog-posts-by-members/ultimate-blog-series-sap-logserv-integration-with-microsoft-sentinel/ba-p/14126401" target="_blank"><EM>here</EM></A><EM>.</EM></SPAN></P><P>Dear community,</P><P>Due to the asynchronous integration between SAP LogServ and Microsoft Sentinel, it's advisable to perform a smoke test yourself before sharing your config data with SAP. This helps confirm if your receiving connector setup works and ensures the correct configuration will be shared with SAP the first time round.</P><P> </P><H1 id="toc-hId-1605032233">Run a smoke test for ease of mind</H1><P>Once the SAP LogServ push-connector is deployed on Microsoft Sentinel, you can start posting data towards its data collection endpoint. Use the <SPAN><A href="https://github.com/MartinPankraz/LogServAccelerators" target="_blank" rel="noopener nofollow noreferrer">provided REST client collection</A>, or scripts</SPAN> to replicate the exact requests details that LogServ is performing too.</P><P>Maintain the variables as per your environment, see the LogServ sample payload and start posting. A working request shows http code 204 with no content on the response. See a sample output from the provided powershell script for reference. I prefer REST clients but people are different <span class="lia-unicode-emoji" title=":smiling_face_with_sunglasses:">😎</span></P><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="MartinPankraz_0-1751458923696.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/281782i671E08F07FB909B9/image-size/large?v=v2&px=999" role="button" title="MartinPankraz_0-1751458923696.png" alt="MartinPankraz_0-1751458923696.png" /></span></P><P> </P><P>Find the parameters from the SAP LogServ Sentinel <STRONG>connector wizard</STRONG> on initial connect (see screenshot below). You can also get them directly from the individual resources. The data collection endpoint and data collection rule are created in the same resource group as your Log Analytics workspace underpinning Sentinel. They are prefixed with “SAPLogServ”. The app registration on Entra ID can be found from the Entra Application ID field.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="MartinPankraz_1-1751458923709.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/281781iE03B6FBB91C6BDA4/image-size/large?v=v2&px=999" role="button" title="MartinPankraz_1-1751458923709.png" alt="MartinPankraz_1-1751458923709.png" /></span></P><P> </P><P>Use the 2 KQL queries below to inspect your first data entry on the SAPLogServ_CL table in Sentinel.</P><pre class="lia-code-sample language-sql"><code>SAPLogServ_CL
| take 10</code></pre><pre class="lia-code-sample language-sql"><code>SAPLogServ_CL
| summarize count() by clz_dir, clz_subdir
| order by clz_dir asc, clz_subdir asc</code></pre><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="MartinPankraz_2-1751459555337.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/281792i2C09B46070C0EB64/image-size/large?v=v2&px=999" role="button" title="MartinPankraz_2-1751459555337.png" alt="MartinPankraz_2-1751459555337.png" /></span></P><P> </P><P>Wait a minute or two on first try. The population of new tables takes a short time initially.</P><P>Alternatively, deploy the <STRONG>SAP LogServ insights workbook</STRONG> on Sentinel for visual oversight. </P><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="Picture2.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/293205i51387FEFC9EF3492/image-size/large?v=v2&px=999" role="button" title="Picture2.png" alt="Picture2.png" /></span></P><P> </P><P>Once saved to your workspace, start looking for the smoke test result. It covers all your observabilty needs going forward.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="Picture1.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/293203i1EC52AF633B51536/image-size/large?v=v2&px=999" role="button" title="Picture1.png" alt="Picture1.png" /></span></P><P> </P><H1 id="toc-hId-1408518728">Hurray you have a functioning data collection endpoint for the SAP LogServ data<span class="lia-unicode-emoji" title=":party_popper:">🎉</span></H1><P>Now, continue your onboarding journey by sharing the config data with SAP over your chosen channel. Find the details on SAP's blog <A href="https://community.sap.com/t5/enterprise-resource-planning-blog-posts-by-sap/sap-logserv-integration-with-microsoft-sentinel-for-sap-rise-customers-is/bc-p/14089301" target="_blank">here</A>.</P><H1 id="toc-hId-1212005223">What if you don’t see the data entry on the LogServ table?</H1><OL><LI>Verify the connection details: Did you really hit the right endpoint? Are you looking in the right tenant and log analytics workspace?</LI><LI>Verify selection criteria: Is your Time range filter accurate? The smoke tests create entries for NOW or 30mins earlier in UTC.</LI><LI>Did enough time pass on the initial table population? Consider a retry of the KQL query.</LI><LI>Verify the Data collection rule has not been changed to filter all results or similar. See <SPAN><A href="https://community.sap.com/t5/enterprise-resource-planning-blog-posts-by-members/how-to-customize-your-sap-logserv-solution-in-microsoft-sentinel-part-2/ba-p/14110388" target="_blank">this blog part</A></SPAN> and KQL snippet for more details.</LI></OL><P> </P><H2 id="toc-hId-1144574437">Deployment fully messed up?</H2><P>The simplest way to a fresh start is a delete and redeployment of the Log Analytics workspace. In case that is not an option you need to delete the LogServ connector resources to reset the LogServ solution in Sentinel. The data collection endpoint, data collection rule and entra id app registration can be deleted from the Azure portal. But the data connector itself needs to be deleted via API.</P><P>For your convenience, use this <A href="https://github.com/MartinPankraz/LogServAccelerators/blob/main/SAP-LogServ-bruno-collection.json" target="_blank" rel="noopener nofollow noreferrer">REST API request collection</A> to drop the resources. Once performed the LogServ connector UI will activate the deploy button again. In case you went fully bazooka and also deleted the SAPLogServ_CL table from your Log Analytics worksapce that needs to be reverted too. If the table had data you need to run a restore operation from <A href="https://learn.microsoft.com/cli/azure/monitor/log-analytics/workspace/table/restore?view=azure-cli-latest" target="_blank" rel="noopener nofollow noreferrer">Azure CLI</A>.</P><P> </P><H1 id="toc-hId-818978213">Final Words</H1><P>That’s a wrap<span class="lia-unicode-emoji" title=":burrito:">🌯</span>. You saw today how to streamline your onboarding experience of SAP LogServ in Microsoft Sentinel. Simple smoke tests <STRONG>ensure a speedy onboarding</STRONG> and <STRONG>confidence in the shared setup</STRONG> configuration.</P><P>#Kudos to <a href="https://community.sap.com/t5/user/viewprofilepage/user-id/1619343">@Hemanth_Kusampudi</a> and team for the partnership.</P><P>Get started with your deployment from <SPAN><A href="https://community.sap.com/t5/enterprise-resource-planning-blog-posts-by-sap/sap-logserv-integration-with-microsoft-sentinel-for-sap-rise-customers-is/bc-p/14089301" target="_blank">here</A> today</SPAN>.</P><P>Cheers Martin</P>2025-07-02T14:34:47.839000+02:00https://community.sap.com/t5/enterprise-resource-planning-blog-posts-by-members/gaining-operational-insights-with-the-sap-logserv-workbook-on-microsoft/ba-p/14165489Gaining Operational Insights with the SAP LogServ Workbook on Microsoft Sentinel - Part 42025-07-29T09:54:55.825000+02:00Martin-Pankrazhttps://community.sap.com/t5/user/viewprofilepage/user-id/143781<P class=""><EM>Find your way to our central blog series entry <A class="" href="https://community.sap.com/t5/enterprise-resource-planning-blog-posts-by-members/ultimate-blog-series-sap-logserv-integration-with-microsoft-sentinel/ba-p/14126401" target="_blank">here</A>.</EM></P><P class="">Dear community,</P><P class="">Following our previous deep-dives into LogServ usage with Microsoft Sentinel for SAP and customization, let's explore the operational insights available through Sentinel's built-in workbook for SAP LogServ monitoring.</P><H2 id="toc-hId-1736049480">Near real-time visibility atyYour fingertips</H2><P class="">The <STRONG>SAP LogServ Insights Dashboard</STRONG> on Azure transforms raw log data into actionable intelligence. Navigate to <STRONG>Microsoft Sentinel > Workbooks > Templates</STRONG> and locate the pre-configured dashboard. </P><P class=""><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="Picture2.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/293222iFBE1F89FD23391C3/image-size/large?v=v2&px=999" role="button" title="Picture2.png" alt="Picture2.png" /></span></P><P> </P><P class="">Save to your workspace and open to get started. Make sure to select the Log Analytics workspace powering your Sentinel tenant first.</P><P class=""><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="Picture3.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/293223i28D67AB9E91A2221/image-size/large?v=v2&px=999" role="button" title="Picture3.png" alt="Picture3.png" /></span></P><P> </P><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="Picture4.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/293247i579009AA87BB7D23/image-size/large?v=v2&px=999" role="button" title="Picture4.png" alt="Picture4.png" /></span></P><P> </P><H2 id="toc-hId-1539535975">Key metrics that matter</H2><P class="">The workbook provides comprehensive monitoring across four critical dimensions:</P><UL class=""><LI><STRONG>Total Events</STRONG>: Track log ingestion volumes (4M events shown)</LI><LI><STRONG>Active Systems</STRONG>: Monitor connected hosts (36 active systems)</LI><LI><STRONG>Data Freshness</STRONG>: Near real-time status indicators with color-coded alerts</LI><LI><STRONG>Log Distribution</STRONG>: Understand log ingestion patterns across your SAP landscape components</LI></UL><P class="">The <STRONG>Log Volume Timeline</STRONG> reveals ingestion patterns, helping identify peak usage periods and potential anomalies. Notice how the 24-hour view shows consistent data flow with the characteristic SAP workload patterns.</P><P class="">Pay attention to the status legend: <STRONG>Fresh</STRONG> (green), <STRONG>Recent</STRONG> (orange), <STRONG>Older</STRONG> (red), and <STRONG>Stale</STRONG> (dark red). These indicators help SAP Security and SOC teams quickly assess data currency - critical for incident response.</P><P class="">The workbook automatically refreshes, ensuring your security operations center maintains current visibility into your SAP RISE environment's log ingestion health.</P><H2 id="toc-hId-1343022470">Proactive Alert Configuration</H2><P class="">Transform workbook insights into actionable alerts using the <STRONG>Create Alert Rule</STRONG> button visible above the timeline. This creates Azure Monitor alerts directly from your LogServ metrics, enabling threshold-based notifications for critical scenarios like data ingestion anomalies or system connectivity issues. Configure alert rules to monitor total event volumes, data freshness status changes, or active system counts falling below expected baselines.</P><P class="">Azure Monitor's alert engine integrates seamlessly with action groups for email, SMS, Microsoft Teams, or webhook notifications to your operations team. For detailed configuration guidance, reference the <A class="" href="https://learn.microsoft.com/en-us/azure/azure-monitor/alerts/alerts-overview" target="_blank" rel="noopener nofollow noreferrer">Azure Monitor alerts documentation</A>.</P><P class=""><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="Picture5.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/293258i28E827FE9FFB237F/image-size/large?v=v2&px=999" role="button" title="Picture5.png" alt="Picture5.png" /></span></P><P> </P><H3 id="toc-hId-1275591684">For those of you who prefer PowerBI for dashboarding...</H3><P>See <A href="https://learn.microsoft.com/en-us/azure/sentinel/powerbi" target="_blank" rel="noopener nofollow noreferrer">this Microsoft Learn article</A> how to craft a dashboard from the Microsoft Sentinel queries for SAP LogServ.</P><P> </P><H1 id="toc-hId-1015462799" id="toc-hId-820912741">Final Words</H1><P>That’s a wrap<span class="lia-unicode-emoji" title=":burrito:">🌯</span>. You saw today how to observe log ingestion health and use data freshness indicators for your SAP LogServ solution in Microsoft Sentinel. The built-in views are easy to <A href="https://learn.microsoft.com/azure/sentinel/monitor-your-data?tabs=defender-portal" target="_blank" rel="noopener nofollow noreferrer">extend and customize</A> for your own individual needs.</P><P>#Kudos to <A href="https://community.sap.com/t5/user/viewprofilepage/user-id/1619343" target="_blank">@Hemanth_Kusampudi</A> and team for the partnership.</P><P>Get started with your deployment from<SPAN> </SPAN><SPAN><A href="https://community.sap.com/t5/enterprise-resource-planning-blog-posts-by-sap/sap-logserv-integration-with-microsoft-sentinel-for-sap-rise-customers-is/bc-p/14089301" target="_blank">here</A> today</SPAN>.</P><P>What visuals are most helpful for your daily operations? Do you want special breakdowns for HANA database, and proxy components like the SAP WebDispatcher? <SPAN>Let us know in the comments or reach out directly.</SPAN></P><P><SPAN>Cheers Martin & Hemanth</SPAN></P>2025-07-29T09:54:55.825000+02:00https://community.sap.com/t5/enterprise-resource-planning-blog-posts-by-members/deploy-built-in-sap-logserv-detection-rules-in-microsoft-sentinel-and/bc-p/14225926#M72053Re: Deploy built-in SAP LogServ detection rules in Microsoft Sentinel and extend to your needs - Par2025-09-23T17:05:26.744000+02:00Martin-Pankrazhttps://community.sap.com/t5/user/viewprofilepage/user-id/143781<P>Hey <a href="https://community.sap.com/t5/user/viewprofilepage/user-id/2052606">@Utkarsh1113</a>, this blog us about logserv integration. See BTP related integration <A href="https://learn.microsoft.com/en-us/azure/sentinel/sap/sap-btp-solution-overview" target="_blank" rel="noopener nofollow noreferrer">here</A>. Any detection logic on user priveleges can be applied. Deactivating access requires use of playbooks and BTP api calls however. See <A href="https://blogs.sap.com/2023/05/22/from-zero-to-hero-security-coverage-with-microsoft-sentinel-for-your-critical-sap-security-signals-youre-gonna-hear-me-soar-part-1/" target="_blank" rel="noopener noreferrer">this sample</A> here regarding SAP CIS for inspiration.</P><P>Cheers Martin</P>2025-09-23T17:05:26.744000+02:00https://community.sap.com/t5/enterprise-resource-planning-blog-posts-by-sap/sap-logserv-integration-with-microsoft-sentinel-for-sap-rise-customers-is/bc-p/14226606#M61914Re: SAP LogServ integration with Microsoft Sentinel for SAP RISE customers is now GA.2025-09-24T10:21:43.700000+02:00Martin-Pankrazhttps://community.sap.com/t5/user/viewprofilepage/user-id/143781<P><a href="https://community.sap.com/t5/user/viewprofilepage/user-id/858139">@krishnakbhat</a> SAP has a LogServ document they share as part of RISE conversation which details this integration. Beyond that there is the official Microsoft reference <A href="https://learn.microsoft.com/en-us/azure/sentinel/sap/solution-partner-overview#solutions-provided-by-sap-as-vendor" target="_blank" rel="noopener nofollow noreferrer">here</A>.</P><P>Finally, pointing out this is SAP's official blog page and the post authored by the product lead of SAP LogServ. </P><P>Let us know if doubts remain.</P>2025-09-24T10:21:43.700000+02:00https://community.sap.com/t5/technology-blog-posts-by-members/sap-principal-propagation-without-secrets-how-managed-identity-in-apim/bc-p/14232036#M175736Re: SAP Principal Propagation without Secrets: How Managed Identity in APIM Simplifies Everything2025-09-30T21:08:16.013000+02:00Martin-Pankrazhttps://community.sap.com/t5/user/viewprofilepage/user-id/143781<P>Hey <a href="https://community.sap.com/t5/user/viewprofilepage/user-id/2093464">@m1m</a>,</P><P>your scenario is described in another part of the series <A href="https://community.sap.com/t5/technology-blog-posts-by-members/perform-sap-principal-propagation-with-microsoft-entra-id-for-sap/ba-p/13860532" target="_blank">here</A>. Injecting optional IAS on top of the mandatory components is not described. Complexity and points of failure increase of course. Let the community know how you get on.</P><P>Cheers Martin</P>2025-09-30T21:08:16.013000+02:00https://community.sap.com/t5/enterprise-resource-planning-blog-posts-by-members/sap-ariba-is-now-integrated-with-microsoft-sentinel-solution-for-sap/ba-p/14324356SAP Ariba is now integrated with Microsoft Sentinel Solution for SAP2026-02-09T13:34:21.343000+01:00Martin-Pankrazhttps://community.sap.com/t5/user/viewprofilepage/user-id/143781<P><EM>Quick link to <A href="https://github.com/Azure-Samples/Sentinel-For-SAP-Community/tree/main/integration-artifacts/solution-packages/baseline-extension-package#sap-ariba" target="_blank" rel="noopener nofollow noreferrer">GitHub</A>.</EM></P><P>Supply chain is a critical topic in almost every industry these days. We live in times where a controversial social media post and actions of government officials can disrupt factory operations almost the next day. See this Reuters (2025) <SPAN><A href="https://www.reuters.com/business/autos-transportation/volkswagen-prepares-halt-production-key-models-amid-chip-supply-crunch-bild-2025-10-21/" target="_blank" rel="noopener nofollow noreferrer">article</A></SPAN> that sheds light on car production halt in Germany caught in the crossfire of political turmoil in 2 other countries. SAP Ariba helps diversify the risk between buyers and suppliers in tightly interconnected supply chains.</P><P>What a juicy target for cyber criminals one might say <span class="lia-unicode-emoji" title=":winking_face:">😉</span></P><P>Therefore, meet the new kid on the blog when it comes to <STRONG>Microsoft Sentinel for SAP integration – SAP Ariba.</STRONG></P><P>This <STRONG>cloud-native integration</STRONG> adds <STRONG>real-time threat detection, investigation, and response</STRONG> to your SAP Ariba environment and puts it into the context of your wider IT estate.</P><H1 id="toc-hId-1660500131"><SPAN>The bigger picture</SPAN></H1><P>Attackers use the easiest way in. Each month the <SPAN><A href="https://support.sap.com/en/my-support/knowledge-base/security-notes-news.html?anchorId=section_370125364" target="_blank" rel="noopener noreferrer">SAP Security Patch Day</A></SPAN> starts a new race between hackers and defenders despite responsible disclosure obligations to allow a head start to defenders on reported vulnerabilities etc.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="MartinPankraz_0-1770639300028.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/370349iD10DA896EDF4F203/image-size/large?v=v2&px=999" role="button" title="MartinPankraz_0-1770639300028.png" alt="MartinPankraz_0-1770639300028.png" /></span></P><P> </P><P>This race wears down defenses eventually – a gap is deemed to happen. Therefore, you need to be prepared to identify attackers in your IT landscape and be quick to lock them out again before they reach valuable targets.</P><P>Seeing the context and trail of the interconnected signals that the attacker leaves behind are key to identify compromise.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="MartinPankraz_1-1770639300036.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/370350iEEA80D89536D8B0A/image-size/large?v=v2&px=999" role="button" title="MartinPankraz_1-1770639300036.png" alt="MartinPankraz_1-1770639300036.png" /></span></P><P> </P><H1 id="toc-hId-1463986626"><SPAN>How It Works</SPAN></H1><OL><LI>Create an application on your Ariba Developer portal to allow access to <SPAN><A href="https://help.sap.com/docs/ariba-apis/help-for-sap-ariba-developer-portal/steps-to-start-using-sap-ariba-apis" target="_blank" rel="noopener noreferrer">the audit-search api</A></SPAN> and collect your API key.</LI><LI>Deploy the<STRONG> latest </STRONG><SPAN><A href="https://github.com/Azure-Samples/Sentinel-For-SAP-Community/tree/main/integration-artifacts/solution-packages/baseline-extension-package" target="_blank" rel="noopener nofollow noreferrer"><STRONG>Microsoft Sentinel integration package</STRONG></A></SPAN> in SAP Integration Suite. See <SPAN><A href="https://youtu.be/PbO1S1E29Yk?si=RbloAwISvs-EiTcf&t=503" target="_blank" rel="noopener nofollow noreferrer">this video</A></SPAN> for a similar scenario for guidance. Ignore the ERP specific settings on Cloud Connector etc. They don’t apply to Ariba.</LI></OL><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="MartinPankraz_2-1770639300044.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/370351i07658876EAB5CE7B/image-size/large?v=v2&px=999" role="button" title="MartinPankraz_2-1770639300044.png" alt="MartinPankraz_2-1770639300044.png" /></span></P><P class="lia-indent-padding-left-30px" style="padding-left : 30px;">3. Configure a Destination on SAP BTP for your Ariba instance and the <SPAN><A href="https://api.sap.com/api/audit_search_v2/overview" target="_blank" rel="noopener noreferrer">audit search api</A></SPAN>.</P><P class="lia-indent-padding-left-30px" style="padding-left : 30px;"> </P><TABLE><TBODY><TR><TD><P><STRONG>Property</STRONG></P></TD><TD><P><STRONG>Value</STRONG></P></TD><TD><P><STRONG>Description</STRONG></P></TD></TR><TR><TD><P>Name</P></TD><TD><P>Ariba-[TenantId]</P></TD><TD><P>Destination name (e.g., Ariba-p2pTeSap-2)</P></TD></TR><TR><TD><P>Type</P></TD><TD><P>HTTP</P></TD><TD><P>Connection type</P></TD></TR><TR><TD><P>URL</P></TD><TD><P>https://[region.]openapi.ariba.com/api/audit-search/v2/[prod or sandbox]</P></TD><TD><P>SAP Ariba Audit Search API URL (Find your base URl under <A href="https://api.sap.com/api/audit_search_v2/overview" target="_blank" rel="noopener noreferrer">Configuration Details</A>)</P></TD></TR><TR><TD><P>Proxy Type</P></TD><TD><P>Internet</P></TD><TD><P>Always internet because of the cloud nature of the SAP service</P></TD></TR><TR><TD><P>Authentication</P></TD><TD><P>OAuth2ClientCredentials</P></TD><TD><P>For productive use</P></TD></TR><TR><TD><P>Client ID</P></TD><TD><P>[ClientId]</P></TD><TD><P>if applicable</P></TD></TR><TR><TD><P>Client Secret</P></TD><TD><P>[ClientSecret]</P></TD><TD><P>if applicable</P></TD></TR><TR><TD><P>Token Service URL</P></TD><TD><P>[TokenEndpoint]/v2/oauth/token</P></TD><TD><P>Ariba OAuth token endpoint</P></TD></TR></TBODY></TABLE><P> </P><TABLE><TBODY><TR><TD><P><STRONG>Additional Properties</STRONG></P></TD><TD><P><STRONG>Value</STRONG></P></TD><TD><P><STRONG>Description</STRONG></P></TD></TR><TR><TD><P>tenantId</P></TD><TD><P>[TenantId]</P></TD><TD><P>SAP Ariba tenant ID</P></TD></TR><TR><TD><P>apiKey</P></TD><TD><P>[apiKey]</P></TD><TD><P>Api key for your SAP Ariba tenant</P></TD></TR></TBODY></TABLE><P class="lia-indent-padding-left-30px" style="padding-left : 30px;">4. Deploy the agentless data connector for the Microsoft Sentinel Solution for SAP. See <SPAN><A href="https://www.youtube.com/watch?v=PbO1S1E29Yk" target="_blank" rel="noopener nofollow noreferrer">this video</A></SPAN> for a walk-through of the first steps and the official Microsoft Learn page <SPAN><A href="https://learn.microsoft.com/en-us/azure/sentinel/sap/deploy-sap-security-content?pivots=connection-agentless" target="_blank" rel="noopener nofollow noreferrer">here</A></SPAN>. Ignore the ERP specific settings on Cloud Connector etc. They don’t apply to Ariba</P><P class="lia-indent-padding-left-30px" style="padding-left : 30px;">5. Connect your Ariba flow on the data connector pane to start ingesting SAP Ariba logs.</P><P class="lia-indent-padding-left-30px" style="padding-left : 30px;">6. On the Advanced section supply the path “/community/SAPAribaAuditSearch” to point at the default route of the Ariba iFlow on SAP Integration Suite.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="MartinPankraz_3-1770639300059.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/370354iC0C90A0951CC6A51/image-size/large?v=v2&px=999" role="button" title="MartinPankraz_3-1770639300059.png" alt="MartinPankraz_3-1770639300059.png" /></span></P><P> </P><P>Observe the message flowing on Cloud Integration and Microsoft Sentinel. You can use the following query to verify the Ariba logs. Filter by AgentGuid in case you have multiple connections:</P><pre class="lia-code-sample language-sql"><code>SAPAuditLog
| where AgentGuid == "Ariba"</code></pre><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="MartinPankraz_0-1770640411492.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/370360i128C07A750025AC5/image-size/large?v=v2&px=999" role="button" title="MartinPankraz_0-1770640411492.png" alt="MartinPankraz_0-1770640411492.png" /></span></P><P> </P><P>Congratulations, you have successfully onboarded SAP Ariba to Sentinel for SAP <span class="lia-unicode-emoji" title=":smiling_face_with_sunglasses:">😎</span></P><P> </P><H1 id="toc-hId-1267473121">There is one more thing!</H1><P>Many of you are fronting Ariba with the SAP Cloud Identity Services. When you consult the attack graph from the beginning of this post, you already know that this is an important signal in the attack story. Identity compromise remains the number one attack path even in 2026. Have a look at the <SPAN><A href="https://aka.ms/mddr" target="_blank" rel="noopener nofollow noreferrer">Digital Defense Report</A></SPAN> 2025 for more details.</P><P>Onboard your SAP Cloud Identity Service amongst your SAP BTP subaccounts to Sentinel for SAP from <SPAN><A href="https://learn.microsoft.com/azure/sentinel/sap/deploy-sap-btp-solution" target="_blank" rel="noopener nofollow noreferrer">here</A></SPAN> to close that loop.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="MartinPankraz_5-1770639300071.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/370352i3FDAA65100063C9F/image-size/large/is-moderation-mode/true?v=v2&px=999" role="button" title="MartinPankraz_5-1770639300071.png" alt="MartinPankraz_5-1770639300071.png" /></span></P><P> </P><H1 id="toc-hId-1070959616">What you see is what you get</H1><OL><LI><STRONG>AI enabled unified Security Operations</STRONG></LI></OL><UL><LI>Correlate SAP Ariba events with enterprise telemetry in <STRONG>Microsoft Sentinel Solution for SAP</STRONG> and <STRONG>Microsoft Defender XDR </STRONG>ready for Microsoft Security Copilot.</LI><LI>Use <STRONG>prebuilt analytics rules</STRONG>, <STRONG>workbooks</STRONG>, and <STRONG>SOAR playbooks</STRONG> to detect and respond to threats like:</LI><UL><LI>Privilege escalations</LI><LI>Unauthorized configuration changes</LI><LI>Suspicious transactions</LI></UL></UL><OL><LI><STRONG>Compliance-Ready Log Retention</STRONG></LI></OL><UL><LI>Store SAP logs cost-efficient in <STRONG>Microsoft Sentinel Data Lake</STRONG> for up to <STRONG>12 years</STRONG>.</LI><LI>Support threat hunting involving SAP on the Sentinel Data lake through KQL jobs.</LI></UL><H1 id="toc-hId-874446111">What’s Next</H1><UL><LI>Enriching the mapping of the Ariba logs further to activate the remaining analytic rules provided by the SAP ERP private cloud offering.</LI><LI>Adding further Ariba specific detections. Which ones are top of mind for you? Reach out to me.</LI></UL><H1 id="toc-hId-677932606"><SPAN>Final Words</SPAN></H1><P>That's a wrap <span class="lia-unicode-emoji" title=":clapper_board:">🎬</span> you saw today how simple SAP Ariba integration with your SIEM product can be. Remember: bringing SAP apps under the protection of your central SIEM isn't just a checkbox - it's essential for comprehensive security and compliance across your entire IT estate.</P><P>Quick link to <A href="https://github.com/Azure-Samples/Sentinel-For-SAP-Community/tree/main/integration-artifacts/solution-packages/baseline-extension-package#sap-ariba" target="_blank" rel="noopener nofollow noreferrer">GitHub</A>.</P><P>#Kudos to <SPAN><A href="https://www.linkedin.com/in/emmadhussain/" target="_blank" rel="nofollow noopener noreferrer">Syed Ammad Hussain Shah</A></SPAN> for his contributions during the early preview.</P><P>Feel free to reach out to talk more SAP Ariba.</P><P>Cheers, Martin</P>2026-02-09T13:34:21.343000+01:00https://community.sap.com/t5/enterprise-resource-planning-blog-posts-by-members/sap-ariba-is-now-integrated-with-microsoft-sentinel-solution-for-sap/bc-p/14325740#M72580Re: SAP Ariba is now integrated with Microsoft Sentinel Solution for SAP2026-02-10T18:46:50.165000+01:00Martin-Pankrazhttps://community.sap.com/t5/user/viewprofilepage/user-id/143781<P><a href="https://community.sap.com/t5/user/viewprofilepage/user-id/2077782">@YashikaYTD</a> what threat scenario would that be? Can you elaborate? Happy to add when the scope checks out.</P>2026-02-10T18:46:50.165000+01:00https://community.sap.com/t5/enterprise-resource-planning-blog-posts-by-members/configure-certificate-auth-for-microsoft-sentinel-with-s-4hana-cloud-public/ba-p/14325596Configure certificate auth for Microsoft Sentinel with S/4HANA Cloud public edition2026-02-11T09:57:05.546000+01:00Martin-Pankrazhttps://community.sap.com/t5/user/viewprofilepage/user-id/143781<P><EM>Configure client certificate authentication for Microsoft Sentinel Solution for SAP integration with S/4HANA Cloud public edition</EM></P><P><EM>Quick link to<SPAN> </SPAN><A href="https://github.com/Azure-Samples/Sentinel-For-SAP-Community/tree/main/integration-artifacts/solution-packages/baseline-extension-package#sap-s4hana-cloud-public-edition-grow" target="_blank" rel="nofollow noopener noreferrer">GitHub</A>.</EM></P><P>For many SAP S/4HANA Cloud public edition APIs basic authentication is the default. SAP recommends client certificate use for production tenants.</P><P>This article shows you how to use client certificate authentication with your <A href="https://learn.microsoft.com/en-us/azure/sentinel/sap/solution-overview" target="_blank" rel="noopener nofollow noreferrer">Microsoft Sentinel Solution for SAP</A> integration. Security Audit Log API serves as an example. Approach applies to any of your APIs governed by communication arrangements.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="MartinPankraz_2-1770799567211.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/371332i0FC2C1102800EC8A/image-size/large?v=v2&px=999" role="button" title="MartinPankraz_2-1770799567211.png" alt="MartinPankraz_2-1770799567211.png" /></span></P><P> </P><H1 id="toc-hId-1660531968"><SPAN>How It Works</SPAN></H1><P>Instead of the <A href="https://azuremarketplace.microsoft.com/marketplace/apps/sap_jasondau.azure-sentinel-solution-s4hana-public?tab=Overview" target="_blank" rel="noopener nofollow noreferrer">native connector</A> – which is limited to Basic Auth – choose the Sentinel for SAP <A href="https://github.com/Azure-Samples/Sentinel-For-SAP-Community/tree/main/integration-artifacts/solution-packages/baseline-extension-package#sap-s4hana-cloud-public-edition-grow" target="_blank" rel="noopener nofollow noreferrer">extension package</A> on SAP Integration Suite for full flexibility.</P><OL><LI>Create Communication Scenario <A href="https://help.sap.com/docs/SAP_S4HANA_CLOUD/0f69f8fb28ac4bf48d2b57b9637e81fa/a93dca70e2ce43d19ac93e3e5531e37d.html" target="_blank" rel="noopener noreferrer">SAP_COM_0750</A> <SPAN>the usual <A href="https://help.sap.com/docs/SAP_S4HANA_CLOUD/0f69f8fb28ac4bf48d2b57b9637e81fa/2e84a10c430645a88bdbfaaa23ac9ff7.html" target="_blank" rel="noopener noreferrer">way</A></SPAN>.</LI><LI>Create a communication user for certificate authentication and upload your certificate. The built-in cert <STRONG>sap_cloudintegrationcertificate</STRONG> provided by every SAP Cloud Integration tenant is supported out-of-the-box for ease of use. For custom Client Certificates learn more from SAP's <A href="https://community.sap.com/t5/enterprise-resource-planning-blog-posts-by-sap/beyond-basic-2-certificate-based-authentication-in-sap-s-4hana-cloud-public/ba-p/13644334" target="_blank">blog</A> by <a href="https://community.sap.com/t5/user/viewprofilepage/user-id/180997">@marc_roeder</a> and ensure that the certificate signing authority is trusted by SAP. Find more details on <A href="https://me.sap.com/notes/2801396" target="_blank" rel="noopener noreferrer">SAP Note 2801396</A>.</LI></OL><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="MartinPankraz_0-1770737035218.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/371050iF261E00C9C3ED3AF/image-size/large?v=v2&px=999" role="button" title="MartinPankraz_0-1770737035218.png" alt="MartinPankraz_0-1770737035218.png" /></span></P><P class="lia-indent-padding-left-30px" style="padding-left : 30px;">3. Configure a destination for your S/4HANA Cloud public edition tenant and set authentication to <STRONG>ClientCertificateAuthentication</STRONG>.</P><P> </P><TABLE><TBODY><TR><TD><P><STRONG>Property</STRONG></P></TD><TD><P><STRONG>Value</STRONG></P></TD><TD><P><STRONG>Description</STRONG></P></TD></TR><TR><TD><P>Name</P></TD><TD><P>S4-PC-[SID]-[Client]</P></TD><TD><P>Destination name (e.g., S4-PC-YKJ-100)</P></TD></TR><TR><TD><P>Type</P></TD><TD><P>HTTP</P></TD><TD><P>Connection type</P></TD></TR><TR><TD><P>URL</P></TD><TD><P>https://[tenant]<STRONG>-api</STRONG>.s4hana.cloud.sap</P></TD><TD><P>S/4HANA Cloud system <STRONG>API</STRONG> URL</P></TD></TR><TR><TD><P>Proxy Type</P></TD><TD><P>Internet</P></TD><TD><P>Always internet because of the cloud nature of the SAP service</P></TD></TR><TR><TD><P>Authentication</P></TD><TD><P><STRONG>ClientCertificateAuthentication</STRONG></P></TD><TD><P>Authentication methods supported by S/4HANA Cloud public edition</P></TD></TR><TR><TD><P>Key Store Source</P></TD><TD><P>ClientProvided</P></TD><TD><P>this will be used as trigger for the iflow to use X509</P></TD></TR><TR><TD><P>Key Store Location</P></TD><TD><P>(empty)</P></TD><TD><P>not applicable</P></TD></TR><TR><TD><P>Key Store Password</P></TD><TD><P>(empty)</P></TD><TD><P>not applicable</P></TD></TR></TBODY></TABLE><P class="lia-indent-padding-left-30px" style="padding-left : 30px;">This setting is evaluated during runtime on the iFlow. See below Screenshot for reference:</P><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="MartinPankraz_0-1770800187527.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/371337iCA28EFF7BEB974C1/image-size/large?v=v2&px=999" role="button" title="MartinPankraz_0-1770800187527.png" alt="MartinPankraz_0-1770800187527.png" /></span></P><P> </P><P class="lia-indent-padding-left-30px" style="padding-left : 30px;">4. Deploy the<STRONG> latest </STRONG><SPAN><A href="https://github.com/Azure-Samples/Sentinel-For-SAP-Community/tree/main/integration-artifacts/solution-packages/baseline-extension-package" target="_blank" rel="noopener nofollow noreferrer"><STRONG>Microsoft Sentinel extension package</STRONG></A></SPAN> in SAP Integration Suite. See <SPAN><A href="https://youtu.be/PbO1S1E29Yk?si=RbloAwISvs-EiTcf&t=503" target="_blank" rel="noopener nofollow noreferrer">this video</A></SPAN> for a similar scenario for guidance. Ignore the ERP specific settings on Cloud Connector etc. They don’t apply to public cloud.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="MartinPankraz_1-1770737035228.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/371051iE03FCD7D542CD63A/image-size/large?v=v2&px=999" role="button" title="MartinPankraz_1-1770737035228.png" alt="MartinPankraz_1-1770737035228.png" /></span></P><P> </P><OL><LI>Deploy the agentless data connector for the Microsoft Sentinel Solution for SAP. See <SPAN><A href="https://www.youtube.com/watch?v=PbO1S1E29Yk" target="_blank" rel="noopener nofollow noreferrer">this video</A></SPAN> for a walk-through of the first steps and the official Microsoft Learn page <SPAN><A href="https://learn.microsoft.com/en-us/azure/sentinel/sap/deploy-sap-security-content?pivots=connection-agentless" target="_blank" rel="noopener nofollow noreferrer">here</A></SPAN>. Ignore the ERP specific settings on Cloud Connector etc. They don’t apply to public cloud.</LI><LI>Connect your new iFlow on the data connector pane on Sentinel to start ingesting SAP S/4HANA Cloud public edition logs. On the Advanced section supply the path <STRONG>“</STRONG><STRONG>/community/</STRONG> <STRONG>SAPS4_Public_Cloud_Security_Audit_Log</STRONG><SPAN>” to point the route at the S4 public cloud iFlow on SAP Integration Suite.</SPAN></LI></OL><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="MartinPankraz_2-1770737035244.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/371052i68F0E0E560A9C5D4/image-size/large?v=v2&px=999" role="button" title="MartinPankraz_2-1770737035244.png" alt="MartinPankraz_2-1770737035244.png" /></span></P><P> </P><P>Observe the messages flowing on SAP Cloud Integration monitoring and Microsoft Sentinel for SAP.</P><P>You can use the following kusto query on Azure Log Analytics or Defender portal to verify the S4 logs. Filter by SystemId in case you have multiple connections:</P><pre class="lia-code-sample language-sql"><code>SAPAuditLog
| where SystemId == "your SID"</code></pre><H1 id="toc-hId-1464018463">Continue your onboarding with Analytic Rules</H1><P>Both SAP’s native connector and the integration suite based approach post data to the SAPAuditLog structures in Sentinel. This way the <A href="https://learn.microsoft.com/en-us/azure/sentinel/sap/sap-solution-security-content?pivots=connection-agentless#built-in-analytics-rules" target="_blank" rel="noopener nofollow noreferrer">built-in security content</A> for the private cloud solution is automatically lit up for public cloud too.</P><P>Be aware that detections for legacy interfaces such as RFC are not applicable anymore because they are disabled in public cloud tenants.</P><H1 id="toc-hId-1267504958"><SPAN>Final Words</SPAN></H1><P>That's a wrap <span class="lia-unicode-emoji" title=":clapper_board:">🎬</span> you saw today how to elevate the security of your integration of S/4HANA Cloud public edition with Microsoft Sentinel Solution for SAP using client certificate authentication. Good job!</P><P>Cherry on the cake: You can save some maintenance by using the pre-provided certificate of SAP Cloud Integration. SAP takes care of renewal. Only remaining task is to update the communication user on S4. <A href="https://api.sap.com/api/sap-s4-CE_APS_COM_CU_A4C_ODATA_0001-v1/path/post_CommunicationUsers" target="_blank" rel="noopener noreferrer">This API</A> allows full automation of that step even. See <A href="https://community.sap.com/t5/technology-blog-posts-by-members/automatic-sap-btp-trust-store-certificate-renewal-with-azure-key-vault-or/ba-p/13565138" target="_blank">this blog</A> for details on the automatic refresh approach in a similar scenario.</P><P><EM>Quick link to<SPAN> </SPAN><A href="https://github.com/Azure-Samples/Sentinel-For-SAP-Community/tree/main/integration-artifacts/solution-packages/baseline-extension-package#sap-s4hana-cloud-public-edition-grow" target="_blank" rel="nofollow noopener noreferrer">GitHub</A>.</EM></P><P>Feel free to reach out to talk more SAP Security.</P><P>Cheers, Martin</P>2026-02-11T09:57:05.546000+01:00https://community.sap.com/t5/enterprise-resource-planning-blog-posts-by-members/sap-ariba-is-now-integrated-with-microsoft-sentinel-solution-for-sap/bc-p/14333412#M72617Re: SAP Ariba is now integrated with Microsoft Sentinel Solution for SAP2026-02-21T20:28:18.885000+01:00Martin-Pankrazhttps://community.sap.com/t5/user/viewprofilepage/user-id/143781<P>That would be more internal fraud, misconfiguration monitoring rather than threat protection by the looks of it.</P><P>Which API do you have in mind <a href="https://community.sap.com/t5/user/viewprofilepage/user-id/2077782">@YashikaYTD</a> ?</P>2026-02-21T20:28:18.885000+01:00https://community.sap.com/t5/enterprise-resource-planning-blog-posts-by-members/integrating-low-code-solutions-with-microsoft-using-sap-integration-suite/bc-p/14336668#M72632Re: Integrating low code solutions with Microsoft using SAP Integration Suite has never been easier!2026-02-25T16:57:31.039000+01:00Martin-Pankrazhttps://community.sap.com/t5/user/viewprofilepage/user-id/143781<P>Hey <a href="https://community.sap.com/t5/user/viewprofilepage/user-id/1458002">@JorgeCalderon</a>,</P><P>the flow requires a SAML assertion to be passed to the SAP OAuth server for exchange. This article describes how to get a trusted SAML assertion issued by Entra ID for any known client app that wants to talk to SAP. If you generate your own SAML assertion you obtain the responsibility of an IDP like Entra yourself with all the risks that come with it.</P><P>The flow can not be shortened without compromising security.</P><P>Let the community know what you decided and why in the end <span class="lia-unicode-emoji" title=":slightly_smiling_face:">🙂</span> </P>2026-02-25T16:57:31.039000+01:00https://community.sap.com/t5/enterprise-resource-planning-blog-posts-by-members/integrating-low-code-solutions-with-microsoft-using-sap-integration-suite/bc-p/14338081#M72642Re: Integrating low code solutions with Microsoft using SAP Integration Suite has never been easier!2026-02-27T11:51:54.333000+01:00Martin-Pankrazhttps://community.sap.com/t5/user/viewprofilepage/user-id/143781<P>Hey <a href="https://community.sap.com/t5/user/viewprofilepage/user-id/1458002">@JorgeCalderon</a>,</P><P>in case you have a secure way to obtain a SAML assertion from a trusted IdP you can of course skip that part of the token exchange on APIM (simplify the policy) and directly forward that to the SAP backend for the exchange to OAuth2SAMLBearer token. </P><P>Would be curious what client app you are using that causes this situation.</P>2026-02-27T11:51:54.333000+01:00https://community.sap.com/t5/enterprise-resource-planning-blog-posts-by-members/integrating-low-code-solutions-with-microsoft-using-sap-integration-suite/bc-p/14341473#M72655Re: Integrating low code solutions with Microsoft using SAP Integration Suite has never been easier!2026-03-04T12:56:41.756000+01:00Martin-Pankrazhttps://community.sap.com/t5/user/viewprofilepage/user-id/143781<P>Your step 2 is step 3 on the diagram of this blog. So, if your step 1 uses a JWT based login you have the same situation as described here.</P><P>Also be aware that the <A href="https://api.sap.com/policytemplate/Principal_Propagation_via_Entra_Id" target="_blank" rel="noopener noreferrer">policy I co-published with SAP</A> has more features like token caching and SAP Cloud Connector setup compared to the one you shared.</P><P>KR Martin</P>2026-03-04T12:56:41.756000+01:00