https://raw.githubusercontent.com/ajmaradiaga/feeds/main/scmt/topics/SAP-Cloud-Identity-Services-blog-posts.xml SAP Community - SAP Cloud Identity Services 2024-05-20T11:12:27.485292+00:00 python-feedgen SAP Cloud Identity Services blog posts in SAP Community https://community.sap.com/t5/technology-blogs-by-members/2024-sap-cloud-identity-services-amp-iam-portfolio-what-s-new/ba-p/13622951 2024 SAP Cloud Identity Services & IAM Portfolio: What’s New? 2024-02-28T19:10:38.504000+01:00 Colt https://community.sap.com/t5/user/viewprofilepage/user-id/59375 <!-- ScriptorStartFragment --><P><SPAN>This blog explores the latest 2024 updates in SAP's Identity and Access Management (IAM) portfolio derived from various early 2024 SAP events, particularly focusing on SAP Cloud Identity Services (SCI).&nbsp;</SPAN></P><H2 id="toc-hId-987912801"><SPAN>IAM</SPAN><SPAN> 101</SPAN><SPAN>: Identity Lifecycle, Authorization, and Authentication</SPAN></H2><DIV class=""><SPAN>In simple terms, Identity and Access Management (IAM) revolves around three core aspects:</SPAN></DIV><OL class=""><LI><STRONG>Identity Lifecycle</STRONG><SPAN>: This encompasses the journey of user identities within a system, from creation to deletion.</SPAN></LI><LI><STRONG>Authorization</STRONG><SPAN>: Determining what actions users are allowed to perform within a system.</SPAN></LI><LI><STRONG>Authentication</STRONG><SPAN>: Ensuring that users are who they claim to be when accessing applications or services.</SPAN></LI></OL><H2 id="toc-hId-791399296"><SPAN>Identity Access Management Portfolio by SAP</SPAN></H2><DIV class=""><SPAN>SAP offers a Identity Access Management (IAM) portfolio that caters to both on-premises and public cloud solutions. Let's delve into each category - Identity Lifecycle, Authentication, and Authorization - highlighting the different components within SAP's Cloud Identity Services (SCI) suite.</SPAN></DIV><DIV class="">&nbsp;</DIV><DIV class=""><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Colt_0-1709142943811.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/72979i908AE047F560680E/image-size/large?v=v2&amp;px=999" role="button" title="Colt_0-1709142943811.png" alt="Colt_0-1709142943811.png" /></span></DIV><DIV class=""><FONT size="1 2 3 4 5 6 7"><SPAN>Source SAP SE: Image from the SAP presentation showcased at the DSAG Technology Days 2024 in Hamburg</SPAN></FONT><P>&nbsp;</P></DIV><DIV class="">&nbsp;</DIV><H3 id="toc-hId-723968510"><SPAN>Identity Lifecycle Management</SPAN></H3><DIV class=""><SPAN>For managing the lifecycle of identities, SAP provides several solutions:</SPAN></DIV><UL class=""><LI><STRONG>Identity Provisioning</STRONG><SPAN>: Part of SCI. Facilitates seamless creation and management of user identities.</SPAN></LI><LI><STRONG>Identity Directory</STRONG><SPAN>: Part of SCI. Serves as a centralized repository for user and group information.</SPAN></LI><LI><STRONG>SAP Identity Management</STRONG><SPAN>: An on-premises product ensuring robust identity lifecycle management unitl the end of 2027/2030.</SPAN></LI></UL><H3 id="toc-hId-527455005"><SPAN>Authentication Solutions</SPAN></H3><DIV class=""><SPAN>SAP's authentication solutions ensure secure access to applications and services:</SPAN></DIV><UL class=""><LI><STRONG>Identity Authentication</STRONG><SPAN>: Part of SCI. Provides seamless and secure authentication for users across applications.</SPAN></LI><LI><STRONG>SAP Single Sign-On 3.0</STRONG><SPAN>: An on-premises product offering single sign-on capabilities until the end of 2027.</SPAN></LI><LI><SPAN><STRONG>Secure Login Service</STRONG>: </SPAN><SPAN>A standout addition to SAP's IAM lineup is the </SPAN><SPAN>SAP Secure Login Service</SPAN><SPAN>, heralded as the new star in the SAP Single Sign-On horizon. This service promises enhanced security and user experience in single sign-on scenarios.</SPAN></LI></UL><DIV class=""><SPAN>Want to know more? Read here: </SPAN><A href="https://community.sap.com/t5/technology-blogs-by-members/exploring-sap-secure-login-service-for-sap-gui-a-comprehensive-review/ba-p/13573382" target="_blank">https://community.sap.com/t5/technology-blogs-by-members/exploring-sap-secure-login-service-for-sap-gui-a-comprehensive-review/ba-p/13573382</A></DIV><H3 id="toc-hId-330941500"><SPAN>Authorization Management</SPAN></H3><DIV class=""><SPAN>Authorization management is crucial for defining user permissions and access control:</SPAN></DIV><UL class=""><LI><STRONG>SAP Cloud Identity Access Governance</STRONG><SPAN>: Symbiotically linked with SCI, it offers comprehensive authorization management and access governance.</SPAN></LI><LI><SPAN><STRONG>Authorization Management of SAP Cloud Identity Services</STRONG>: </SPAN><SPAN>Streamlines authorization management for developers on SAP BTP. Define access policies with specified conditions, easily adjustable by administrators post-deployment. This centralizes access control, mitigating complexity and ensuring precise authorization levels.</SPAN></LI></UL><DIV class=""><SPAN>Want to know more? Read here:</SPAN> <A href="https://community.sap.com/t5/technology-blogs-by-sap/sap-btp-innobytes-january-2024/ba-p/13584601" target="_blank">https://community.sap.com/t5/technology-blogs-by-sap/sap-btp-innobytes-january-2024/ba-p/13584601</A></DIV><UL class=""><LI><STRONG>SAP Access Control</STRONG><SPAN>: An on-premises product offering </SPAN><SPAN>that enables organizations to control access and prevent fraud across the enterprise, while minimizing the time and cost of compliance</SPAN><SPAN>.</SPAN><SPAN> An upcoming version (release 2026) will further enhance authorization capabilities within SAP's IAM portfolio.</SPAN></LI></UL><DIV class=""><SPAN>While SAP's IAM portfolio boasts a comprehensive suite of solutions, it's worth noting that the </SPAN><SPAN>SAP Customer Data Cloud </SPAN><SPAN>is beyond the scope of this discussion due to the author's limited experience with it.</SPAN></DIV><H2 id="toc-hId-5345276"><SPAN>SAP Cloud Identity Services</SPAN></H2><H3 id="toc-hId--62085510"><SPAN>Short Overview</SPAN></H3><DIV class=""><SPAN>SAP Cloud Identity Services (SCI) offer a suite of components tailored to address various facets of IAM:</SPAN></DIV><UL class=""><LI><STRONG>Identity Provisioning</STRONG><SPAN>: Streamlining the process of creating and managing user identities.</SPAN></LI><LI><STRONG>Identity Directory</STRONG><SPAN>: Serving as a centralized repository for storing and accessing user and group information.</SPAN></LI><LI><STRONG>Authorization Management</STRONG><SPAN>: Facilitating the assignment and management of user permissions.</SPAN></LI><LI><STRONG>Identity Authentication</STRONG><SPAN>: Ensuring secure and seamless user authentication across applications.</SPAN></LI></UL><H3 id="toc-hId--258599015"><SPAN>Key Features of SCI</SPAN></H3><UL class=""><LI><STRONG>Predefined Connectivity and Bundling</STRONG><SPAN>: </SPAN><SPAN>SCI seamlessly integrates with SAP cloud solutions, providing out-of-the-box configuration for user provisioning and authentication.</SPAN></LI><LI><STRONG>Automated Service Enablement</STRONG><SPAN>: </SPAN><SPAN>Identity Services are automatically enabled as part of the product delivery process, simplifying setup for customers.</SPAN></LI><LI><STRONG>Default Pre-Configuration</STRONG><SPAN>: </SPAN><SPAN>SAP cloud solutions come pre-configured with Identity Services, catering to common scenarios without the need for separate licensing.</SPAN></LI></UL><DIV class=""><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Colt_1-1709142943815.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/72981iC7A82C30A31A6033/image-size/large?v=v2&amp;px=999" role="button" title="Colt_1-1709142943815.png" alt="Colt_1-1709142943815.png" /></span></DIV><DIV class=""><FONT size="1 2 3 4 5 6 7"><SPAN>Source SAP SE: Image from the SAP presentation showcased at the DSAG Technology Days 2024 in Hamburg</SPAN></FONT><P>&nbsp;</P></DIV><DIV class=""><SPAN>Long story? Read here: </SPAN><A href="https://xiting.com/en/downloads/download-sap-cloud-identity-services-e-book/" target="_blank" rel="noreferrer noopener nofollow">https://xiting.com/en/downloads/download-sap-cloud-identity-services-e-book/</A></DIV><H3 id="toc-hId--455112520">&nbsp;</H3><H3 id="toc-hId--651626025"><SPAN>Cross-Enterprise Access Governance</SPAN></H3><DIV class=""><SPAN>Cross-enterprise identity management and access governance integration is set to be streamlined with the integration of Microsoft Entra ID and Microsoft Entra ID Governance alongside SAP Cloud Identity services and SAP Cloud Identity Access Governance. This integration will empower organizations to achieve single sign-on and provisioning capabilities across a range of SAP business applications, including SAP S/4HANA Public Cloud, SAP Ariba, SAP Concur, and SAP SuccessFactors. Furthermore, the linkage between Microsoft Entra ID and Microsoft Entra ID Governance with SAP Cloud Identity Access Governance will enable cohesive identity and access risk assessments, alongside monitoring and management of compliance controls.</SPAN></DIV><DIV class=""><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Colt_2-1709142943817.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/72980i9C4C9C173330027F/image-size/large?v=v2&amp;px=999" role="button" title="Colt_2-1709142943817.png" alt="Colt_2-1709142943817.png" /></span></DIV><DIV class=""><FONT size="1 2 3 4 5 6 7"><SPAN>Source SAP SE: Image from the SAP presentation showcased at the DSAG Technology Days 2024 in Hamburg</SPAN></FONT></DIV><H2 id="toc-hId--629967892"><SPAN>Identity Lifecycle Management with SCI</SPAN></H2><DIV class=""><SPAN>SAP Cloud Identity Services </SPAN><SPAN>facilitates efficient management of the employee lifecycle, from onboarding to offboarding, ensuring smooth transitions and access management throughout.</SPAN></DIV><DIV class=""><SPAN>It </SPAN><SPAN>play</SPAN><SPAN>s</SPAN><SPAN> a key role by centralizing Identity Access Management. They collect the derived identities and act as a single source of truth. The Identity Directory and Identity Provisioning components of SAP Cloud Identity Services work together to manage identities efficiently across systems.</SPAN></DIV><H3 id="toc-hId--1119884404"><SPAN>Identity Directory: Centralized User Management</SPAN></H3><DIV class=""><SPAN>The Identity Directory serves as a central repository for user and group information, accessible via APIs and admin UI, simplifying connectivity and integration with SAP SaaS applications.&nbsp;</SPAN><SPAN>It </SPAN><SPAN>provides a System for Cross-domain Identity Management (SCIM) 2.0 REST API for managing resources (users, groups and custom schemas) with a set of attributes. Those attributes are defined in the SCIM 2.0 Core schema and the Enterprise user resource schema. Custom attributes are supported through a schema extension</SPAN><SPAN>.</SPAN></DIV><H2 id="toc-hId--1022994902"><SPAN>Identity Provisioning</SPAN></H2><H3 id="toc-hId--1512911414"><SPAN>Transformation Engine</SPAN></H3><DIV class=""><SPAN>Identity Provisioning Connectors play a crucial role in the Identity Lifecycle process. These connectors come in various types, including Source System Connectors, Target System Connectors, and Proxy System Connectors. They enable seamless integration between different systems, allowing for the provisioning and authentication of users.</SPAN></DIV><DIV class="">&nbsp;</DIV><DIV class=""><SPAN>The Identity Provisioning transformation engine offers several powerful capabilities:</SPAN></DIV><OL class=""><LI><STRONG>Assignment</STRONG><SPAN><STRONG>:</STRONG> Users can define rules for assignments based on input data. For instance, organizations can use the value of an identity's organizational unit to determine the roles required for that user.</SPAN></LI><LI><STRONG>Mapping between identity models</STRONG><SPAN>: The engine facilitates mapping between attributes in different models. For example, it can map the surname attribute to the family name attribute. Additionally, it allows for adjustments to data formats, such as converting time or number formats as needed.</SPAN></LI><LI><STRONG>Filtering</STRONG><SPAN>: Organizations can specify detailed criteria for determining which objects should be read or written. This enables fine-grained control over data synchronization and provisioning processes, ensuring that only relevant information is transferred between systems.</SPAN></LI></OL><H3 id="toc-hId--1709424919"><SPAN>Various types of connectors to facilitate seamless integration</SPAN></H3><OL class=""><LI><STRONG>Source System Connectors</STRONG><SPAN>: These connectors enable the extraction of user data from source systems, such as SAP Cloud solutions, on-premise solutions, and third-party solutions.</SPAN></LI><LI><STRONG>Target System Connectors</STRONG><SPAN>: These connectors facilitate the transfer of user data to target systems, including SAP Cloud solutions, on-premise solutions, and third-party solutions.</SPAN></LI><LI><STRONG>Proxy System Connectors</STRONG><SPAN><STRONG>:</STRONG> These connectors act as intermediaries between source and target systems, ensuring smooth data transfer and integration.</SPAN></LI></OL><DIV class=""><SPAN>With support for over 20 SAP Cloud solutions, on-premise solutions, and third-party solutions, Identity Provisioning Connectors offer out-of-the-box configuration for user provisioning and authentication. This ensures quick and easy setup for organizations, enabling efficient management of user identities across diverse systems.</SPAN></DIV><H2 id="toc-hId--1612535417"><SPAN>Authorization </SPAN><SPAN>Management</SPAN></H2><DIV class=""><SPAN>Authorization plays a crucial role in ensuring secure access to applications and resources. Here's how SAP addresses authorization management:</SPAN></DIV><UL class=""><LI><STRONG>Internal Authorization Definition</STRONG><SPAN>: Many applications define authorizations internally, tailored to their specific domain requirements.</SPAN></LI><LI><STRONG>Central User Assignment</STRONG><SPAN>: SAP Cloud Identity Services centralizes user assignment to roles and groups, streamlining access management.</SPAN></LI><LI><STRONG>Authorization Management Service (AMS)</STRONG><SPAN>: This "new" service provides centralized management of end-user authorizations for applications on the SAP Business Technology Platform. AMS integrates seamlessly with SAP Cloud Identity Services, allowing for configuration and assignment of policies directly from the administration console.</SPAN></LI><LI><STRONG>Policy Assignment</STRONG><SPAN>: In SAP Cloud Identity, each policy corresponds to a group in the identity directory. Policies can be assigned to users by making them members of the respective policy group. Customers have the flexibility to assign SAP-provided or custom policies to users using the user-friendly UIs in the SAP Cloud Identity console or programmatically via the SCIM API of the Identity Directory.</SPAN></LI></UL><DIV class=""><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Colt_3-1709142943819.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/72983i947E449682E1C294/image-size/large?v=v2&amp;px=999" role="button" title="Colt_3-1709142943819.png" alt="Colt_3-1709142943819.png" /></span></DIV><DIV class=""><FONT size="1 2 3 4 5 6 7"><SPAN>Source SAP SE: Image from the SAP presentation showcased at the DSAG Technology Days 2024 in Hamburg</SPAN></FONT><P>&nbsp;</P></DIV><DIV class="">&nbsp;</DIV><H2 id="toc-hId--1809048922"><SPAN>Identity </SPAN><SPAN>Access </SPAN><SPAN>Governance</SPAN></H2><BLOCKQUOTE><DIV><!-- ScriptorStartFragment --><DIV class=""><SPAN>SAP Cloud Identity Access Governance (IAG) is already widely recognized, offering a comprehensive suite of features aimed at enhancing security and compliance.<!-- ScriptorEndFragment --></SPAN></DIV></DIV></BLOCKQUOTE><DIV class=""><SPAN>Key Features:</SPAN></DIV><UL class=""><LI><STRONG>Privileged Access Management</STRONG><SPAN>: Enables the management of super-user access, log consolidation, and automated log assessment to ensure stringent security measures.</SPAN></LI><LI><STRONG>Access Certification</STRONG><SPAN>: Facilitates the review of access, roles, risks, and mitigation controls to maintain compliance with regulatory standards.</SPAN></LI><LI><STRONG>Access Analysis</STRONG><SPAN>: Provides tools to analyze access, refine user assignments, and manage controls effectively.</SPAN></LI><LI><STRONG>Access Request</STRONG><SPAN>: Optimizes access by streamlining workflows, policy-based assignment, and processes to ensure efficient access provisioning.</SPAN></LI><LI><STRONG>Role Design</STRONG><SPAN>: Allows organizations to optimize role definition and governance processes, enhancing overall security posture.</SPAN></LI></UL><DIV class=""><SPAN>Moreover, SAP Cloud Identity Access Governance offers HR-driven identity lifecycle management by integrating with SAP SuccessFactors. This integration enables automatic access requests triggered by changes in employee status within the HR system. The IAG Bridge Cloud facilitates the creation of access requests for cloud applications, with risk analysis and provisioning handled by SAP Cloud Identity Access Governance.</SPAN></DIV><DIV class=""><SPAN>API-based integrations further enhance flexibility, allowing external applications to submit requests to SAP Cloud Identity Access Governance for processing. This enables efficient access provisioning and deprovisioning based on approval processes, with the option to retrieve request status periodically.</SPAN></DIV><DIV class="">&nbsp;</DIV><DIV class=""><SPAN>With support for over 16 SAP Cloud solutions, on-premises solutions, and third-party solutions, SAP Cloud Identity Access Governance provides a robust platform for organizations to maintain security, compliance, and efficient access management across their IT environment.</SPAN></DIV><H2 id="toc-hId--2005562427"><SPAN>Authentication</SPAN></H2><DIV class=""><SPAN>Authentication within SAP's ecosystem is facilitated through SAP Cloud Identity Services, serving as the interface for Identity Access Management. Here's how authentication in the overall hybrid SAP landscape idealy works:</SPAN></DIV><UL class=""><LI><STRONG>SAP Cloud Identity Services</STRONG><SPAN>: This platform acts as the primary hub for authentication. SAP applications inherently trust SAP Cloud Identity Services for identity authentication, ensuring a secure login process.</SPAN></LI><LI><STRONG>User Interaction</STRONG><SPAN>: Users have the flexibility to interact with either Identity Authentication provided by SAP Cloud Identity Services or third-party Identity Providers. Regardless of the chosen method, users benefit from Single Sign-On capabilities, enhancing user experience and simplifying access to multiple applications.</SPAN></LI><LI><STRONG>Integration with SAP GUI</STRONG><SPAN>: SAP GUI seamlessly integrates with short-term X.509 certificates from SAP Secure Login Service, further enhancing authentication security </SPAN><SPAN>supporting MFA </SPAN><SPAN>within SAP environments.</SPAN></LI></UL><DIV class=""><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Colt_4-1709142943823.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/72984i7014963F770F62D6/image-size/large?v=v2&amp;px=999" role="button" title="Colt_4-1709142943823.png" alt="Colt_4-1709142943823.png" /></span></DIV><DIV class=""><FONT size="1 2 3 4 5 6 7"><SPAN>Source SAP SE: Image from the SAP presentation showcased at the DSAG Technology Days 2024 in Hamburg</SPAN></FONT></DIV><P>&nbsp;</P><BLOCKQUOTE><!-- ScriptorStartFragment --><DIV class=""><SPAN>Short Comparative Note: SAP Secure Login Service (SLS) for SAP GUI versus SAP Single Sign-On (SSO) 3.0.&nbsp;</SPAN><SPAN>While SAP Single Sign-On 3.0 remains a viable solution for certain use cases, the emerging preference leans towards the new SLS for SAP GUI for most scenarios. The rationale behind this shift lies in the fact that SSO relies on capabilities like multi-factor authentication and CLM (Certificate Lifecycyle Management with </SPAN><SPAN>NDES </SPAN><SPAN>CA</SPAN><SPAN>-I</SPAN><SPAN>ntegr</SPAN><SPAN>ation</SPAN><SPAN>) on SAP NetWeaver Application Server Java, which is scheduled to exit mainstream maintenance by the end of 2027.</SPAN></DIV><DIV class=""><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Colt_5-1709142943824.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/72982iB5904E43B94AB340/image-size/large?v=v2&amp;px=999" role="button" title="Colt_5-1709142943824.png" alt="Colt_5-1709142943824.png" /></span></DIV><DIV class="">&nbsp;</DIV><DIV class=""><FONT size="1 2 3 4 5 6 7"><SPAN>Source SAP SE: Image from SAP</SPAN></FONT><P>&nbsp;</P></DIV><DIV class=""><SPAN>Contrarily, the new SLS does not depend on SAP NetWeaver AS Java; instead, it leverages a cloud-based service. It emphasizes seamless integration with cloud-centric identity providers, such as SAP Cloud Identity Services – Identity Authentication. Furthermore, it is offered as a cloud subscription, aligning with the contemporary preferences of software licensing among customers.</SPAN><SPAN> However, it is important to note that currently, some features are still missing in direct comparison with the SAP SSO 3.0 Suite.<BR /><!-- ScriptorEndFragment --></SPAN></DIV></BLOCKQUOTE><UL class=""><LI><STRONG>Principal Propagation</STRONG><SPAN>: SAP Cloud Identity Services facilitates principal propagation between applications, ensuring consistent authentication across various systems and enhancing interoperability.</SPAN></LI></UL><H2 id="toc-hId-2092891364"><SPAN>Upcoming Developments and Enhancements</SPAN></H2><H3 id="toc-hId-1602974852"><SPAN>Upcoming: Simplified Principal Propagation for Authentication</SPAN></H3><DIV class=""><SPAN>SCI will act as a central token service, reducing complexity in system-to-system calls and enhancing trust between applications.</SPAN><SPAN> In an upcoming development, SAP Cloud Identity Services is poised to introduce a significant enhancement aimed at simplifying principal propagation for authentication. Here's what to expect:</SPAN></DIV><UL class=""><LI><STRONG>Central Token Service</STRONG><SPAN>: SAP Cloud Identity Services will transition into a central token service, streamlining the process of system-to-system calls. This move aims to reduce complexity and enhance efficiency in authentication workflows.</SPAN></LI><LI><STRONG>Token Request Flow</STRONG><SPAN>: When a sender application needs to call an API of the receiver application on behalf of the current user, it will request a token from Identity Authentication within SAP Cloud Identity Services.</SPAN></LI><LI><STRONG>Trust in Tokens</STRONG><SPAN>: SAP applications, along with third-party applications, will trust tokens issued by SAP Cloud Identity Services for API calls. This trust ensures secure and seamless communication between applications, regardless of their origin.</SPAN></LI></UL><DIV class=""><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Colt_6-1709142943825.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/72985i88493C86A4C3AB2E/image-size/large?v=v2&amp;px=999" role="button" title="Colt_6-1709142943825.png" alt="Colt_6-1709142943825.png" /></span></DIV><DIV class=""><FONT size="1 2 3 4 5 6 7"><SPAN>Source SAP SE: Image from the SAP presentation showcased at the DSAG Technology Days 2024 in Hamburg</SPAN></FONT><P>&nbsp;</P></DIV><H3 id="toc-hId-1574645038"><SPAN>SCIM </SPAN><SPAN>&amp; SAP: </SPAN><SPAN>Updates for Improved Enterprise Readiness</SPAN></H3><DIV class=""><SPAN>SAP is working on enhancements to the SCIM protocol, including cursor-based pagination and additional schema support, to enhance user assignment processes and enterprise readiness.</SPAN></DIV><DIV class=""><SPAN>Here's an overview of the recent developments:</SPAN></DIV><UL class=""><LI><STRONG>SCIM Adoption</STRONG><SPAN>: SAP initially adopted SCIM as a product standard with the Identity Provisioning Service (IPS). SCIM2 was subsequently designated as the primary user and group replication protocol for SAP applications, outlining the implementation guidelines.</SPAN></LI><LI><STRONG>SCIM User Lifecycle</STRONG><SPAN>: SCIM includes the "active" flag to control authentication and app interactions. It mandates responding to GET requests after a DELETE request with no result. Applications have the autonomy to set users to a blocked status or create new user records as needed.</SPAN></LI><LI><STRONG>Enterprise Readiness</STRONG><SPAN>: SAP identified areas for improving SCIM's enterprise readiness, including the lack of delta-read processes and index-based pagination. To address these concerns, SAP is working on implementing cursor-based pagination for entities like Users and Groups, as well as multi-valued attributes.</SPAN></LI><LI><STRONG>SCIM Groups and Schema Enhancements</STRONG><SPAN>: SAP envisions SCIM Groups as the primary method for user assignments, offering transparent concepts for SCIM clients. SAP's group schemas introduce additional capabilities, such as defining group types and supported operations, providing more precise operations for SCIM clients.</SPAN></LI><LI><STRONG>SAP User Extensions</STRONG><SPAN>: SAP plans to introduce additional user extensions for business attributes derived from the One Domain Model (ODM). This extension aims to enable applications to create users with related business attributes. The schema will support legacy approaches and integration scenarios with the Master Data Integration Service.</SPAN></LI></UL><DIV class=""><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Colt_7-1709142943826.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/72986i3B1A76F74D97E9CE/image-size/large?v=v2&amp;px=999" role="button" title="Colt_7-1709142943826.png" alt="Colt_7-1709142943826.png" /></span></DIV><DIV class=""><FONT size="1 2 3 4 5 6 7"><SPAN>Source SAP SE: Image from the SAP presentation showcased at the DSAG Technology Days 2024 in Hamburg</SPAN></FONT></DIV><DIV class="">&nbsp;</DIV><DIV class=""><SPAN>SAP Cloud Identity Services continue to evolve, offering comprehensive IAM solutions for businesses. With features such as predefined connectivity, automated service enablement, and upcoming enhancements, SAP remains innovat</SPAN><SPAN>ive</SPAN><SPAN>, ensuring secure and efficient identity and access management for its customers.<BR /></SPAN></DIV><!-- ScriptorEndFragment --> 2024-02-28T19:10:38.504000+01:00 https://community.sap.com/t5/sap-builders-blog-posts/what-s-new-for-sap-build-apps-mobile-authentication/ba-p/13632168 What’s New for SAP Build Apps – Mobile Authentication 2024-03-08T11:08:53.887000+01:00 EsmeeX https://community.sap.com/t5/user/viewprofilepage/user-id/8621 <P><SPAN><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="mobile auth - hero image.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/77530i4D642D05D50EBE6F/image-size/large?v=v2&amp;px=999" role="button" title="mobile auth - hero image.png" alt="mobile auth - hero image.png" /></span></SPAN></P><P><SPAN>Greetings Builders!&nbsp;</SPAN><SPAN>This week we have released a significant feature for our customers: </SPAN><STRONG><SPAN>mobile authentication.</SPAN></STRONG></P><P><SPAN>We have now enabled <A href="https://help.sap.com/docs/build-apps/service-guide/sap-mobile-services" target="_blank" rel="noopener noreferrer">SAP Mobile Services</A>, which&nbsp;authenticates end users in your native mobile applications and provides access to integrations and services from SAP Business Technology Platform.&nbsp;</SPAN></P><P><SPAN>SAP Build Apps uses SAP Cloud Identity Services – Identity Authentication (IAS) for user authentication in the cloud. For more information on this topic, see the article: </SPAN><A href="https://help.sap.com/docs/identity-authentication/identity-authentication/what-is-identity-authentication" target="_blank" rel="noopener noreferrer"><SPAN>What is Identity Authentication?</SPAN></A></P><P><SPAN>Now with the ability to harness the power of Identity Authentication, you can increase the </SPAN><STRONG><SPAN>enterprise readiness</SPAN></STRONG><SPAN> of your company’s mobile apps by ensuring seamless integration with SAP Business Technology Platform. This feature allows you to reuse destinations of backend systems, which are also used for web applications and many other BTP services.</SPAN></P><P><SPAN>To get started with taking advantage of this feature, verify that you have Subaccount entitlements of at least 1 unit for Mobile Services (standard plan) as a prerequisite.</SPAN><SPAN>&nbsp;</SPAN></P><P><SPAN><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="auth.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/77531i7C2F6DA055F8E54D/image-size/large?v=v2&amp;px=999" role="button" title="auth.png" alt="auth.png" /></span></SPAN></P><P>After configuring mobile authentication in your BTP Cockpit and your build settings, you can build your first mobile app with authentication services enabled. Your users will be prompted to sign in with your Identity Provider (IdP) the first time they open your app. The session will remain active until the app’s cache is cleared or the session is revoked manually.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="Untitled design (10).png" style="width: 600px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/77533i4B58C44B69F15366/image-size/large?v=v2&amp;px=999" role="button" title="Untitled design (10).png" alt="Untitled design (10).png" /></span></P><P><STRONG><SPAN><span class="lia-unicode-emoji" title=":backhand_index_pointing_right:">👉</span>For instructions on getting started with mobile authentication, see the documentation: </SPAN></STRONG><A href="https://help.sap.com/docs/build-apps/service-guide/sap-mobile-services" target="_blank" rel="noopener noreferrer"><STRONG><SPAN>SAP Build Apps – SAP Mobile Services.</SPAN></STRONG></A></P><P><SPAN>We look forward to seeing our customers unlock more possibilities by enabling mobile authentication in their apps!&nbsp;Feel free to share any feedback or questions about this release in the comments. </SPAN></P><P><EM>Check out what else is on the horizon for SAP Build Apps this year in the <A href="https://roadmaps.sap.com/board?PRODUCT=73554900100800004334&amp;range=CURRENT-LAST#Q1%202024" target="_blank" rel="noopener noreferrer">Roadmap Explorer</A>.</EM></P><P><I><SPAN>To see all recent SAP Build Apps releases, visit the </SPAN></I><A href="https://help.sap.com/whats-new/cf0cb2cb149647329b5d02aa96303f56?Component=SAP%20Build%20Apps&amp;locale=en-US" target="_blank" rel="noopener noreferrer"><I><SPAN>What’s New Documentation</SPAN></I></A><I><SPAN>.</SPAN></I></P> 2024-03-08T11:08:53.887000+01:00 https://community.sap.com/t5/technology-blogs-by-members/sap-idm-migration-guidelines-to-help-you-on-your-upcoming-iam-journey/ba-p/13648467 SAP IdM migration guidelines to help you on your upcoming IAM journey 2024-03-25T14:21:37.058000+01:00 todor_petrov https://community.sap.com/t5/user/viewprofilepage/user-id/742 <P>Let me introduce to you the ROIABLE SAP IdM Migration Guidelines. Your one-stop information guide on important features, concepts and technicalities around an SAP IdM migration. With 94 topics covered, the guide encapsulates 15 years’ experience of SAP IdM implementations, operations, and enterprise support.</P><P style=" text-align: center; "><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="todor_petrov_0-1711371457816.png" style="width: 400px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/85953i24B85293CC9B048A/image-size/medium?v=v2&amp;px=400" role="button" title="todor_petrov_0-1711371457816.png" alt="todor_petrov_0-1711371457816.png" /></span></P><P>The content is future product agnostic, meaning you should be able to apply the explained concepts to any selected IAM of choice. Surely some will have advantages over others in certain areas, but using the above comprehensive guide, you will, at least, be able to ask all the right questions, when it comes to selecting the successor of SAP IdM.</P><P>Each topic is structured similarly, color-coded based on the category which it fits. The top left part is reserved for its number, name, and abbreviation. On the left, you can find a summary of its usage within the scope of SAP IdM, while on the right is a recommendation of how this particular topic should be migrated or not onto your future IAM platform. At the bottom you can find related topics to continue browsing the document or respectively return to the overview slide using the home button.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="todor_petrov_1-1711371545352.png" style="width: 400px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/85954iB1B0DA15C9943573/image-size/medium?v=v2&amp;px=400" role="button" title="todor_petrov_1-1711371545352.png" alt="todor_petrov_1-1711371545352.png" /></span></P><P>The various topics covered spread over 10 categories, which only shows the wide diversity to be considered when taking care of your SAP IdM migration. The document is still work in progress, but there are already released topics, which you can find <A title="SAP IdM migration guidelines playlist" href="https://www.youtube.com/playlist?list=PLfMX1cn_REHgf6aUsU6eRDNSGwcnwop6d" target="_blank" rel="noopener nofollow noreferrer">here</A>.</P><P>Stay tuned for the full release and its respective announcement. Till then, make sure to check the link above regularly for newly uploaded content.</P><P>Retain investment, stay compliant and embrace the cloud!</P> 2024-03-25T14:21:37.058000+01:00 https://community.sap.com/t5/technology-blogs-by-sap/safeguarding-data-privacy-in-ksa-leveraging-sap-to-navigate-ndmo-s/ba-p/13652286 Safeguarding Data Privacy in KSA - Leveraging SAP to navigate NDMO’s Regulations in Digital Era 2024-03-28T12:05:30.971000+01:00 Zainab_ASalam https://community.sap.com/t5/user/viewprofilepage/user-id/1426218 <P><FONT face="courier new,courier" size="2" color="#333333">Blog v1.0 &nbsp;| &nbsp;</FONT><FONT face="courier new,courier" size="2" color="#333333">Published On: 28 March 2024</FONT></P><P><FONT face="courier new,courier" size="2"><FONT color="#333333">Authors:&nbsp;</FONT><a href="https://community.sap.com/t5/user/viewprofilepage/user-id/76380">@asadkhan02</a>&nbsp;,&nbsp;<a href="https://community.sap.com/t5/user/viewprofilepage/user-id/1427434">@AyeshaSafeer</a>&nbsp;,&nbsp;<a href="https://community.sap.com/t5/user/viewprofilepage/user-id/1426218">@Zainab_ASalam</a>&nbsp;</FONT></P><P style=" text-align: center; "><FONT face="courier new,courier" size="2" color="#808080">_________________________________________</FONT></P><P><FONT face="arial,helvetica,sans-serif" color="#000080">In today's digital era, data privacy is a crucial issue for both individuals and organizations. The <STRONG>Saudi National Data Management Office</STRONG> (<STRONG>NDMO</STRONG>), in partnership with the <STRONG>Saudi Data and</STRONG> <STRONG>Artificial Intelligence Authority</STRONG> (<STRONG>SDAIA</STRONG>), has introduced stringent <STRONG>Data Governance and Personal Data Protection Standards</STRONG>. These regulations mandate all organizations operating across various industries in the Kingdom of Saudi Arabia comply by <STRONG>September 2024</STRONG>.</FONT></P><P><FONT face="arial,helvetica,sans-serif" color="#000080">Failure to comply with these regulations can result in hefty financial fines reaching SAR 3 million or higher in some cases, reputational damage, legal consequences, and loss of trust among customers and partners.</FONT></P><P><FONT face="arial,helvetica,sans-serif" color="#000080"><SPAN>To ensure compliance with these new regulations, organizations are encouraged to implement processes aligned with the 15 domains outlined by the NDMO for Data Governance and Personal Data Protection Standards. Leveraging technology as an enabler, organizations can implement robust data privacy measures and effectively meet these requirements.</SPAN></FONT></P><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="Top 5 Areas part of 15 Domains outlined by NDMO for Data Governance and Personal Data Protection Standards" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/87957i2C22EE02F15D3B98/image-size/large?v=v2&amp;px=999" role="button" title="Picture1.png" alt="Top 5 Areas part of 15 Domains outlined by NDMO for Data Governance and Personal Data Protection Standards" /><span class="lia-inline-image-caption" onclick="event.preventDefault();">Top 5 Areas part of 15 Domains outlined by NDMO for Data Governance and Personal Data Protection Standards</span></span></P><P><FONT size="3" color="#000080">SAP, a global leader in enterprise software, provides advanced technologies with artificial intelligence (AI) capabilities that provide a solid foundation for organizations to implement data governance and personal data protection processes. SAP solutions enable Saudi organizations to efficiently navigate and fulfill regulatory requirements:</FONT></P><P><FONT face="arial,helvetica,sans-serif" size="3" color="#333399"><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="Picture2.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/87931iD46B5558704106BA/image-size/large?v=v2&amp;px=999" role="button" title="Picture2.png" alt="Picture2.png" /></span></FONT></P><P><FONT face="arial,helvetica,sans-serif" size="3" color="#000080"><SPAN>By implementing SAP solutions, Saudi organizations can empower their data privacy practices, mitigate compliance risks, and build trust among stakeholders. SAP technologies uphold data integrity, safeguard personal information, offer the framework for regulatory compliance implementation, and adapt to the demands of the digital age.</SPAN></FONT></P><P><FONT face="arial,helvetica,sans-serif" size="3" color="#000080">As a team at SAP, we are committed to supporting organizations in achieving their regulatory compliance initiatives. We invite you to take the next step by exploring how our technologies and solutions can assist you on this journey.</FONT></P><P><FONT face="arial,helvetica,sans-serif" size="3" color="#000080">Contact us today to learn more about how SAP can help you navigate the complex landscape of data privacy regulations in Saudi Arabia and ensure compliance.</FONT></P><P>&nbsp;</P> 2024-03-28T12:05:30.971000+01:00 https://community.sap.com/t5/technology-blogs-by-members/integrating-ibm-security-verify-with-sap-cloud-identity-services-in-sap-btp/ba-p/13651722 Integrating IBM Security Verify with SAP Cloud Identity Services in SAP BTP 2024-04-02T10:29:43.856000+02:00 TusharTrivedi https://community.sap.com/t5/user/viewprofilepage/user-id/150726 <P>This blog delves into the technical aspects of integrating IBM Security Verify with SAP Cloud Identity Services (CIS) in SAP Business Technology Platform (BTP) as a proxy.</P><P>SAP CIS offers a suite of solutions for managing user identities, access controls, and application integrations across the IT landscape. Conversely, IBM Security Verify provides identity governance, workforce and Customer Identity Access Management (CIAM), and privileged account controls through automated, cloud-based, and on-premises capabilities. By integrating these platforms, organisations can leverage their combined strengths to establish a secure business environment. This integration enhances operational control, regulatory compliance, and user experience in the digital era.</P><P>IBM Security Verify supports various authentication methods, including passwordless, fingerprints, and one-time passcodes, ensuring flexibility and robustness against unauthorised access. Meanwhile, SAP Cloud Identity Services serves as a comprehensive Identity and Access Management solution which is available in SAP BTP.</P><P>The integration process involves configuration updates in SAP CIS and IBM Security Verify to enable authentication utilising standard protocols supported by both components, such as SAML 2.0. Organisations must ensure they have the necessary admin privileges or access rights for editing configurations before initiating the integration procedure. Collaboration between the organisation and SAP is required for the integration, with most of the effort undertaken by the organisation.</P><P><STRONG><U>Reference Architecture</U></STRONG></P><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="TusharTrivedi_0-1711558240041.png" style="width: 603px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/87620iCDBBC15EAA0C32FA/image-dimensions/603x264?v=v2" width="603" height="264" role="button" title="TusharTrivedi_0-1711558240041.png" alt="TusharTrivedi_0-1711558240041.png" /></span></P><P>The diagram represents a SAP Cloud Identity Service that integrates with IBM Security Verify though which various SAP BTP application(s), SAP SaaS solution(s) and on-premises application(s) can be accessed. It demonstrates user sign-in via IBM Security Verify which allow possible passwordless, bio-metric or multi-factor authentication (MFA) using mobile devices for fast application access and pleasing user-experience.</P><P><STRONG><U>Prerequisites</U></STRONG></P><UL><LI>SAP Cloud Identity Services(for trial instance check this <A href="https://help.sap.com/docs/cloud-identity?locale=en-US" target="_blank" rel="noopener noreferrer">link</A>)</LI><LI>IBM Security Verify (for trial instance check this <A href="https://www.ibm.com/docs/en/security-verify?topic=overview-accessing-security-verify" target="_blank" rel="noopener nofollow noreferrer">link</A>)</LI><LI>A smartphone with IBM Security Verify App</LI></UL><P><STRONG><U>Configurations and Settings in IBM Security Verify</U></STRONG></P><P>Log in into <A href="https://ibmlabs.verify.ibm.com/ui/admin" target="_blank" rel="noopener nofollow noreferrer">IBM Security Verify</A> as an administrator&nbsp;</P><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="TusharTrivedi_1-1711558240051.png" style="width: 580px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/87619iDD2FB2053352AAF9/image-dimensions/580x303?v=v2" width="580" height="303" role="button" title="TusharTrivedi_1-1711558240051.png" alt="TusharTrivedi_1-1711558240051.png" /></span></P><P>When a user logs in, home screen as shown below will be displayed.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="TusharTrivedi_2-1711558240063.png" style="width: 580px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/87621i225AF80516E58B56/image-dimensions/580x303?v=v2" width="580" height="303" role="button" title="TusharTrivedi_2-1711558240063.png" alt="TusharTrivedi_2-1711558240063.png" /></span></P><P>Now on the left panel, click on "Applications" under "Applications". On the right side of the screen, there is an “Add application” button. Click on it.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="TusharTrivedi_3-1711558240075.png" style="width: 581px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/87624iB89E19C5B29F0C09/image-dimensions/581x318?v=v2" width="581" height="318" role="button" title="TusharTrivedi_3-1711558240075.png" alt="TusharTrivedi_3-1711558240075.png" /></span></P><P>Fill the necessary details under “General” section as below and save the details.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="TusharTrivedi_4-1711558240081.png" style="width: 583px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/87622iE900EAD3FCED43E8/image-dimensions/583x351?v=v2" width="583" height="351" role="button" title="TusharTrivedi_4-1711558240081.png" alt="TusharTrivedi_4-1711558240081.png" /></span></P><P>Before we go further, let’s log into SAP BTP account and you will be navigated on SAP BTP Cockpit. As suggested below, navigate to the “Instances and Subscriptions” tab, which is under “Services”.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="TusharTrivedi_5-1711558240088.png" style="width: 581px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/87623i84B54FDB35A41913/image-dimensions/581x305?v=v2" width="581" height="305" role="button" title="TusharTrivedi_5-1711558240088.png" alt="TusharTrivedi_5-1711558240088.png" /></span></P><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="TusharTrivedi_6-1711558240097.png" style="width: 580px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/87625i2B53267225252EA7/image-dimensions/580x303?v=v2" width="580" height="303" role="button" title="TusharTrivedi_6-1711558240097.png" alt="TusharTrivedi_6-1711558240097.png" /></span></P><P>Upload the metadata file which you have recently saved on your device to IBM Verify dashboard</P><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="TusharTrivedi_7-1711558240104.png" style="width: 581px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/87626iFC489D70B361D987/image-dimensions/581x327?v=v2" width="581" height="327" role="button" title="TusharTrivedi_7-1711558240104.png" alt="TusharTrivedi_7-1711558240104.png" /></span></P><P><STRONG><U>Configurations and Settings in SAP Cloud Identity Services</U></STRONG></P><P>Now, get back to SAP BTP and navigate to “Instances and Subscriptions.”</P><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="TusharTrivedi_8-1711558240123.png" style="width: 582px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/87627iD26384015971092A/image-dimensions/582x304?v=v2" width="582" height="304" role="button" title="TusharTrivedi_8-1711558240123.png" alt="TusharTrivedi_8-1711558240123.png" /></span></P><P>Now, enable the “Cloud Identity Services” if it’s not and once done it will be accessible as below:</P><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="TusharTrivedi_9-1711558240142.png" style="width: 583px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/87630i22174F3EA9625389/image-dimensions/583x306?v=v2" width="583" height="306" role="button" title="TusharTrivedi_9-1711558240142.png" alt="TusharTrivedi_9-1711558240142.png" /></span></P><P>Once you click on “Cloud Identity Services”, you will be redirected to the login screen of the SAP authentication screen as shown below</P><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="TusharTrivedi_10-1711558240151.png" style="width: 585px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/87628iEBE7E7B581BEAD5D/image-dimensions/585x306?v=v2" width="585" height="306" role="button" title="TusharTrivedi_10-1711558240151.png" alt="TusharTrivedi_10-1711558240151.png" /></span></P><P>After successful login, you can see the home screen of Cloud identity service. Go to the “Identity Providers” as highlighted below</P><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="TusharTrivedi_11-1711558240165.png" style="width: 580px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/87629iE9F459AA6A3456D1/image-dimensions/580x303?v=v2" width="580" height="303" role="button" title="TusharTrivedi_11-1711558240165.png" alt="TusharTrivedi_11-1711558240165.png" /></span></P><P>Click on the Corporate Identity providers and create new identity provider</P><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="TusharTrivedi_12-1711558240180.png" style="width: 580px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/87631i14BC0DD99326AD6F/image-dimensions/580x303?v=v2" width="580" height="303" role="button" title="TusharTrivedi_12-1711558240180.png" alt="TusharTrivedi_12-1711558240180.png" /></span></P><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="TusharTrivedi_13-1711558240199.png" style="width: 582px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/87632iA827A103C5B7CE0F/image-dimensions/582x304?v=v2" width="582" height="304" role="button" title="TusharTrivedi_13-1711558240199.png" alt="TusharTrivedi_13-1711558240199.png" /></span></P><P>Once the new identity provider is added successfully, click on the identity provider type and select SAML 2.0 compliant as shown below</P><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="TusharTrivedi_14-1711558240217.png" style="width: 580px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/87633iBF1B725FC5F931FA/image-dimensions/580x303?v=v2" width="580" height="303" role="button" title="TusharTrivedi_14-1711558240217.png" alt="TusharTrivedi_14-1711558240217.png" /></span></P><P>Go to the SAML configuration section and fill in the information as shown below.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="TusharTrivedi_15-1711558240253.png" style="width: 465px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/87635i9249EB9FC9127D47/image-dimensions/465x243?v=v2" width="465" height="243" role="button" title="TusharTrivedi_15-1711558240253.png" alt="TusharTrivedi_15-1711558240253.png" /></span></P><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="TusharTrivedi_16-1711558240282.png" style="width: 582px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/87636iF17F5BCC71338399/image-dimensions/582x303?v=v2" width="582" height="303" role="button" title="TusharTrivedi_16-1711558240282.png" alt="TusharTrivedi_16-1711558240282.png" /></span></P><P>You can browse the “Metadata” file from your device once you download it from IBM Security Verify dashboard. Go to “Sign on” section of the application and on the right side of the screen, download the file from the given URL and upload the same in SAP Cloud Identity Service as highlighted below:</P><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="TusharTrivedi_17-1711558240291.png" style="width: 580px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/87634i31E8A06AE0210E24/image-dimensions/580x319?v=v2" width="580" height="319" role="button" title="TusharTrivedi_17-1711558240291.png" alt="TusharTrivedi_17-1711558240291.png" /></span></P><P>Click on the Trusting application section and add SAP BTP trial sub-account.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="TusharTrivedi_18-1711558240308.png" style="width: 581px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/87637iCC89A43551D2E79A/image-dimensions/581x302?v=v2" width="581" height="302" role="button" title="TusharTrivedi_18-1711558240308.png" alt="TusharTrivedi_18-1711558240308.png" /></span></P><P>Now, navigate back to SAP BTP cockpit and establish the trust configuration which is under “Security” section &nbsp;for the cloud identity application as shown in the below screenshots.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="TusharTrivedi_19-1711558240327.png" style="width: 580px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/87639i167BF05ECCDAFF00/image-dimensions/580x303?v=v2" width="580" height="303" role="button" title="TusharTrivedi_19-1711558240327.png" alt="TusharTrivedi_19-1711558240327.png" /></span></P><P>Select “Establish Trust”</P><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="TusharTrivedi_20-1711558240343.png" style="width: 582px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/87638i162E95E24B25C60D/image-dimensions/582x304?v=v2" width="582" height="304" role="button" title="TusharTrivedi_20-1711558240343.png" alt="TusharTrivedi_20-1711558240343.png" /></span></P><P>You will see the below steps once you click on establish trust.&nbsp; As a first step, choose tenant and click on next.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="TusharTrivedi_21-1711558240362.png" style="width: 583px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/87640i0A33044697A8BC5B/image-dimensions/583x306?v=v2" width="583" height="306" role="button" title="TusharTrivedi_21-1711558240362.png" alt="TusharTrivedi_21-1711558240362.png" /></span></P><P>After selecting a tenant in the next step choose the domain for your SAP Cloud identity services application.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="TusharTrivedi_22-1711558240383.png" style="width: 580px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/87641iEFD4BF3271BCFE37/image-dimensions/580x303?v=v2" width="580" height="303" role="button" title="TusharTrivedi_22-1711558240383.png" alt="TusharTrivedi_22-1711558240383.png" /></span></P><P>Click on the next button and configure parameters as shown in below screenshot.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="TusharTrivedi_23-1711558240404.png" style="width: 580px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/87642iFB90AFAA4E99207C/image-dimensions/580x303?v=v2" width="580" height="303" role="button" title="TusharTrivedi_23-1711558240404.png" alt="TusharTrivedi_23-1711558240404.png" /></span></P><P>Click on the next button and make a final review of the setup you have done while establishing the trust.&nbsp; Then click on the finish button and save the details.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="TusharTrivedi_24-1711558240426.png" style="width: 586px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/87645i81921A9A59AC826E/image-dimensions/586x306?v=v2" width="586" height="306" role="button" title="TusharTrivedi_24-1711558240426.png" alt="TusharTrivedi_24-1711558240426.png" /></span></P><P>Once done, you can see the new active trust configuration as shown below.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="TusharTrivedi_25-1711558240444.png" style="width: 581px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/87644i1759C90ACFBCBE7C/image-dimensions/581x305?v=v2" width="581" height="305" role="button" title="TusharTrivedi_25-1711558240444.png" alt="TusharTrivedi_25-1711558240444.png" /></span></P><P>To provide access to the user, click on the Users section which is inside the “Security” section on the left menu.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="TusharTrivedi_26-1711558240458.png" style="width: 580px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/87643i7725168E02472D61/image-dimensions/580x303?v=v2" width="580" height="303" role="button" title="TusharTrivedi_26-1711558240458.png" alt="TusharTrivedi_26-1711558240458.png" /></span></P><P>Click on the user and assign role collection to the user as shown below.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="TusharTrivedi_27-1711558240478.png" style="width: 581px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/87646iCC474B356848F0EC/image-dimensions/581x305?v=v2" width="581" height="305" role="button" title="TusharTrivedi_27-1711558240478.png" alt="TusharTrivedi_27-1711558240478.png" /></span></P><P>You can select different roles and assign them to the user. Here we have added three roles to the user.&nbsp; After selecting all the roles, click on the&nbsp; “Assign role collection” button and save the details.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="TusharTrivedi_28-1711558240506.png" style="width: 580px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/87648iDFCEFBDD87A73D6E/image-dimensions/580x303?v=v2" width="580" height="303" role="button" title="TusharTrivedi_28-1711558240506.png" alt="TusharTrivedi_28-1711558240506.png" /></span></P><P>We have completed the configurations in IBM Security Verify and SAP Cloud Identity Services. Let’s test it now by opening the SAP business studio application as shown below.</P><P><STRONG><U>How does it work? Let’s Check.</U></STRONG></P><P>Log into SAP BTP Cockpit and Navigate to “Instances and Subscriptions” under “Services” as highlighted below:</P><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="TusharTrivedi_29-1711558240524.png" style="width: 582px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/87647i747B918F47100581/image-dimensions/582x304?v=v2" width="582" height="304" role="button" title="TusharTrivedi_29-1711558240524.png" alt="TusharTrivedi_29-1711558240524.png" /></span></P><P>It will redirect to the sign in options screen of the SAP. Here, select SAP cloud identity service as an identity provider.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="TusharTrivedi_30-1711558240534.png" style="width: 583px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/87649iBB43174F0F6B5561/image-dimensions/583x306?v=v2" width="583" height="306" role="button" title="TusharTrivedi_30-1711558240534.png" alt="TusharTrivedi_30-1711558240534.png" /></span></P><P>Once you select, it will redirect to the verify sign in option screen for a authentication. Here you can select a different sign in option for Verify or can log in with IBM id/Cloud directory.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="TusharTrivedi_31-1711558240543.png" style="width: 580px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/87650i48ED1F1BEB730AAE/image-dimensions/580x303?v=v2" width="580" height="303" role="button" title="TusharTrivedi_31-1711558240543.png" alt="TusharTrivedi_31-1711558240543.png" /></span></P><P>Enter your IBMid for log in and click the continue button.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="TusharTrivedi_32-1711558240557.png" style="width: 583px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/87651iE87EDDC24774E25E/image-dimensions/583x305?v=v2" width="583" height="305" role="button" title="TusharTrivedi_32-1711558240557.png" alt="TusharTrivedi_32-1711558240557.png" /></span></P><P>&nbsp;<SPAN>It will redirect you for w3 authentication screen where you can enter your w3 id &amp; password.</SPAN></P><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="TusharTrivedi_33-1711558240565.png" style="width: 580px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/87653i9F758C1762A1DA16/image-dimensions/580x304?v=v2" width="580" height="304" role="button" title="TusharTrivedi_33-1711558240565.png" alt="TusharTrivedi_33-1711558240565.png" /></span></P><P>Once you click on sign in, you will see below screen of SAP business application studio.</P><P>&nbsp;</P><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="TusharTrivedi_34-1711558240572.png" style="width: 582px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/87652i3AE86427757EF2BF/image-dimensions/582x306?v=v2" width="582" height="306" role="button" title="TusharTrivedi_34-1711558240572.png" alt="TusharTrivedi_34-1711558240572.png" /></span></P><P>Click on the “OK” button and you will be redirected to the SAP Business Application Studio home screen.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="TusharTrivedi_35-1711558240600.png" style="width: 581px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/87654i00A7A88933D64B54/image-dimensions/581x304?v=v2" width="581" height="304" role="button" title="TusharTrivedi_35-1711558240600.png" alt="TusharTrivedi_35-1711558240600.png" /></span></P><P><STRONG><U>Conclusion</U></STRONG></P><P>To summarise, combining IBM Security Verify with SAP Cloud Identity Services via SAML 2.0 provides a strong solution for organisations wishing to:<BR /><BR /><U>Enhance security</U>: By implementing multi-factor authentication and centralised user management, businesses may greatly minimise the risk of unauthorised access to vital data and applications.</P><P><U>Improve the user experience</U>: SAML 2.0 integration offers single sign-on, which allows users to access various applications with a single login, eliminating login fatigue and increasing overall user experience.</P><P><U>Simplify identity management</U>: Consolidating identity management across several platforms allows organisations to streamline administration operations and reduce the complexity of managing user access.</P><P>Overall, this integration enables organisations to achieve a balance between strong security and a user-friendly interface, building trust and confidence in this digital era.</P> 2024-04-02T10:29:43.856000+02:00 https://community.sap.com/t5/technology-blogs-by-sap/handling-third-party-cookies-deprecation-in-identity-authentication/ba-p/13659277 Handling Third Party Cookies Deprecation in Identity Authentication 2024-04-08T10:55:44.430000+02:00 ValAtanassov https://community.sap.com/t5/user/viewprofilepage/user-id/125402 <H2 id="toc-hId-990885242">Background</H2><P>A while ago Google announced the deprecation of third-party cookies for the Chrome-based browsers (<A title="Prepare for third-party cookie restrictions" href="https://developers.google.com/privacy-sandbox/3pcd" target="_self" rel="nofollow noopener noreferrer">Prepare for third-party cookie restrictions</A>&nbsp;). Starting Q1 2024, 1% of all browsers already have their third party cookies usage deprecated with the goal to completely phase out the old way of using cookies by mid-Q3 2024.</P><H2 id="toc-hId-794371737">The Affected</H2><P>As a result, certain sign-in scenarios concerning Single Sign-On (SSO) may be affected. Deprecating the traditional way of cookie usage means that browsers will automatically block cookies from applications embedded in inline frame (iframe), for example, thus braking sign-in flows. As Identity Authentication is often embedded on top-level pages, it had to ensure the SSO flow will continue to function. There are a couple of solutions that the administrators can implement after the start of the deprecation period.</P><H2 id="toc-hId-597858232">The Solutions</H2><H3 id="toc-hId-530427446">Cookies Having Independent Partitioned State (CHIPS)</H3><P>In this scenario, embedded applications can set partitioned cookies that can be used only on the current top-level site. The implementation of CHIPS depends on the developers of the given applications. The application has to be extended to support it. You can read more about that in&nbsp;<A title="Cookies Having Independent Partitioned State (CHIPS)" href="https://developers.google.com/privacy-sandbox/3pcd/chips" target="_blank" rel="noopener nofollow noreferrer">Cookies Having Independent Partitioned State (CHIPS)</A>.</P><H3 id="toc-hId-333913941">Storage Access API</H3><P>This is also what Identity Authentication currently uses and supports. Read more at<A title="Storage Access API" href="https://developers.google.com/privacy-sandbox/3pcd/storage-access-api" target="_blank" rel="noopener nofollow noreferrer">&nbsp;Storage Access API</A>.</P><P>In the typical sign-in flow, the embedded application requests storage access permissions to the browser. Upon sign-in attempt, the user sees the following message:&nbsp;<span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2024-04-02 at 10.41.14.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/91498i22AC3C5AB78F2F61/image-size/large?v=v2&amp;px=999" role="button" title="Screenshot 2024-04-02 at 10.41.14.png" alt="Screenshot 2024-04-02 at 10.41.14.png" /></span>Once&nbsp;<STRONG>Continue</STRONG> is chosen<STRONG>,</STRONG>&nbsp;a request is triggered, asking the browser to present the possibility to allow access to cookies. The prompt is similar to the one below:<span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2024-04-02 at 10.50.17.png" style="width: 400px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/91502iBE044A0BCBA14A37/image-size/medium?v=v2&amp;px=400" role="button" title="Screenshot 2024-04-02 at 10.50.17.png" alt="Screenshot 2024-04-02 at 10.50.17.png" /></span><BR />If access is allowed, the sign-in flow continues.</P><P>If denied, the sign-in flow of the embedded Identity Authentication sign-in screen is broken and no signing in is possible. The user sees the following message:<span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2024-04-02 at 10.42.53.png" style="width: 692px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/91503i72E6C319CB8E5643/image-size/large?v=v2&amp;px=999" role="button" title="Screenshot 2024-04-02 at 10.42.53.png" alt="Screenshot 2024-04-02 at 10.42.53.png" /></span></P><P>In another scenario, Identity Authentication can be used in a pure proxy mode. In this situation the browser of the user might have never interacted with the SAP (ondemand.com) domain. As a result, the browser blocks the iframed domain until the user interacts with it separately on a top-level.</P><P>To resolve this, Identity Authentication redirects the users to a separate page, where they have to perform some kind of interaction, so that the top-level domain of the page is considered "familiar" to the browser. This interaction is as simple as the confirmation to the message below:<BR /><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2024-04-02 at 10.43.06.png" style="width: 711px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/91504iD336FC1959326E88/image-size/large?v=v2&amp;px=999" role="button" title="Screenshot 2024-04-02 at 10.43.06.png" alt="Screenshot 2024-04-02 at 10.43.06.png" /></span><SPAN><BR />In some situations this might cause confusion, since with the proxy mode configuration the users might not even know they are signing in via Identity Authentication, or that SAP is involved in the sign-in flow at all. However, there was no other option to work around the limitation than sending the user to a separate confirmation page. Once the interaction is done, the users no longer need to perform this step.</SPAN></P><H2 id="toc-hId-8317717">Deprecation Trial</H2><H3 id="toc-hId--59113069">Google Offering</H3><P>For customers that would require more time to implement changes on their application, Google offers a grace period. During this grace period, an opt-out of the new way of handling cookies is possible. Customers can obtain their deprecation trial tokens from Google upon request. You can read more at&nbsp;<A title="Preserving critical user experiences" href="https://developers.google.com/privacy-sandbox/3pcd/temporary-exceptions/preserving-critical-user-experiences" target="_blank" rel="noopener nofollow noreferrer">Preserving critical user experiences</A>.</P><H3 id="toc-hId--255626574">Identity Authentication Solution</H3><P>Identity Authentication supports such scenarios allowing customers to add their deprecation trial tokens so that they are sent via an HTTP header. This ensures that Identity Authentication customers with custom domains can use the deprecation trial for those domains respectively. The field to input the token is situated on the same place in the Identity Authentication admin console, where the custom domains are configured:<BR />&nbsp;<span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ValAtanassov_9-1712238187712.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/91473i393D9030EEA17E77/image-size/large?v=v2&amp;px=999" role="button" title="ValAtanassov_9-1712238187712.png" alt="ValAtanassov_9-1712238187712.png" /></span></P><P>We will update this article if new updates or scenarios that we have not covered appear.</P> 2024-04-08T10:55:44.430000+02:00 https://community.sap.com/t5/technology-blogs-by-sap/configuration-sap-ariba-sso-with-sap-cloud-identity-services-identity/ba-p/13665601 Configuration: SAP Ariba SSO with SAP Cloud Identity Services - Identity Authentication 2024-04-10T15:18:20.686000+02:00 ondrej_pandoscak https://community.sap.com/t5/user/viewprofilepage/user-id/266513 <P>See as well:&nbsp;</P><UL><LI><A href="https://community.sap.com/t5/technology-blogs-by-sap/summary-sap-ariba-sso-with-sap-cloud-identity-services-identity/ba-p/13665845" target="_self"><SPAN>Summary: SAP Ariba SSO with SAP Cloud Identity Services - Identity Authentication</SPAN></A></LI><LI><A href="https://community.sap.com/t5/technology-blogs-by-sap/overview-sap-ariba-sso-with-sap-cloud-identity-services-identity/ba-p/13665483" target="_self">Overview:&nbsp;SAP Ariba SSO with SAP Cloud Identity Services - Identity Authentication</A></LI></UL><P><STRONG>Table of Contents:</STRONG></P><UL class="lia-list-style-type-circle"><LI>SAP IAS SAML Metadata Retrieval</LI><LI>SAP Ariba SAML Metadata Retrieval&nbsp;(<A title="PLICM-871: Ability to Configure SAML Authentication Settings in Intelligent Configuration Manager" href="https://help.sap.com/docs/ariba/aba524a8b2444714b289cee09bd4c377/5f4e974fcbb04c48acdd91c1db8bf4fc.html?q=PLICM-871" target="_blank" rel="noopener noreferrer">PLICM-871</A>)</LI><LI>SAP IAS SAML Authentication Configuration</LI><LI>SAP Ariba SAML Authentication Self-service Configuration (<A title="PLICM-871: Ability to Configure SAML Authentication Settings in Intelligent Configuration Manager" href="https://help.sap.com/docs/ariba/aba524a8b2444714b289cee09bd4c377/5f4e974fcbb04c48acdd91c1db8bf4fc.html?q=PLICM-871" target="_blank" rel="noopener noreferrer">PLICM-871</A>)</LI><LI>SAP Ariba SSO Verification<BR /><UL><LI>Validate the SAP Ariba SSO via Intelligent Configuration Management</LI><LI>Validate the SAP Ariba SSO by accessing the SAP Ariba URL in the browser<UL><LI>SAP Ariba without SSO</LI><LI>SAP Ariba with SSO to SAP IAS</LI><LI>SAP Ariba with SSO to Microsoft Entra ID</LI></UL></LI></UL></LI></UL><H1 id="toc-hId-862610501">SAP IAS SAML Metadata Retrieval</H1><P>To retrieve SAML Metadata from <STRONG>SAP IAS</STRONG>:</P><UL><LI>enter the below <A title="Export SAML 2.0 IdP Metadata from IAS" href="https://help.sap.com/docs/conversational-ai/integration-with-sap-s-4hana/export-saml-2-0-idp-metadata-from-ias" target="_blank" rel="noopener noreferrer"><STRONG>SAP IAS</STRONG> URL</A> into browser:<BR />https://&lt;SAP IAS tenant&nbsp;&nbsp;id&gt;.<SPAN>accounts.ondemand.com/saml2/metadata?action=download</SPAN></LI><LI>&nbsp;store the downloaded <STRONG>SAP IAS Metadata File</STRONG></LI></UL><H1 id="toc-hId-666096996">SAP Ariba SAML Authentication Self-service Configuration (<A title="PLICM-871: Ability to Configure SAML Authentication Settings in Intelligent Configuration Manager" href="https://help.sap.com/docs/ariba/aba524a8b2444714b289cee09bd4c377/5f4e974fcbb04c48acdd91c1db8bf4fc.html" target="_blank" rel="noopener noreferrer">PLICM-871</A>)</H1><P>From 2402 release of "<A title="PLICM-871: Ability to Configure SAML Authentication Settings in Intelligent Configuration Manager" href="https://help.sap.com/docs/ariba/aba524a8b2444714b289cee09bd4c377/5f4e974fcbb04c48acdd91c1db8bf4fc.html" target="_blank" rel="noopener noreferrer">PLICM-871</A>: Ability to Configure SAML Authentication Settings in Intelligent Configuration Manager" feature, customers can retrieve the <STRONG>SAP Ariba</STRONG> metadata file as self-service.</P><P><STRONG>Note:&nbsp;</STRONG>In case of configuring the SSO setup for <a href="https://community.sap.com/t5/c-khhcw49343/SAP+Ariba+Sourcing/pd-p/064803c0-aae3-46ca-8514-389b50b4838f" class="lia-product-mention" data-product="425-1">SAP Ariba Sourcing</a>, <a href="https://community.sap.com/t5/c-khhcw49343/SAP+Ariba+Contracts/pd-p/32a4b2ae-0d09-497d-b196-c45e3e758efe" class="lia-product-mention" data-product="420-1">SAP Ariba Contracts</a>, <a href="https://community.sap.com/t5/c-khhcw49343/SAP+Ariba+Supplier+Lifecycle+and+Performance/pd-p/9566c2c2-c688-4939-ac50-30732b383e53" class="lia-product-mention" data-product="427-1">SAP Ariba Supplier Lifecycle and Performance</a>&nbsp;<STRONG>for&nbsp;suite-integrated tenants</STRONG> the SSO setup and thus the metadata retrieval needs to be executed on the <STRONG>SAP Ariba procurement tenant </STRONG>(e.g. for US DC https://&lt;SAP Ariba tenant id&gt;.procurement.ariba.com). In case of&nbsp;<A href="https://help.sap.com/docs/buying-invoicing/multi-erp-configuration-guide/overview-of-multi-erp" target="_self" rel="noopener noreferrer"><SPAN class="">SAP Ariba</SPAN><SPAN>&nbsp;</SPAN><SPAN class="">multi-ERP</SPAN></A><SPAN><A href="https://help.sap.com/docs/buying-invoicing/multi-erp-configuration-guide/overview-of-multi-erp" target="_self" rel="noopener noreferrer">&nbsp;configuration</A> setup (f.k.a Federated Process Control FPC) the SSO configuration and metadata retrieval needs to happen for the parent tenant.&nbsp;<BR />For standalone (not suite-integrated)&nbsp;<STRONG>SAP Ariba sourcing tenant </STRONG>(e.g. for US DC https://&lt;SAP Ariba tenant id&gt;.sourcing.ariba.com)</SPAN></P><P><U>Prerequisites:</U></P><UL><LI><STRONG>SAP Ariba</STRONG> user with <SPAN><STRONG>Third Party Enterprise User (Ariba)</STRONG>&nbsp;</SPAN>type&nbsp;</LI><LI><STRONG>SAP Ariba</STRONG> user with <STRONG>Customer Administrator</STRONG> group membership</LI></UL><P>To configure <STRONG>SAP Ariba</STRONG> SAML Authentication with <STRONG>SAP IAS</STRONG>:</P><UL><LI>enter the <STRONG>SAP Ariba</STRONG> tenant as per <STRONG>Note</STRONG> above using the&nbsp;<SPAN><STRONG>Third Party Enterprise User (Ariba)&nbsp;</STRONG>login URL (e.g. for US DC https://&lt;SAP Ariba tenant id&gt;.procurement.ariba.com/?passwordadapter=ThirdPartyUser)</SPAN></LI><LI>navigate to <STRONG>Manage</STRONG> -&gt; (<STRONG>Core Administration</STRONG> - for SAP Ariba procurement tenant or <STRONG>Administration</STRONG> for SAP ariba sourcing tenant) -&gt; <STRONG>Intelligent Configuration Manager</STRONG> -&gt; <STRONG>Manage Configurations</STRONG> -&gt; <STRONG>[Continue]&nbsp;</STRONG>-&gt;&nbsp;<STRONG>Authentication&nbsp;</STRONG>-&gt;&nbsp;<STRONG>[Update]</STRONG><STRONG><STRONG><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="SAP Ariba SSO Config.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/91916i527FC97AFEC405BA/image-size/large?v=v2&amp;px=999" role="button" title="SAP Ariba SSO Config.png" alt="SAP Ariba SSO Config.png" /></span></STRONG></STRONG></LI><LI>load the <STRONG>SAP IAS Metadata File</STRONG> you retrieved from <STRONG>SAP IAS</STRONG></LI><LI>select <STRONG>Enable SAML authentication</STRONG> to <STRONG>Yes</STRONG>, to enable the SSO (all the data are pregonfigured from the imported&nbsp;<STRONG>SAP IAS Metadata File</STRONG>)</LI><LI>press <STRONG>[Submit]</STRONG></LI></UL><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="SAP Ariba SSO Config Enable.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/91933iCAD108275DC23257/image-size/large?v=v2&amp;px=999" role="button" title="SAP Ariba SSO Config Enable.png" alt="SAP Ariba SSO Config Enable.png" /></span></P><UL><LI>&nbsp;press <STRONG>[Approve]</STRONG></LI></UL><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="SAP Ariba SSO Config Approve.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/91936i58772D2CFB60CF1E/image-size/large?v=v2&amp;px=999" role="button" title="SAP Ariba SSO Config Approve.png" alt="SAP Ariba SSO Config Approve.png" /></span></P><UL><LI>&nbsp;press <STRONG>[Apply]</STRONG> - <FONT color="#FF0000">after this step <STRONG>SAP Ariba</STRONG>&nbsp;SSO changes will take effect!</FONT></LI></UL><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="SAP Ariba SSO Config Apply.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/91978i67646A9613D25B11/image-size/large?v=v2&amp;px=999" role="button" title="SAP Ariba SSO Config Apply.png" alt="SAP Ariba SSO Config Apply.png" /></span></P><P>&nbsp;</P><UL><LI>In case the <STRONG>Enable SAML authentication&nbsp;</STRONG>is set to&nbsp;<FONT color="#0000FF"><STRONG>Yes</STRONG></FONT>, <STRONG>SAP Ariba&nbsp;</STRONG>will use&nbsp;to authenticate the users credentials (passwords) stored in&nbsp;<STRONG>SAP IAS</STRONG>&nbsp;and not credentials (passwords) stored in <STRONG>SAP Ariba</STRONG>. Therefore&nbsp;<STRONG>SAP Ariba</STRONG> business users will need to be invited to <STRONG>SAP IAS</STRONG>, activate their accounts and create their user credentials (passwords)</LI></UL><P>&nbsp;</P><UL><LI>In case the <STRONG>Enable SAML authentication&nbsp;</STRONG>is set to&nbsp;<FONT color="#0000FF"><STRONG>No</STRONG></FONT>, <STRONG>SAP Ariba&nbsp;</STRONG>will use&nbsp;to authenticate the users&nbsp;credentials (passwords) stored in <STRONG>SAP Ariba</STRONG></LI></UL><P><STRONG>Note: </STRONG>Users of type&nbsp;<SPAN><STRONG>Third Party Enterprise User (Ariba)</STRONG></SPAN>, using the *<SPAN>?passwordadapter=ThirdPartyUser URL to login into <STRONG>SAP Ariba</STRONG> will always keep using credentials (passwords) stored in SAP Ariba, no matter of the SSO enablement</SPAN></P><H1 id="toc-hId-469583491">SAP Ariba SAML Metadata Retrieval&nbsp;(<A title="PLICM-871: Ability to Configure SAML Authentication Settings in Intelligent Configuration Manager" href="https://help.sap.com/docs/ariba/aba524a8b2444714b289cee09bd4c377/5f4e974fcbb04c48acdd91c1db8bf4fc.html" target="_blank" rel="noopener noreferrer">PLICM-871</A>)</H1><P>From 2402 release of "<A title="PLICM-871: Ability to Configure SAML Authentication Settings in Intelligent Configuration Manager" href="https://help.sap.com/docs/ariba/aba524a8b2444714b289cee09bd4c377/5f4e974fcbb04c48acdd91c1db8bf4fc.html" target="_blank" rel="noopener noreferrer">PLICM-871</A>: Ability to Configure SAML Authentication Settings in Intelligent Configuration Manager" feature, customers can retrieve the <STRONG>SAP Ariba</STRONG> metadata file as self-service.</P><P><STRONG>Note:&nbsp;</STRONG>In case of configuring the SSO setup for <a href="https://community.sap.com/t5/c-khhcw49343/SAP+Ariba+Sourcing/pd-p/064803c0-aae3-46ca-8514-389b50b4838f" class="lia-product-mention" data-product="425-2">SAP Ariba Sourcing</a>, <a href="https://community.sap.com/t5/c-khhcw49343/SAP+Ariba+Contracts/pd-p/32a4b2ae-0d09-497d-b196-c45e3e758efe" class="lia-product-mention" data-product="420-2">SAP Ariba Contracts</a>, <a href="https://community.sap.com/t5/c-khhcw49343/SAP+Ariba+Supplier+Lifecycle+and+Performance/pd-p/9566c2c2-c688-4939-ac50-30732b383e53" class="lia-product-mention" data-product="427-2">SAP Ariba Supplier Lifecycle and Performance</a>&nbsp;<STRONG>for&nbsp;suite-integrated tenants</STRONG> the SSO setup and thus the metadata retrieval needs to be executed on the <STRONG>SAP Ariba procurement tenant</STRONG>. In case of&nbsp;<A href="https://help.sap.com/docs/buying-invoicing/multi-erp-configuration-guide/overview-of-multi-erp" target="_self" rel="noopener noreferrer"><SPAN class="">SAP Ariba</SPAN><SPAN>&nbsp;</SPAN><SPAN class="">multi-ERP</SPAN></A><SPAN><A href="https://help.sap.com/docs/buying-invoicing/multi-erp-configuration-guide/overview-of-multi-erp" target="_self" rel="noopener noreferrer">&nbsp;configuration</A> setup (f.k.a Federated Process Control FPC) the SSO configuration and metadata retrieval needs to happen for the parent tenant.&nbsp;</SPAN></P><P><U>Prerequisites:</U></P><UL><LI><STRONG>SAP Ariba</STRONG> user with <STRONG>Customer Administrator</STRONG> group membership</LI></UL><P>To retrieve SAML Metadata from <STRONG>SAP Ariba</STRONG>:</P><UL><LI>enter the <STRONG>SAP Ariba</STRONG> tenant as per <STRONG>Note</STRONG> above</LI><LI>navigate to <STRONG>Manage</STRONG> -&gt; (<STRONG>Core Administration</STRONG> - for SAP Ariba procurement tenant or <STRONG>Administration</STRONG> for SAP ariba sourcing tenant) -&gt; <STRONG>Intelligent Configuration Manager</STRONG> -&gt; <STRONG>Manage Configurations</STRONG> -&gt; <STRONG>[Continue]&nbsp;</STRONG>-&gt;&nbsp;<STRONG>Authentication</STRONG></LI><LI>download and store the appropriate <U>Test</U> or <U>Production</U> <STRONG>SAP Ariba Metadata File</STRONG></LI></UL><P><STRONG><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="SAP Ariba Metadata.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/91815i5916E3956ABBD7E9/image-size/large?v=v2&amp;px=999" role="button" title="SAP Ariba Metadata.png" alt="SAP Ariba Metadata.png" /></span></STRONG></P><P><FONT color="#FF0000"><STRONG>Note:</STRONG>&nbsp;Because of current temporary gap in the <STRONG>SAP Ariba Metadata File</STRONG> generation, manual adjustment to the&nbsp;<STRONG>entityID</STRONG> attribute value is required as per the process described below.&nbsp;<BR />(assumption here is that the SAP Ariba SSO SAML configuration was already setup and SAP Ariba tenant has SSO enabled)</FONT></P><P>Manual <STRONG>SAP Ariba Metadata File</STRONG> adjustment process:</P><UL><LI>Run&nbsp;chrome://extensions/ in Google Chrome browser</LI><LI>Navigate to Chrome Web Store</LI></UL><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="Chrome Web Store.png" style="width: 382px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/91955i9784450E2A8CF30C/image-size/large?v=v2&amp;px=999" role="button" title="Chrome Web Store.png" alt="Chrome Web Store.png" /></span></P><UL><LI>&nbsp; Search for <STRONG>SAML Chrome Panel </STRONG>-&gt; <STRONG>[Add to Chrome]</STRONG></LI></UL><P><STRONG><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="SAML Chrome Panel.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/91961i7EFF02EC30DC82DD/image-size/large?v=v2&amp;px=999" role="button" title="SAML Chrome Panel.png" alt="SAML Chrome Panel.png" /></span></STRONG></P><UL><LI>&nbsp;Hit <STRONG>[F12]</STRONG> to open the <STRONG>Chrome DevTools</STRONG></LI><LI>Open your <STRONG>SAP Ariba</STRONG> tenant URL in Google Chrome<BR />(e.g. https://&lt;SAP Ariba&nbsp;tenant&nbsp;&nbsp;id&gt;.procurement.ariba.com)</LI><LI>Navigate to the&nbsp;<STRONG>Chrome DevTools&nbsp;</STRONG>-&gt; SAML -&gt; copy the value of the <STRONG>SAP Ariba SAML Request</STRONG>&nbsp;<FONT color="#0000FF"><EM>saml2:Issuer</EM></FONT> XML element (e.g. http://&lt;SAP Ariba tenant id&gt;.procurement.ariba.com)</LI></UL><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="entityID.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/91989i37C5A77294176C76/image-size/large?v=v2&amp;px=999" role="button" title="entityID.png" alt="entityID.png" /></span></P><UL><LI><SPAN>Open the&nbsp;&nbsp;<STRONG>SAP Ariba Metadata File&nbsp;</STRONG>and replace the value of <FONT color="#0000FF">entityID</FONT> attribute with the value of&nbsp;</SPAN><FONT color="#0000FF"><EM>saml2:Issuer</EM></FONT> XML element, retrieved from&nbsp;<STRONG>SAP Ariba SAML&nbsp;</STRONG>in the&nbsp;<STRONG>Chrome DevTools&nbsp;</STRONG>and save the modified&nbsp;<SPAN><STRONG>SAP Ariba Metadata File&nbsp;</STRONG></SPAN></LI></UL><H1 id="toc-hId-273069986">SAP IAS SAML Authentication Configuration</H1><P><U>Prerequisites:</U></P><UL><LI><STRONG>SAP IAS</STRONG> user added as <STRONG>Administrator&nbsp;</STRONG>to SAP IAS (<STRONG>Users &amp; Authorizations</STRONG> -&gt; <STRONG>Administrators</STRONG> -&gt; <STRONG>[Add]</STRONG>)</LI></UL><P>To configure <STRONG>SAP IAS</STRONG>&nbsp;SAML Authentication with <STRONG>SAP Ariba</STRONG>:</P><UL><LI>enter the SAP <STRONG>IAS Administration Console</STRONG>&nbsp;via https://&lt;SAP IAS tenant&nbsp;&nbsp;id&gt;.<SPAN>accounts.ondemand.com/admin</SPAN></LI><LI>navigate to <STRONG>Application &amp; Resources</STRONG> -&gt; <STRONG>Application&nbsp;</STRONG>-&gt; <STRONG>[Create]</STRONG> to create <A href="https://help.sap.com/docs/identity-authentication/identity-authentication/configuring-applications?version=Cloud" target="_blank" rel="noopener noreferrer">Application</A> for <STRONG>SAP Ariba</STRONG> as <STRONG>Service Provider</STRONG> (<STRONG>SP</STRONG>)<UL><LI>Enter the <STRONG>Display Name</STRONG>, choose <STRONG>SAP Ariba solution</STRONG> as <STRONG>Type</STRONG>, <STRONG>SAML 2.0</STRONG> as <STRONG>Protocol Type</STRONG> and hit <STRONG>[Create]</STRONG></LI></UL></LI></UL><P><STRONG><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="Application.png" style="width: 400px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/91993i16AFFA8CDD1982F3/image-size/medium?v=v2&amp;px=400" role="button" title="Application.png" alt="Application.png" /></span></STRONG></P><UL><LI>&nbsp;navigate to SAML 2.0 Configuration and upload the adjusted&nbsp;<SPAN><STRONG>SAP Ariba Metadata File</STRONG></SPAN></LI></UL><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="SAP IAS SSO Config.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/91994i6CE177D4F923DD39/image-size/large?v=v2&amp;px=999" role="button" title="SAP IAS SSO Config.png" alt="SAP IAS SSO Config.png" /></span></P><UL><LI>SAML 2.0 configuration is pre-set out of the uploaded&nbsp;<SPAN><STRONG>SAP Ariba Metadata File</STRONG></SPAN></LI></UL><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="SAP IAS SSO Config Loaded.png" style="width: 404px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/92067i0E8E93C1F4C464C7/image-size/large?v=v2&amp;px=999" role="button" title="SAP IAS SSO Config Loaded.png" alt="SAP IAS SSO Config Loaded.png" /></span></P><UL><LI>&nbsp;hit <STRONG>[Save]</STRONG></LI></UL><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="SAP IAS Config Save.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/92068i5727879C586D4A16/image-size/large?v=v2&amp;px=999" role="button" title="SAP IAS Config Save.png" alt="SAP IAS Config Save.png" /></span></P><UL><LI>&nbsp;navigate to <STRONG>Subject Name Identifier</STRONG> and set the <STRONG>Primary Attribute</STRONG> Value to <STRONG>Login Name&nbsp;</STRONG>and hit <STRONG>[Save]</STRONG></LI></UL><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="SAP IAS Subject Name Identifier.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/92072iE6FE24D2077F6F63/image-size/large?v=v2&amp;px=999" role="button" title="SAP IAS Subject Name Identifier.png" alt="SAP IAS Subject Name Identifier.png" /></span></P><UL><LI>&nbsp;ensure the users setup in <STRONG>SAP IAS</STRONG> have the <STRONG>Login Name</STRONG> set and matching to the <STRONG>SAP Ariba</STRONG> user <STRONG>UniqueName</STRONG><UL><LI>navigate to <STRONG>Users &amp; Authorizations</STRONG> -&gt; <STRONG>User Management</STRONG> -&gt; and specific user <STRONG>SAP IAS</STRONG>&nbsp;<STRONG>Login Name</STRONG> needs to match user <STRONG>SAP Ariba UniqueName</STRONG></LI></UL></LI></UL><P><STRONG>&nbsp;SAP IAS&nbsp;</STRONG>User Profile:<span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="SAP IAS User Profile.png" style="width: 986px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/92075iAD5074CBCF3D6EAC/image-size/large?v=v2&amp;px=999" role="button" title="SAP IAS User Profile.png" alt="SAP IAS User Profile.png" /></span></P><P><STRONG>&nbsp;SAP Ariba</STRONG> User Profile:</P><P>&nbsp;</P><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="SAP Ariba User Profile.png" style="width: 852px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/92077i496E281F2B85CFAA/image-size/large?v=v2&amp;px=999" role="button" title="SAP Ariba User Profile.png" alt="SAP Ariba User Profile.png" /></span></P><P>&nbsp;In case you are reading this line, you have successfully configured the <STRONG>Single Sign-On</STRONG> (<STRONG>SSO</STRONG>) between <STRONG>SAP Ariba</STRONG> as <STRONG>Service Provider</STRONG> (<STRONG>SP</STRONG>) and <STRONG>SAP IAS</STRONG> as <STRONG>Identity Provider</STRONG> (<STRONG>IdP</STRONG>)!</P><H1 id="toc-hId-76556481">SAP Ariba SSO Verification</H1><P>To verify the status of the <STRONG>SAP Ariba</STRONG> SSO Setup follow one of the options below:</P><UL><LI>Validate the <STRONG>SAP Ariba</STRONG> SSO via <STRONG>Intelligent Configuration Management</STRONG></LI><LI>Validate the <STRONG>SAP Ariba</STRONG> SSO by accessing the <STRONG>SAP Ariba</STRONG> URL in the browser</LI></UL><H2 id="toc-hId-9125695">Validate the <STRONG>SAP Ariba</STRONG> SSO via <STRONG>Intelligent Configuration Management</STRONG></H2><P><U>Prerequisites:</U></P><UL><LI><STRONG>SAP Ariba</STRONG> user with <STRONG>Customer Administrator</STRONG> group membership</LI></UL><P>To review existing <STRONG>SAP Ariba </STRONG>SSO setup:</P><UL><LI>enter the <STRONG>SAP Ariba</STRONG> tenant</LI><LI>navigate to <STRONG>Manage</STRONG> -&gt; (<STRONG>Core Administration</STRONG> - for SAP Ariba procurement tenant or <STRONG>Administration</STRONG> for SAP ariba sourcing tenant) -&gt; <STRONG>Intelligent Configuration Manager</STRONG> -&gt; <STRONG>Manage Configurations</STRONG> -&gt; <STRONG>[Continue]&nbsp;</STRONG>-&gt;&nbsp;<STRONG>Authentication</STRONG></LI><LI>check the <STRONG>SAP Ariba</STRONG> SSO configuration for&nbsp;<U>Test</U> or <U>Production</U></LI></UL><P><U><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="SSO Config.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/94589i74E8FFB7E1395347/image-size/large?v=v2&amp;px=999" role="button" title="SSO Config.png" alt="SSO Config.png" /></span></U></P><H2 id="toc-hId--187387810">Validate the <STRONG>SAP Ariba</STRONG> SSO by accessing the <STRONG>SAP Ariba</STRONG> URL in the browser</H2><P>Validate the <STRONG>SAP Ariba</STRONG> SSO setup by accessing the <STRONG>SAP Ariba</STRONG> URL via browser - accessing the business user access URL (<SPAN>e.g. for US DC https://&lt;SAP Ariba tenant id&gt;.sourcing.ariba.com</SPAN>).</P><P>Below tests will not work in case browser certificate is used and the business user is logged in to SAP Ariba without entering credentials.</P><H3 id="toc-hId--254818596">SAP Ariba without SSO</H3><P>Reaching below <STRONG>SAP Ariba Login</STRONG> screen means, <STRONG>SAP Ariba</STRONG> SSO is not setup and <STRONG>SAP Ariba</STRONG> site requires the user credentials to be entered as stored in <STRONG>SAP Ariba</STRONG></P><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="No SSO.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/94551i2A19812E50252D0C/image-size/large?v=v2&amp;px=999" role="button" title="No SSO.png" alt="No SSO.png" /></span></P><P>&nbsp;</P><H3 id="toc-hId--451332101">&nbsp;SAP Ariba with SSO to SAP IAS</H3><P>Reaching below <STRONG>SAP IAS Login</STRONG> screen means, <STRONG>SAP Ariba</STRONG> SSO is setup with <STRONG>SAP IAS</STRONG>&nbsp;(directly, without further identity federation) and <STRONG>SAP Ariba</STRONG> site requires the user credentials to be entered as stored in <STRONG>SAP IAS</STRONG></P><P><STRONG><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="IAS SSO.png" style="width: 752px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/94568i5552152C7CC6DBE2/image-size/large?v=v2&amp;px=999" role="button" title="IAS SSO.png" alt="IAS SSO.png" /></span></STRONG></P><P>&nbsp;</P><H3 id="toc-hId--647845606">SAP Ariba with SSO to Microsoft Entra ID</H3><P>Reaching below <STRONG>Microsoft Entra ID&nbsp;</STRONG>Login screen&nbsp;means, <STRONG>SAP Ariba</STRONG> SSO is setup with <STRONG>Microsoft Entra ID</STRONG>&nbsp;and <STRONG>SAP Ariba</STRONG> site requires the user credentials to be entered as stored in <STRONG>SAP Microsoft Entra ID</STRONG></P><P><STRONG>Note:</STRONG>&nbsp;You can achieve the usage of <STRONG>Microsoft Entra ID</STRONG> for <STRONG>SAP Ariba</STRONG> SSO via direct configuration to&nbsp;<STRONG>Microsoft Entra ID</STRONG> or via <STRONG>Identity Federation</STRONG> setup of <STRONG>SAP IAS</STRONG>, in case of <STRONG>Identity Federation</STRONG>, <STRONG>SAP Ariba</STRONG> SSO is setup to<STRONG> SAP IAS</STRONG> and <STRONG>SAP IAS</STRONG>&nbsp;delegates all the authentication requests to&nbsp;<STRONG>Microsoft Entra ID</STRONG>. Because of this we might not be able to recognize whether the <STRONG>SAP Ariba</STRONG> SSO is setup directly with <STRONG>Microsoft Entra ID</STRONG> or via <STRONG>SAP IAS Identity Federation</STRONG>.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="Microsoft Entra ID SSO.png" style="width: 400px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/94575i539D3C037985CA65/image-size/medium?v=v2&amp;px=400" role="button" title="Microsoft Entra ID SSO.png" alt="Microsoft Entra ID SSO.png" /></span></P><P>See as well:&nbsp;</P><UL><LI><A href="https://community.sap.com/t5/technology-blogs-by-sap/summary-sap-ariba-sso-with-sap-cloud-identity-services-identity/ba-p/13665845" target="_self"><SPAN>Summary: SAP Ariba SSO with SAP Cloud Identity Services - Identity Authentication</SPAN></A></LI><LI><A href="https://community.sap.com/t5/technology-blogs-by-sap/overview-sap-ariba-sso-with-sap-cloud-identity-services-identity/ba-p/13665483" target="_self">Overview:&nbsp;SAP Ariba SSO with SAP Cloud Identity Services - Identity Authentication</A></LI></UL> 2024-04-10T15:18:20.686000+02:00 https://community.sap.com/t5/technology-blogs-by-sap/overview-sap-ariba-sso-with-sap-cloud-identity-services-identity/ba-p/13665483 Overview: SAP Ariba SSO with SAP Cloud Identity Services - Identity Authentication 2024-04-10T15:19:19.410000+02:00 ondrej_pandoscak https://community.sap.com/t5/user/viewprofilepage/user-id/266513 <P>See as well:&nbsp;</P><UL><LI><A href="https://community.sap.com/t5/technology-blogs-by-sap/summary-sap-ariba-sso-with-sap-cloud-identity-services-identity/ba-p/13665845" target="_self"><SPAN>Summary: SAP Ariba SSO with SAP Cloud Identity Services - Identity Authentication</SPAN></A></LI><LI><A href="https://community.sap.com/t5/technology-blogs-by-sap/configuration-sap-ariba-sso-with-sap-cloud-identity-services-identity/ba-p/13665601" target="_self">Configuration: SAP Ariba SSO with SAP Cloud Identity Services - Identity Authentication</A></LI><LI><SPAN><A href="https://community.sap.com/t5/technology-blogs-by-sap/identity-federation-sap-ariba-sso-with-sap-cloud-identity-services-identity/ba-p/13666666" target="_self">Identity Federation: SAP Ariba SSO with SAP Cloud Identity Services - Identity Authentication</A></SPAN></LI></UL><P><STRONG>Table of Contents:</STRONG></P><UL class="lia-list-style-type-circle"><LI>Single Sign-On (SSO), Service Provider (SP), Identity Provider (IdP) and Identity Provider Proxy (IdP Proxy)</LI><LI>SAP Cloud Identity Services - Identity Authentication (SAP IAS - SAP Identity Authentication Service) Authentication Scenarios<BR /><UL><LI>Identity Provider (IdP) - Authentication Scenario</LI><LI>Identity Federation with Identity Provider Proxy (IdP Proxy) - Authentication Scenario</LI><LI>Service Provider (SP) vs Identity Provider (IdP) Initiated Authentication</LI></UL></LI><LI>SAP IAS Landscape Review and Recommendations<UL><LI>Review of Available&nbsp;SAP IAS Systems in Customer Landscape</LI><LI>Review of SAP IAS System Customer Administrators</LI><LI>Process of New SAP IAS System Provisioning</LI></UL></LI></UL><H1 id="toc-hId-862608829">Single Sign-On (SSO), Service Provider (SP), Identity Provider (IdP) and Identity Provider Proxy (IdP Proxy)</H1><P><STRONG><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="SSO.png" style="width: 846px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/90384i2EC9C2F728586553/image-size/large?v=v2&amp;px=999" role="button" title="SSO.png" alt="SSO.png" /></span></STRONG></P><P><STRONG>&nbsp;</STRONG><STRONG>Single Sign-On (SSO)</STRONG>&nbsp;is an authentication and authorization process that allows an <STRONG>User</STRONG> to access multiple enterprise applications with a single set of login credentials (username and password). <STRONG>Service Provider</STRONG> (<STRONG>SP</STRONG>) hosts a service (e.g. SAP Ariba Buying) that <STRONG>User</STRONG> wants to access. This <STRONG>Service Provider</STRONG> (<STRONG>SP</STRONG>) trusts the <STRONG>Identity Provider</STRONG> (<STRONG>IdP</STRONG>) (e.g. <STRONG>SAP IAS</STRONG> or Microsoft Entra ID), which controls the <STRONG>User</STRONG> access. SSO supports various protocols like <STRONG>Security Assertion Markup Language</STRONG> (<STRONG>SAML</STRONG>) or <STRONG>OpenID Connect</STRONG>.</P><P><STRONG>Identity Provider (IdP)&nbsp;</STRONG></P><UL><LI>System responsible for <STRONG>User</STRONG> authentication</LI><LI>Uniquely Identifies the <STRONG>User</STRONG></LI><LI>Contains <STRONG>User Store</STRONG> with and additional <STRONG>User Attributes</STRONG> (name, mail, group membership, ...)</LI><LI>Contains <STRONG>User Credentials</STRONG> (username/password)</LI><LI>Issues additional&nbsp;<STRONG>User Attributes</STRONG> (name, mail, group membership, ...)</LI><LI>Trusts one or multiple <STRONG>Service Providers</STRONG> (<STRONG>SP</STRONG>s)</LI></UL><P><STRONG>Service Provider (SP)</STRONG></P><UL><LI>System delegating&nbsp;<STRONG>User</STRONG> authentication to <STRONG>Identity Provider</STRONG> (<STRONG>IdP</STRONG>)</LI><LI>Relies on the <STRONG>User</STRONG> identity and <STRONG>User</STRONG>&nbsp;<STRONG>Attributes</STRONG> from <STRONG>Identity Provider</STRONG> (<STRONG>IdP</STRONG>)</LI><LI>Trusts single <STRONG>Identity Provider</STRONG> (<STRONG>IdP</STRONG>)</LI></UL><H1 id="toc-hId-666095324"><A title="SAP Cloud Identity Services - Identity Authentication" href="https://help.sap.com/docs/identity-authentication" target="_blank" rel="noopener noreferrer">SAP Cloud Identity Services - Identity Authentication</A> (SAP IAS - SAP Identity Authentication Service) Authentication Scenarios&nbsp;</H1><P><a href="https://community.sap.com/t5/c-khhcw49343/SAP+Cloud+Identity+Services/pd-p/67837800100800007337" class="lia-product-mention" data-product="155-1">SAP Cloud Identity Services</a>&nbsp;is SAP product for authentication and Single Sign-On (SSO) in cloud referred as <STRONG>SAP IAS</STRONG> (Identity Authentication Service) as well.&nbsp;</P><P><FONT color="#FF0000">To be compliant with the latest SAP Ariba "Next Generation" solutions (e.g. SAP Ariba Category Management, Supplier Profile Summary in SAP Ariba Supplier Lifecycle and Performance, ...) it is mandatory to have the SAP Ariba solutions' Single Sign-On (SSO) setup with <STRONG>SAP IAS </STRONG>(Test or Production).</FONT></P><P><STRONG>SAP IAS</STRONG> can be setup as <STRONG>Identity Provider</STRONG> (<STRONG>IdP</STRONG>) or configured with <STRONG>Identity Federation</STRONG> to serve as <STRONG>Identity Provider Proxy</STRONG> (<STRONG>IdP Proxy</STRONG>) to another <STRONG>Identity Provider</STRONG> (<STRONG>IdP</STRONG>) -&gt; <STRONG>Customer Managed IdP</STRONG> (e.g. Microsoft Entra ID IdP).</P><H2 id="toc-hId-598664538">Identity Provider (IdP) - Authentication Scenario</H2><P>This authentication scenario assumes the <STRONG>User Store</STRONG>&nbsp;and <STRONG>User Credentials</STRONG> persistence in <STRONG>Identity Provider </STRONG>(<STRONG>IdP</STRONG>) - <STRONG>SAP IAS</STRONG>. Thus the user information needs to be available, activated, with generated credentials in <STRONG>Identity Provider </STRONG>(<STRONG>IdP</STRONG>) - <STRONG>SAP IAS</STRONG>.&nbsp;</P><P>To establish the SSO:</P><UL><LI><STRONG>Metadata&nbsp;</STRONG>needs to be obtained from <STRONG>Service Provider</STRONG> (<STRONG>SP</STRONG>) - <STRONG>SAP Ariba</STRONG></LI><LI><A href="https://help.sap.com/docs/identity-authentication/identity-authentication/configuring-applications?version=Cloud" target="_blank" rel="noopener noreferrer"><STRONG>Application</STRONG></A><SPAN>&nbsp;representing the </SPAN><STRONG>Service Provider</STRONG><SPAN> (</SPAN><STRONG>SP</STRONG><SPAN>)&nbsp;</SPAN>- <STRONG>SAP Ariba&nbsp;</STRONG><SPAN>needs to be created in <STRONG>Identity Provider</STRONG> (<STRONG>IdP</STRONG>)</SPAN><SPAN>&nbsp;- <STRONG>SAP IAS&nbsp;</STRONG>using the metadata retrieved from <STRONG>Service Provider</STRONG> (<STRONG>SP</STRONG>)&nbsp;</SPAN>- <STRONG>SAP Ariba</STRONG></LI><LI><SPAN>Metadata needs to be obtained from <STRONG>Identity Provider</STRONG> (<STRONG>IdP</STRONG>)&nbsp;- <STRONG>SAP IAS</STRONG></SPAN></LI><LI><SPAN>SSO needs to be configured in&nbsp;<STRONG>Service Provider</STRONG> (<STRONG>SP</STRONG>)</SPAN><SPAN>&nbsp;</SPAN>- <STRONG>SAP Ariba</STRONG><SPAN> using the metadata retrieved from&nbsp;<SPAN><STRONG>Identity Provider</STRONG> (<STRONG>IdP</STRONG>)&nbsp;- <STRONG>SAP IAS</STRONG></SPAN></SPAN></LI></UL><P><SPAN>SSO execution (IdP initiated):</SPAN></P><UL><LI><SPAN><STRONG>User</STRONG> accesses&nbsp;<STRONG>Service Provider</STRONG> (<STRONG>SP</STRONG>)</SPAN><SPAN>&nbsp;</SPAN>- <STRONG>SAP Ariba&nbsp;</STRONG><SPAN>URL</SPAN></LI><LI><SPAN><STRONG>Service Provider</STRONG> (<STRONG>SP</STRONG>)</SPAN><SPAN>&nbsp;</SPAN>- <STRONG>SAP Ariba&nbsp;</STRONG><SPAN>will forward the authentication to <STRONG>Identity Provider</STRONG>&nbsp;(<STRONG>IdP</STRONG>) - <STRONG>SAP IAS</STRONG></SPAN></LI><LI><SPAN><STRONG><SPAN>Identity Provider (IdP)&nbsp;</SPAN></STRONG>-&nbsp;<STRONG><SPAN>SAP IAS&nbsp;</SPAN></STRONG><SPAN>login window asking for <STRONG>User</STRONG> credentials is shown</SPAN></SPAN></LI><LI><SPAN><SPAN><STRONG>User</STRONG> is authenticated by&nbsp;<STRONG>Identity Provider (IdP) </STRONG>-&nbsp;<STRONG>SAP IAS</STRONG>, based on the entered credentials and the response with <STRONG>User Identifier</STRONG> and <STRONG>User Attributes</STRONG> is send to&nbsp;<STRONG>Service Provider</STRONG> (<STRONG>SP</STRONG>)&nbsp;-<STRONG> SAP Ariba</STRONG></SPAN></SPAN></LI></UL><P>For configuration details see:</P><UL><LI><A href="https://community.sap.com/t5/technology-blogs-by-sap/configuration-sap-ariba-sso-with-sap-cloud-identity-services-identity/ba-p/13665601" target="_self"><SPAN>Configuration: SAP Ariba SSO with SAP Cloud Identity Services - Identity Authentication</SPAN></A></LI></UL><H2 id="toc-hId-402151033">Identity Federation with Identity Provider Proxy (IdP Proxy) - Authentication Scenario</H2><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="Identity Federation.png" style="width: 834px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/90386i989D4C74A0965774/image-size/large?v=v2&amp;px=999" role="button" title="Identity Federation.png" alt="Identity Federation.png" /></span></P><P>&nbsp;<SPAN>&nbsp;</SPAN><STRONG>Identity Provider Proxy (IdP Proxy)</STRONG></P><UL><LI>System responsible for <STRONG>User&nbsp;</STRONG>authentication, with conditional <STRONG>Identity Federation</STRONG> to <STRONG>Identity Provider</STRONG> (<STRONG>IdP</STRONG>)</LI><LI>Uniquely Identifies the <STRONG>User&nbsp;</STRONG>or delegates it to&nbsp;<STRONG>Identity Provider</STRONG> (<STRONG>IdP</STRONG>)</LI><LI>Can contain&nbsp;<STRONG>User Store</STRONG>&nbsp;and additional <STRONG>User Attributes</STRONG> or delegates it to&nbsp;<STRONG>Identity Provider</STRONG> (<STRONG>IdP</STRONG>)</LI><LI>Can contain <STRONG>User Credentials</STRONG> or delegates it to&nbsp;<STRONG>Identity Provider</STRONG> (<STRONG>IdP</STRONG>)</LI><LI>Issues additional&nbsp;<STRONG>User Attributes</STRONG> (name, mail, group membership, ...)&nbsp;or delegates it to&nbsp;<STRONG>Identity Provider</STRONG> (<STRONG>IdP</STRONG>)</LI><LI>Trusts one or multiple <STRONG>Service Providers</STRONG> (<STRONG>SP</STRONG>s)</LI><LI>Can trust one or more&nbsp;<STRONG>Identity Provider</STRONG>s (<STRONG>IdP</STRONG>s)</LI></UL><P>Note: <STRONG>SAP IAS</STRONG> shall be configured as <STRONG>Identity Provider</STRONG> (<STRONG>IdP</STRONG>) also in case of <STRONG>Identity Federation</STRONG> authentication scenario, as <STRONG>Identity Federation</STRONG>&nbsp;as <STRONG>Identity Provider Proxy</STRONG> (<STRONG>IdP Proxy</STRONG>) is extension configuration of <STRONG>Identity Provider (IdP)</STRONG> itself.</P><P>This authentication scenario assumes the <STRONG>User Credentials</STRONG> persistence is outside&nbsp;<STRONG>SAP IAS </STRONG>in Customer Managed IdP (e.g. Microsoft Entra ID IdP). <STRONG>User Store</STRONG> (containing <STRONG>User Attributes</STRONG>) can be in SAP IAS or&nbsp;outside&nbsp;<STRONG>SAP IAS </STRONG>in <STRONG>Customer Managed IdP</STRONG> (e.g. Microsoft Entra ID IdP). No User Credentials needs to be maintained in SAP IAS as the authentication is forwarded outside&nbsp;<STRONG>SAP IAS </STRONG>in <STRONG>Customer Managed IdP</STRONG> (e.g. Microsoft Entra ID IdP).</P><P>Note: In case <STRONG>User Store</STRONG> is required in <STRONG>SAP IAS</STRONG> (e.g. for SAP Ariba SAP Task Center or SAP IAS Group membership access restriction), the users needs to be imported into <STRONG>SAP IAS</STRONG>. One possible way is using automated solution via <a href="https://community.sap.com/t5/c-khhcw49343/Identity+Provisioning/pd-p/73555000100800000425" class="lia-product-mention" data-product="156-1">Identity Provisioning</a>&nbsp;(SAP IPS - <A title="SAP IPS" href="https://help.sap.com/docs/identity-provisioning" target="_blank" rel="noopener noreferrer">SAP Identity Provisioning Service</A>).</P><P>To establish the SSO with <STRONG>Identity Provider Proxy</STRONG> (<STRONG>IdP Proxy</STRONG>) :</P><UL><LI>Steps from above<STRONG> Identity Provider (IdP) - Authentication Scenario&nbsp;</STRONG>chapter needs to be in place to setup the SSO between&nbsp;<STRONG>Service Provider</STRONG> (<STRONG>SP</STRONG>)&nbsp;-&nbsp;<STRONG>SAP Ariba</STRONG>&nbsp;and <STRONG>Identity Provider Proxy</STRONG> (<STRONG>IdP Proxy</STRONG>) - <STRONG>SAP IAS</STRONG></LI><LI><STRONG>Metadata</STRONG> needs to be obtained from <STRONG>Identity Provider Proxy</STRONG> (<STRONG>IdP Proxy</STRONG>) - <STRONG>SAP IAS</STRONG></LI><LI><STRONG>Identity Provider Proxy</STRONG> (<STRONG>IdP Proxy</STRONG>)&nbsp;- <STRONG>SAP IAS&nbsp;</STRONG>needs to be created as <STRONG>Service Provider</STRONG> (<STRONG>SP</STRONG>) in&nbsp;<STRONG>Customer Managed IdP&nbsp;</STRONG>using the metadata retrieved from&nbsp;<STRONG>Identity Provider Proxy</STRONG> (<STRONG>IdP Proxy</STRONG>) - <STRONG>SAP IAS</STRONG></LI><LI><STRONG>Metadata&nbsp;</STRONG>needs to be obtained from <STRONG>Customer Managed IdP</STRONG></LI><LI><STRONG><A href="https://help.sap.com/docs/identity-authentication/identity-authentication/integration-configure-identity-federation?version=Cloud" target="_self" rel="noopener noreferrer">Corporate Identity Provider</A>&nbsp;</STRONG>representing the <STRONG>Customer Managed IdP</STRONG>&nbsp;needs to be created in&nbsp;<STRONG>Identity Provider Proxy</STRONG> (<STRONG>IdP Proxy</STRONG>) - <STRONG>SAP IAS&nbsp;</STRONG>using the metadata retrieved from <STRONG>Customer Managed IdP</STRONG></LI></UL><P><SPAN>SSO execution with <STRONG>Identity Provider Proxy</STRONG> (<STRONG>IdP Proxy</STRONG>) (IdP initiated):</SPAN></P><UL><LI><SPAN><STRONG>User</STRONG> accesses SAP Ariba <STRONG>Service Provider</STRONG> (<STRONG>SP</STRONG>) - <STRONG>SAP Ariba</STRONG> URL</SPAN></LI><LI><SPAN><STRONG>Service Provider</STRONG> (<STRONG>SP</STRONG>) - <STRONG>SAP Ariba</STRONG> will forward the authentication to <STRONG>Identity Provider</STRONG>&nbsp; <STRONG>Proxy</STRONG> (<STRONG>IdP</STRONG>) - <STRONG>SAP IAS</STRONG></SPAN></LI><LI><SPAN><STRONG>Identity Provider Proxy </STRONG>(<STRONG>IdP Proxy</STRONG>) -&nbsp;<STRONG>SAP IAS</STRONG> (based on optional condition) forwards the authentication request to&nbsp;<STRONG>Identity Provider </STRONG>(<STRONG>IdP</STRONG>) -&nbsp;<STRONG>Customer Managed IdP</STRONG></SPAN></LI><LI><SPAN><STRONG>Identity Provider </STRONG>(<STRONG>IdP</STRONG>) -&nbsp;<STRONG>Customer Managed IdP</STRONG> (e.g. Microsoft Entra ID IdP) login window asking for <STRONG>User</STRONG> credentials is shown</SPAN></LI><LI><SPAN><STRONG>User</STRONG> is authenticated by&nbsp;<STRONG>Identity Provider&nbsp;</STRONG>(<STRONG>IdP</STRONG>) -&nbsp;<STRONG>Customer Managed IdP</STRONG>, based on the entered credentials and the response with <STRONG>User Identifier</STRONG> and <STRONG>User Attributes</STRONG> is send to <STRONG>Identity Provider Proxy </STRONG>(<STRONG>IdP Proxy</STRONG>) - <STRONG>SAP IAS</STRONG></SPAN></LI><LI><SPAN>User authentication&nbsp;with <STRONG>User Identifier</STRONG> and <STRONG>User Attributes</STRONG> is further send from <STRONG>Identity Provider Proxy </STRONG>(<STRONG>IdP Proxy</STRONG>) - <STRONG>SAP IAS</STRONG> to <STRONG>Service Provider</STRONG> (<STRONG>SP</STRONG>) - <STRONG>SAP Ariba</STRONG></SPAN></LI></UL><P>For configuration details see:</P><UL><LI><SPAN><A href="https://community.sap.com/t5/technology-blogs-by-sap/identity-federation-sap-ariba-sso-with-sap-cloud-identity-services-identity/ba-p/13666666" target="_self">Identity Federation: SAP Ariba SSO with SAP Cloud Identity Services - Identity Authentication</A></SPAN></LI></UL><H2 id="toc-hId-205637528">Service Provider (SP) vs Identity Provider (IdP) Initiated Authentication</H2><P><STRONG>User</STRONG> can access the resource represented by&nbsp;<STRONG>Service Provider</STRONG> (<STRONG>SP</STRONG>) via one of below <U>approaches</U></P><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="SP Initiated.png" style="width: 830px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/90447i8107A93DA2DCF0CC/image-size/large?v=v2&amp;px=999" role="button" title="SP Initiated.png" alt="SP Initiated.png" /></span></P><P><U><STRONG>Service Provider</STRONG> (<STRONG>SP</STRONG>) initiated authentication</U></P><UL><LI><STRONG>Service Provider</STRONG> (<STRONG>SP</STRONG>) and <STRONG>Identity Provider</STRONG> (<STRONG>IdP</STRONG>) needs to have the signing certificates (part of the metadata) exchanged</LI><LI><STRONG>User</STRONG> accesses the&nbsp;<STRONG>Service Provider</STRONG> (<STRONG>SP</STRONG>) URL<BR />(e.g. https://&lt;SAP Ariba&nbsp;tenant&nbsp;&nbsp;id&gt;.procurement.ariba.com)</LI><LI><STRONG>Service Provider</STRONG> (<STRONG>SP</STRONG>)&nbsp;forwards the authentication to&nbsp;<STRONG>Identity Provider</STRONG> (<STRONG>IdP</STRONG>)</LI><LI><STRONG>Identity Provider</STRONG> (<STRONG>IdP</STRONG>) authenticates the User and redirects to&nbsp;<STRONG>Service Provider</STRONG> (<STRONG>SP</STRONG>)</LI></UL><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="IdP Initiated.png" style="width: 840px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/90450i2005EB93C2D45895/image-size/large?v=v2&amp;px=999" role="button" title="IdP Initiated.png" alt="IdP Initiated.png" /></span></P><P><U><STRONG>Identity Provider</STRONG> (<STRONG>IdP</STRONG>) initiated authentication</U></P><UL><LI><STRONG>Service Provider</STRONG> (<STRONG>SP</STRONG>) needs to have signing certificate of&nbsp;<STRONG>Identity Provider</STRONG> (<STRONG>IdP</STRONG>)&nbsp;(part of the metadata) configured</LI><LI>Signing certificate of&nbsp;<STRONG>Service Provider</STRONG> (<STRONG>SP</STRONG>) is not required to be configured in&nbsp;<STRONG>Identity Provider</STRONG> (<STRONG>IdP</STRONG>) in case of IdP initiated authentication</LI><LI><A title="IdP Initiated Authentication enablement" href="https://help.sap.com/docs/identity-authentication/identity-authentication/configure-idp-initiated-sso?version=Cloud" target="_blank" rel="noopener noreferrer">IdP Initiated Authentication</A> needs to be enabled in&nbsp;<STRONG>Identity Provider</STRONG> (<STRONG>IdP</STRONG>)</LI><LI><STRONG>User</STRONG> accesses the&nbsp;<STRONG>Identity Provider</STRONG> (<STRONG>IdP</STRONG>) URL with&nbsp;<STRONG>Service Provider</STRONG> (<STRONG>SP</STRONG>) identifier passed<BR />(e.g. https://&lt; SAP IAS tenant&nbsp;&nbsp;id&gt;.<SPAN>accounts.ondemand.com/saml2/idp/sso?sp=&lt;service provider name&gt;</SPAN>)</LI><LI><STRONG>Identity Provider</STRONG> (<STRONG>IdP</STRONG>) authenticates the User and redirects to&nbsp;<STRONG>Service Provider</STRONG> (<STRONG>SP</STRONG>)</LI></UL><H1 id="toc-hId--119958696">SAP IAS Landscape Review and Recommendations</H1><H2 id="toc-hId--187389482">Review of Available&nbsp;SAP IAS Systems in Customer Landscape</H2><P>Customer&nbsp;can review his SAP IAS landscape via S-User in&nbsp;<a href="https://community.sap.com/t5/c-khhcw49343/SAP+for+Me/pd-p/e1868089-7a3a-410f-8dcc-3f2380ed5fa4" class="lia-product-mention" data-product="178-1">SAP for Me</a>&nbsp;(<A href="https://me.sap.com" target="_blank" rel="noopener noreferrer">https://me.sap.com</A>) -&gt; <STRONG>Systems &amp; Provisioning</STRONG> -&gt; <STRONG>Systems</STRONG> -&gt; <STRONG>Public Cloud Systems</STRONG></P><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="SAP for Me IAS.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/90567iB26464860F866F42/image-size/large?v=v2&amp;px=999" role="button" title="SAP for Me IAS.png" alt="SAP for Me IAS.png" /></span></P><P><SPAN>To be compliant with the latest SAP Ariba "Next Generation" solutions (e.g. SAP Ariba Category Management, Supplier Profile Summary in SAP Ariba Supplier Lifecycle and Performance, ...) it is mandatory to have the SAP Ariba solutions' Single Sign-On (SSO) setup with </SPAN><STRONG>SAP IAS </STRONG><SPAN>(Test or Production).</SPAN></P><P>Above means that SAP Ariba Test tenant SSO shall be established with SAP IAS Test and SAP Ariba Production tenant SSO shall be established with SAP IAS Production!</P><H2 id="toc-hId--383902987">Review of SAP IAS System Customer Administrators</H2><P>Customer&nbsp;can review his SAP IAS landscape via S-User in&nbsp;<a href="https://community.sap.com/t5/c-khhcw49343/SAP+for+Me/pd-p/e1868089-7a3a-410f-8dcc-3f2380ed5fa4" class="lia-product-mention" data-product="178-2">SAP for Me</a>&nbsp;(<A href="https://me.sap.com" target="_blank" rel="noopener noreferrer">https://me.sap.com</A>) -&gt; <STRONG>Systems &amp; Provisioning</STRONG> -&gt; <STRONG>Systems</STRONG> -&gt; <STRONG>Public Cloud Systems</STRONG> -&gt; navigate to specific system link</P><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="SAP For Me System.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/95023iC441D8FC646793CB/image-size/large?v=v2&amp;px=999" role="button" title="SAP For Me System.png" alt="SAP For Me System.png" /></span></P><H2 id="toc-hId--580416492">Process of New SAP IAS System Provisioning</H2><P>Follow <STRONG>SAP IAS</STRONG> <A href="https://help.sap.com/docs/cloud-identity-services/cloud-identity-services/tenant-model-and-licensing" target="_blank" rel="noopener noreferrer">Tenants</A> documentation to:</P><UL><LI>review&nbsp;<STRONG>SAP IAS</STRONG> tenant types</LI><LI>review <STRONG>SAP IAS</STRONG> licensing and usage</LI><LI>review <STRONG>SAP IAS</STRONG> data centers availability</LI></UL><P>Follow <STRONG>SAP IAS</STRONG> <A href="https://help.sap.com/docs/cloud-identity-services/cloud-identity-services/initial-setup" target="_blank" rel="noopener noreferrer">Initial Setup</A> documentation to:</P><UL><LI>review existing&nbsp;customer&nbsp;<STRONG>SAP IAS</STRONG> landscape</LI><LI>request Test <STRONG>SAP IAS</STRONG> tenant creation</LI><LI>request additional <STRONG>SAP IAS</STRONG> tenant creation</LI></UL><P>See as well:&nbsp;</P><UL><LI><A href="https://community.sap.com/t5/technology-blogs-by-sap/summary-sap-ariba-sso-with-sap-cloud-identity-services-identity/ba-p/13665845" target="_self"><SPAN>Summary: SAP Ariba SSO with SAP Cloud Identity Services - Identity Authentication</SPAN></A></LI><LI><A href="https://community.sap.com/t5/technology-blogs-by-sap/configuration-sap-ariba-sso-with-sap-cloud-identity-services-identity/ba-p/13665601" target="_self">Configuration: SAP Ariba SSO with SAP Cloud Identity Services - Identity Authentication</A></LI><LI><SPAN><A href="https://community.sap.com/t5/technology-blogs-by-sap/identity-federation-sap-ariba-sso-with-sap-cloud-identity-services-identity/ba-p/13666666" target="_self">Identity Federation: SAP Ariba SSO with SAP Cloud Identity Services - Identity Authentication</A></SPAN></LI></UL> 2024-04-10T15:19:19.410000+02:00 https://community.sap.com/t5/technology-blogs-by-sap/summary-sap-ariba-sso-with-sap-cloud-identity-services-identity/ba-p/13665845 Summary: SAP Ariba SSO with SAP Cloud Identity Services - Identity Authentication 2024-04-10T15:25:47.836000+02:00 ondrej_pandoscak https://community.sap.com/t5/user/viewprofilepage/user-id/266513 <P>Root article grouping the individual topics related to SAP Ariba Single Sign-On (SSO) and&nbsp;SAP Cloud Identity Services - Identity Authentication (SAP IAS)</P><UL><LI><A href="https://community.sap.com/t5/technology-blogs-by-sap/overview-sap-ariba-sso-with-sap-cloud-identity-services-identity/ba-p/13665483" target="_blank"><SPAN>Overview: SAP Ariba SSO with SAP Cloud Identity Services - Identity Authentication</SPAN></A></LI><LI><A href="https://community.sap.com/t5/technology-blogs-by-sap/configuration-sap-ariba-sso-with-sap-cloud-identity-services-identity/ba-p/13665601" target="_blank"><SPAN>Configuration: SAP Ariba SSO with SAP Cloud Identity Services - Identity Authentication</SPAN></A></LI><LI><SPAN><A href="https://community.sap.com/t5/technology-blogs-by-sap/identity-federation-sap-ariba-sso-with-sap-cloud-identity-services-identity/ba-p/13666666" target="_blank">Identity Federation: SAP Ariba SSO with SAP Cloud Identity Services - Identity Authentication</A></SPAN></LI><LI><A href="https://community.sap.com/t5/technology-blogs-by-sap/configuration-sap-business-network-sso-with-sap-cloud-identity-services/ba-p/13699090" target="_blank"><SPAN>Configuration: SAP Business Network SSO with SAP Cloud Identity Services - Identity Authentication</SPAN></A></LI></UL> 2024-04-10T15:25:47.836000+02:00 https://community.sap.com/t5/technology-blogs-by-sap/single-sign-on-to-sap-cloud-integration-cpi-runtime-from-an-external/ba-p/13655108 Single Sign On to SAP Cloud Integration (CPI runtime) from an external Identity Provider 2024-04-11T06:53:39.270000+02:00 vinayak_adkoli https://community.sap.com/t5/user/viewprofilepage/user-id/216068 <H2 id="toc-hId-990764901"><STRONG>Introduction:</STRONG></H2><P>Yes, you read it right (and you read it right here !). There is an <U>out-of-the-box</U> approach to achieving a single sign-on (SSO) experience for user flows between a corporate identity provider (that authenticates and authorizes the user) and a tenant of Cloud Integration runtime (loosely called CPI worker) fully within the BTP ecosystem.</P><P>Ok, let’s zoom out a bit and break this down.</P><P>If you are reading this blog post, you probably know already that SAP BTP Services can leverage the <U>OpenID Connect</U> federation-based mechanics of SAP Cloud Identity Service (read: SAP IAS) to connect users from corporate Identity Providers like Entra ID (formerly known as Azure AD), Okta, etc. to XSUAA BTP’s OAuth Authorization Server.<BR />This is certainly not uncharted and I did a detailed <A href="https://community.sap.com/t5/technology-blogs-by-sap/single-sign-on-to-sap-integration-suite-sap-api-business-hub-enterprise-via/ba-p/13573716" target="_self">blog post</A> a few months ago demonstrating this setup.</P><P>However, this setup applied mostly to browser-based SaaS applications (<EM>read</EM>: Design Time applications with a web frontend), and that brings us to the objective of this blog -&gt; Customers want to put together a similar setup for their client applications that interface with SAP Cloud Integration’s IFLows (in other words, the CPI runtime).<BR />Certainly, this is not impossible to achieve and solution blueprints like these have existed in the past:</P><UL><LI>My colleague Francisco’s <A href="https://community.sap.com/t5/technology-blogs-by-sap/principal-propagation-in-sap-integration-suite-from-external-system-to-an/ba-p/13543111" target="_blank">blog</A> puts API Management in between a client and Cloud Integration and enforces API Management to perform an OAuthSAMLBearer handshake.</LI><LI>Microsoft champion Martin Raepple <A href="https://community.sap.com/t5/technology-blogs-by-members/principal-propagation-in-a-multi-cloud-solution-between-microsoft-azure-and/ba-p/13479950" target="_blank">teaches</A> how to set up SAML Trust between Entra ID Identity Provider and BTP to set up a user impersonation flow.</LI></UL><P>However, these approaches were often seen as cumbersome to set up / troubleshoot and certainly not for the faint-hearted!</P><H2 id="toc-hId-794251396"><STRONG>Solution Summary:</STRONG></H2><P>An easier solution can be described in two phrases: '<FONT face="terminal,monaco" color="#993366">OpenID Connect</FONT>' and '<FONT face="terminal,monaco" color="#993366">Authorization Code</FONT> grant type'. If you are super-smart then you've figured it out already. You can stop reading this blog and hack this yourself.<BR />I wish you a nice day ahead! If you are like me and need a bit more explanation, keep reading <span class="lia-unicode-emoji" title=":slightly_smiling_face:">🙂</span></P><P>Here is the solution blueprint that explains that handshake:</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Picture1.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/93034i23EDF7DB077BF799/image-size/large?v=v2&amp;px=999" role="button" title="Picture1.png" alt="Picture1.png" /></span></P><P style=" text-align: center; "><FONT size="2"><EM><STRONG>SCENARIO</STRONG>: Flows that require end-user authentication from external Identity Providers can natively do so with OIDC and Authorization Code grant type</EM></FONT></P><P><STRONG>Step 0:</STRONG> Generate Service Instance / Service Key SAP Cloud Integration Runtime. Refer to <A href="https://help.sap.com/docs/cloud-integration/sap-cloud-integration/specifying-service-instance-and-service-key-parameters-in-json-format" target="_self" rel="noopener noreferrer">this</A> link. Instead of <FONT face="terminal,monaco" color="#993366">Client Credentials</FONT>&nbsp;make sure to select&nbsp; <FONT face="terminal,monaco" size="3" color="#993366">Authorization Code</FONT>.</P><P><STRONG>Step 1:</STRONG> Onboard the needed corporate identity providers in SAP IAS and set up the 'Application' that connects back to your SAP BTP Subaccount as a <U>Trusted Identity Provider</U> via OpenID Connect. Refer to my <A href="https://community.sap.com/t5/technology-blogs-by-sap/single-sign-on-to-sap-integration-suite-sap-api-business-hub-enterprise-via/ba-p/13573716" target="_blank">previous</A> blog post for a detailed procedure.&nbsp;</P><P><STRONG>Step 2:</STRONG> Client (end-user)&nbsp; initiates a connection to the required IFlow (or API artifact). This kicks off the 3-legged OAuth user login flow.</P><P data-unlink="true"><STRONG>Step 3:</STRONG> As the user is not signed in, she is redirected to XSUAA's login endpoint, and upon login the IAS tenant's&nbsp;<SPAN>&nbsp;OAuth server authorization endpoint at&nbsp;</SPAN><EM>https://&lt;IAS&nbsp;<SPAN>&nbsp;</SPAN>tenant name&gt;.accounts.ondemand.com</EM><EM>/oauth2/authorize </EM>is invoked using the authorization code grant type. The details of the actual federation as part of the handshake have been omitted here for simplicity. But suffice it to say that the authorization code from the identity provider is made available to the IAS's callback endpoint and finally made available to XSUAA's authorize endpoint and exchanged for the actual access token. This access token will bear the user's scopes and role permissions needed to access the Cloud Integration's IFlow resource.&nbsp;</P><P><STRONG>Step 4:</STRONG> Once successfully authorized, on the receiver side of the IFlow, we will establish connections to 3 different types of backends for illustration purposes. <U>a)</U> S/4HANA Onpremise system over Cloud Connector and Principal Propagation <U>b)</U> SuccessFactors and <U>c)</U> S/4HANA Cloud with <U>OAuth2 SAMLBearer</U> Assertion security material.&nbsp;</P><H2 id="toc-hId-597737891">Putting it all together:</H2><P>Let's get our hands dirty by putting together the sequence now. The prerequisites to follow along are listed below:</P><UL><LI>Administrator privileges in the BTP subaccount where the Integration Suite subscription exists.</LI><LI>An IAS Tenant (with Administrator privileges) that can be coupled (<EM>read</EM>: Trusted) with the said BTP Subaccount.</LI><LI>Privileges to create Applications (<EM>read</EM>: IDP configurations) in Entra ID (Azure AD) and/or Okta.</LI><LI>Postman Client.</LI><LI>Backend systems to which the frontend user principal can be propagated to. Either of S/4HANA OnPrem, S/4HANA Cloud, or SuccessFactors tenant.</LI></UL><H3 id="toc-hId-530307105"><SPAN>Step 0: Create a Service Instance for the Authorization Code grant type</SPAN></H3><P><SPAN>Create an instance of the '<U>Process Integration Runtime</U>' Service (integration-flow service plan)&nbsp; specifically with the <FONT face="terminal,monaco" color="#993366">authorization code</FONT> grant type. You can copy the JSON snippet pasted below. Do not worry about the location of the <FONT face="terminal,monaco" color="#993366">redirect_uri</FONT>. (When we get down to testing the flow, the browser will invoke the redirect_uri, but this has no consequence as the 'code' will be available for us to copy as a query parameter from the URL itself. When we test this from Postman the client, Postman does not invoke the URL. If you are curious to know, you can read about it <A href="https://stackoverflow.com/questions/62760501/how-does-postman-handle-localhost-oauth-2-redirects" target="_self" rel="nofollow noopener noreferrer">here</A>.) Also, make a note that we have specified <FONT face="terminal,monaco" color="#993366">refresh_token</FONT> as part of the requested grant type. This will let us demonstrate the ability for clients to refresh the access token post-expiry.&nbsp;</SPAN></P><P>&nbsp;</P><pre class="lia-code-sample language-json"><code>{ "grant-types": [ "refresh_token", "authorization_code" ], "redirect-uris": [ "http://localhost" ], "roles": [ "ESBMessaging.send" ] }</code></pre><P>&nbsp;</P><P>With the service instance created, generate a service key (example block is pasted below). Grab the <FONT face="terminal,monaco" color="#993366">clientid</FONT>, <FONT face="terminal,monaco" color="#993366">clientsecret</FONT>, <FONT face="terminal,monaco" color="#993366">authorizationurl</FONT>, <FONT face="terminal,monaco" color="#993366">tokenurl</FONT> attributes. We will need these later.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2024-04-05 at 8.58.50 PM.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/92480iC725C39BBB316413/image-size/large?v=v2&amp;px=999" role="button" title="Screenshot 2024-04-05 at 8.58.50 PM.png" alt="Screenshot 2024-04-05 at 8.58.50 PM.png" /></span></P><P>&nbsp;</P><H3 id="toc-hId-333793600">Step 1: Configure OpenID Connect based Trusted Identity Provider of SAP IAS in your SAP BTP subaccount</H3><P>This step is the <EM>heart-and-soul</EM> of our approach. We will couple an SAP IAS tenant with our BTP subaccount that has the subscription of our SAP Cloud Integration (SAP Integration Suite) tenant using OpenID Connect protocol and then onboard the desired external Identity Providers (I will demonstrate Entra ID and Okta) as corporate identity providers in the IAS administration console.<BR />Since I've documented the steps in my previous blog, I will not repeat the exact steps here. Please refer to the following sections in the <A href="https://community.sap.com/t5/technology-blogs-by-sap/single-sign-on-to-sap-integration-suite-sap-api-business-hub-enterprise-via/ba-p/13573716" target="_self">linked</A> blog.</P><P>&nbsp;</P><TABLE border="1" width="100%"><TBODY><TR><TD width="45.2319587628866%" height="30px"><STRONG>Objective</STRONG></TD><TD width="54.7680412371134%" height="30px"><STRONG>Steps to follow from the linked blog</STRONG></TD></TR><TR><TD width="45.2319587628866%" height="57px"><SPAN>Couple your BTP subaccount and your SAP IAS tenant.</SPAN></TD><TD width="54.7680412371134%" height="57px">Steps 1-6</TD></TR><TR><TD width="45.2319587628866%" height="85px"><SPAN>Configure applications (relying party) in Azure AD and Okta IDP based on OpenID Connect and SAP IAS as the callback URI.</SPAN></TD><TD width="54.7680412371134%" height="85px">Steps&nbsp;<SPAN>7 - 25</SPAN></TD></TR><TR><TD width="45.2319587628866%" height="57px"><SPAN>Configure application in Okta with SAML Trust to SAP IAS.</SPAN></TD><TD width="54.7680412371134%" height="57px">Steps <SPAN>26 - 33</SPAN></TD></TR><TR><TD width="45.2319587628866%" height="57px"><SPAN>Onboard the above Corporate Identity Provider configurations into SAP IAS.</SPAN><SPAN><BR /></SPAN></TD><TD width="54.7680412371134%" height="57px">Steps <SPAN>34 - 46</SPAN></TD></TR><TR><TD width="45.2319587628866%" height="57px"><SPAN>configure IAS as the proxy Identity Provider and SAP BTP as the Service Provider.</SPAN></TD><TD width="54.7680412371134%" height="57px">Steps <SPAN>47 - 52</SPAN></TD></TR></TBODY></TABLE><P>Nevertheless, here is a summary of the main steps involved in the setup.</P><P>1. The subaccount where the Integration Suite subscription exists has a 'Trusted connection' with the OpenID Connect protocol (not SAML) to the IAS tenant.</P><H3 id="toc-hId-137280095"><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2024-04-06 at 9.54.43 PM.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/92370i2923FA725D32E9FB/image-size/large?v=v2&amp;px=999" role="button" title="Screenshot 2024-04-06 at 9.54.43 PM.png" alt="Screenshot 2024-04-06 at 9.54.43 PM.png" /></span></H3><P>2. The IAS tenant has a '<U>Corporate Identity provider</U>' connection to Azure AD (Entra ID) via a set of Application credentials and OpenID Connect protocol.</P><H3 id="toc-hId--59233410"><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2024-04-06 at 9.38.55 PM.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/92371i46791EF93D74A62B/image-size/large?v=v2&amp;px=999" role="button" title="Screenshot 2024-04-06 at 9.38.55 PM.png" alt="Screenshot 2024-04-06 at 9.38.55 PM.png" /></span></H3><H3 id="toc-hId--255746915">&nbsp;</H3><P>3. Notice the '<U>Application</U>' settings on the <U>Azure</U> side. The redirect URI has been set to the IAS tenant's '<FONT face="terminal,monaco" color="#993366">../oath2/callback</FONT>' segment</P><H3 id="toc-hId--452260420"><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2024-04-06 at 9.36.29 PM.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/92373i509F15FCA90FD4E7/image-size/large?v=v2&amp;px=999" role="button" title="Screenshot 2024-04-06 at 9.36.29 PM.png" alt="Screenshot 2024-04-06 at 9.36.29 PM.png" /></span></H3><P>4.&nbsp;The IAS tenant has a '<U>Corporate Identity provider</U>' connection to <U>Okta IDP</U> via a set of Application credentials and OpenID Connect protocol.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2024-04-06 at 9.39.59 PM.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/92432i776D80A7FA5F374B/image-size/large?v=v2&amp;px=999" role="button" title="Screenshot 2024-04-06 at 9.39.59 PM.png" alt="Screenshot 2024-04-06 at 9.39.59 PM.png" /></span></P><P>&nbsp;</P><P>5. Notice the '<U>Application</U>' settings on the Okta side. The redirect URI has been set to the IAS tenant's '<FONT face="terminal,monaco" color="#993366">../oath2/callback</FONT>' segment.</P><H3 id="toc-hId--648773925"><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2024-04-06 at 9.37.38 PM.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/92374i81E6E2901B08DC4C/image-size/large?v=v2&amp;px=999" role="button" title="Screenshot 2024-04-06 at 9.37.38 PM.png" alt="Screenshot 2024-04-06 at 9.37.38 PM.png" /></span></H3><P>6. We will not leverage this flow in our demonstration but note that it is very much possible to use <U>SAML bindings</U> between the Corporate Identity Provider and IAS. The federation works exactly as OIDC.</P><H3 id="toc-hId--920518799"><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2024-04-06 at 10.45.14 PM.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/92375iD2A2E55CFA07BCE7/image-size/large?v=v2&amp;px=999" role="button" title="Screenshot 2024-04-06 at 10.45.14 PM.png" alt="Screenshot 2024-04-06 at 10.45.14 PM.png" /></span></H3><P>&nbsp;</P><P>7. Next, we want to demonstrate a dynamic / Group assertion / <U>Role Collection</U> based user role/authorization determination. For that note that on the Azure side, we have a group called '<U>IntegrationDevelopers</U>' that contains the users who must be authorized to call the IFlow / API on the Cloud Integration side.&nbsp;</P><H3 id="toc-hId--1117032304"><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2024-04-06 at 9.46.09 PM.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/92376i8C5DCA173138645F/image-size/large?v=v2&amp;px=999" role="button" title="Screenshot 2024-04-06 at 9.46.09 PM.png" alt="Screenshot 2024-04-06 at 9.46.09 PM.png" /></span></H3><P>8. Notice how the 'g<U>roups</U>' claim on the IAS side resolves to the value of the group from Azure.</P><H3 id="toc-hId--1313545809"><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2024-04-06 at 9.44.09 PM.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/92378iBDD9051E0C87D093/image-size/large?v=v2&amp;px=999" role="button" title="Screenshot 2024-04-06 at 9.44.09 PM.png" alt="Screenshot 2024-04-06 at 9.44.09 PM.png" /></span></H3><P>9. Similarly, see that the target user has been assigned to the '<U>IntegrationSuiteDevelopers'</U>&nbsp;Group in Okta.</P><H3 id="toc-hId--1510059314"><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2024-04-06 at 9.41.35 PM.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/92379iCF54AEA938541828/image-size/large?v=v2&amp;px=999" role="button" title="Screenshot 2024-04-06 at 9.41.35 PM.png" alt="Screenshot 2024-04-06 at 9.41.35 PM.png" /></span></H3><P>10. Okta presents the user's '<U>Groups</U>' claim to IAS that XSUAA will resolve in a later step.&nbsp;</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2024-04-06 at 9.44.47 PM.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/92453iC8468488FC669780/image-size/large?v=v2&amp;px=999" role="button" title="Screenshot 2024-04-06 at 9.44.47 PM.png" alt="Screenshot 2024-04-06 at 9.44.47 PM.png" /></span></P><P>11. As a last configuration step, notice that there is a RoleCollection on the BTP side (with the '<U>MessagingSend</U>' role assigned) mapped to the respective groups from the source identity providers.</P><H3 id="toc-hId--1706572819"><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2024-04-06 at 10.16.35 PM.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/92380iC7EA847196B55E73/image-size/large?v=v2&amp;px=999" role="button" title="Screenshot 2024-04-06 at 10.16.35 PM.png" alt="Screenshot 2024-04-06 at 10.16.35 PM.png" /></span></H3><P>&nbsp;</P><H3 id="toc-hId--1903086324">Step 2 &amp; 3: Initiate the client flow.</H3><P>The easiest way to demonstrate a client flow is to do so in <U>Postman</U> which natively supports simulating an OAuth 2.0 3-legged Authorization Code grant flow. We can break down the segments of the 3-legged flow in a <U>browser</U> as well. I will demonstrate both of these user agents.</P><P>Summary of the steps about to be performed in this section</P><TABLE border="1" width="100%"><TBODY><TR><TD width="50%"><STRONG>Objective</STRONG></TD><TD width="50%"><STRONG>Steps</STRONG></TD></TR><TR><TD width="50%">Use Postman to set up Authorization Code flow with Okta Identity Provider</TD><TD width="50%">1-8</TD></TR><TR><TD>Use Postman to set up Authorization Code flow with Entra ID Identity Provider</TD><TD>9</TD></TR><TR><TD width="50%">Usage of Refresh Tokens</TD><TD width="50%">13-14</TD></TR><TR><TD>Use Browser to set up Authorization code flow with Identity Providers</TD><TD>15-18</TD></TR></TBODY></TABLE><P>1. Within the '<FONT face="terminal,monaco" color="#993366">Authorization</FONT>' tab in Postman, set the '<FONT face="terminal,monaco" color="#993366">Type</FONT>' to '<FONT face="terminal,monaco" color="#993366">OAuth 2.0</FONT>' and the '<FONT face="terminal,monaco" color="#993366">Grant type</FONT>' to '<FONT face="terminal,monaco" color="#993366">Authorization Code</FONT>'.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2024-04-07 at 11.15.05 AM.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/92461i98EB5D2D021225FD/image-size/large?v=v2&amp;px=999" role="button" title="Screenshot 2024-04-07 at 11.15.05 AM.png" alt="Screenshot 2024-04-07 at 11.15.05 AM.png" /></span></P><P>2. Enter the values for the <FONT face="terminal,monaco"><FONT color="#993366">Callback URL</FONT>, <FONT color="#993366">Auth URL</FONT>, <FONT color="#993366">Access Token URL</FONT>, <FONT color="#993366">Client ID</FONT>, <FONT color="#993366">Client Secret</FONT></FONT>&nbsp;from the values saved in the Step 0 block above.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2024-04-07 at 11.15.39 AM.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/92468i5508D569B3F6918F/image-size/large?v=v2&amp;px=999" role="button" title="Screenshot 2024-04-07 at 11.15.39 AM.png" alt="Screenshot 2024-04-07 at 11.15.39 AM.png" /></span></P><P>3. Click on '<U>Get New Access Token</U>'. Make sure to turn on the '<U>Console</U>' tab at the bottom to keep track of requests and responses across the wire.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2024-04-07 at 11.16.06 AM.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/92470iD8B6C992154608E8/image-size/large?v=v2&amp;px=999" role="button" title="Screenshot 2024-04-07 at 11.16.06 AM.png" alt="Screenshot 2024-04-07 at 11.16.06 AM.png" /></span></P><P>4. Postman will launch the Logon pop-up from BTP's Authorization Server. Notice that you are presented with a list of Identity Providers to log into as configured in BTP's Trust Management section. Select the one that corresponds to your IAS Tenant.<BR />Pay attention to the GET requests in the Console tab. You will see that the request to the 'authorize' resource is being redirected to the login page.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2024-04-07 at 11.16.34 AM.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/92471i6DDB9ED43F11866D/image-size/large?v=v2&amp;px=999" role="button" title="Screenshot 2024-04-07 at 11.16.34 AM.png" alt="Screenshot 2024-04-07 at 11.16.34 AM.png" /></span></P><P>5. The system will prompt you to present the user identifier, this will serve as an input to the 'Conditional Authentication' block set in the IAS tenant to resolve which corporate identity provider to redirect to, for the user logon challenge.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2024-04-07 at 11.16.57 AM.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/92472i5D854A4F4A5EE4E0/image-size/large?v=v2&amp;px=999" role="button" title="Screenshot 2024-04-07 at 11.16.57 AM.png" alt="Screenshot 2024-04-07 at 11.16.57 AM.png" /></span></P><P>6. The system determines that the challenge should come from Okta IDP for my <EM>*.sap.com</EM> user name. Please refer to the '<U>Conditional Authentication</U>' screenshot to get a summary of the determination process.<BR />In the 'Console' section, make a note of how the callbacks are handled.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Conditional Authentication section in SAP IAS" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/94888i08E3F205BCA248EF/image-size/large?v=v2&amp;px=999" role="button" title="Screenshot 2024-04-10 at 9.32.30 PM.png" alt="Conditional Authentication section in SAP IAS" /><span class="lia-inline-image-caption" onclick="event.preventDefault();">Conditional Authentication section in SAP IAS</span></span></P><P>&nbsp;</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2024-04-07 at 11.17.19 AM.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/92473i7BA023461B56F428/image-size/large?v=v2&amp;px=999" role="button" title="Screenshot 2024-04-07 at 11.17.19 AM.png" alt="Screenshot 2024-04-07 at 11.17.19 AM.png" /></span></P><P>7. Okta will authenticate the user and present back the '<FONT face="terminal,monaco" color="#993366">authorization code</FONT>' to IAS.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2024-04-07 at 11.17.23 AM.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/92474iEAFD77C181E2CDBC/image-size/large?v=v2&amp;px=999" role="button" title="Screenshot 2024-04-07 at 11.17.23 AM.png" alt="Screenshot 2024-04-07 at 11.17.23 AM.png" /></span></P><P>8. Finally the client will exchange the authorization code for the <FONT face="terminal,monaco" color="#993366">access token</FONT> from the configured token endpoint.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2024-04-07 at 11.17.30 AM.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/92475i3FCE2A6A26E6ECB8/image-size/large?v=v2&amp;px=999" role="button" title="Screenshot 2024-04-07 at 11.17.30 AM.png" alt="Screenshot 2024-04-07 at 11.17.30 AM.png" /></span></P><P>9. Let us now perform steps nos. 3-8 again, but this time let us log in with our <EM>*.outlook.com</EM> user that gets authenticated and authorized from Entra ID (Azure AD).</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2024-04-08 at 5.57.54 PM.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/93040i2DB4528BC41E8F77/image-size/large?v=v2&amp;px=999" role="button" title="Screenshot 2024-04-08 at 5.57.54 PM.png" alt="Screenshot 2024-04-08 at 5.57.54 PM.png" /></span></P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2024-04-08 at 5.55.56 PM.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/93041iFDA69D400BF70E20/image-size/large?v=v2&amp;px=999" role="button" title="Screenshot 2024-04-08 at 5.55.56 PM.png" alt="Screenshot 2024-04-08 at 5.55.56 PM.png" /></span></P><P>10. Upon inspection, you will note that the access token issued by XSUAA has the '<FONT face="terminal,monaco" color="#993366">ESBMessaging.send</FONT>' scope as determined by the '<FONT face="terminal,monaco" color="#993366">Groups</FONT>' claim presented by the source IDP. You will remember that we created a mapping for this resolution in a previous step. Also, note that the system bears a <FONT face="terminal,monaco" color="#993366">refresh_token</FONT>.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2024-04-07 at 11.17.51 AM.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/92476i13000808DE7417E9/image-size/large?v=v2&amp;px=999" role="button" title="Screenshot 2024-04-07 at 11.17.51 AM.png" alt="Screenshot 2024-04-07 at 11.17.51 AM.png" /></span></P><P>11. Further, if you inspect the respective JWTs issued by Okta and Entra ID, you will see that the tokens contain the claims that represent the <U>Groups</U>, <U>RoleCollections</U>, and <U>User</U> Identifier info.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2024-04-08 at 6.02.17 PM.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/93038iDF074F57326C609D/image-size/large?v=v2&amp;px=999" role="button" title="Screenshot 2024-04-08 at 6.02.17 PM.png" alt="Screenshot 2024-04-08 at 6.02.17 PM.png" /></span></P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2024-04-08 at 6.01.10 PM.png" style="width: 982px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/93039i00D82A733F67F3CD/image-size/large?v=v2&amp;px=999" role="button" title="Screenshot 2024-04-08 at 6.01.10 PM.png" alt="Screenshot 2024-04-08 at 6.01.10 PM.png" /></span></P><P>12. Simply go ahead and '<U>Use Token</U>' to load the token to make your request.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2024-04-07 at 11.18.01 AM.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/92477i0BF06E608D43D2AA/image-size/large?v=v2&amp;px=999" role="button" title="Screenshot 2024-04-07 at 11.18.01 AM.png" alt="Screenshot 2024-04-07 at 11.18.01 AM.png" /></span></P><P>13. Using the refresh_token -&gt; Notice that the token will expire after a set duration (based on the 'expiry' setting). As you can see in the screenshot below, Postman detects that the available token is expired. It gives an option to '<U>Refresh</U>' the token. Click on this button.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2024-04-07 at 12.58.21 PM.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/92484i6CD290951A002C25/image-size/large?v=v2&amp;px=999" role="button" title="Screenshot 2024-04-07 at 12.58.21 PM.png" alt="Screenshot 2024-04-07 at 12.58.21 PM.png" /></span></P><P>14. Make a note in the Console tab that the client POSTs to the token endpoint with the available refresh_token and the refresh_token grant_type to get a fresh access token.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2024-04-07 at 12.59.15 PM.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/92485i844B14E9BCCE1FBB/image-size/large?v=v2&amp;px=999" role="button" title="Screenshot 2024-04-07 at 12.59.15 PM.png" alt="Screenshot 2024-04-07 at 12.59.15 PM.png" /></span></P><P>15. In the next screenshots, let us perform the same set of steps in a browser.&nbsp;We will need to frame the URL to the <FONT face="terminal,monaco" color="#993366">/oauth/authorize</FONT> endpoint. The easiest way to do so would be to copy the URL from the Postman Console we referred to before. The URL is in the format :</P><PRE><A target="_blank" rel="noopener">https://&lt;tenant-id&gt;&gt;/authentiation.&lt;dc&gt;.hana.ondemand.com/oauth/authorize<SPAN>?<BR />response_type=code&amp;client_id=&lt;url-encoded-client-id&gt;&amp;redirect_uri=&lt;url-encoded_redirect_uri&gt;</SPAN></A></PRE><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2024-04-08 at 8.58.56 AM.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/92933i2E3BE633C8DBD648/image-size/large?v=v2&amp;px=999" role="button" title="Screenshot 2024-04-08 at 8.58.56 AM.png" alt="Screenshot 2024-04-08 at 8.58.56 AM.png" /></span></P><P>16. Invoke the URL in a browser.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2024-04-08 at 9.24.05 AM.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/92934iCE3000E772A66A02/image-size/large?v=v2&amp;px=999" role="button" title="Screenshot 2024-04-08 at 9.24.05 AM.png" alt="Screenshot 2024-04-08 at 9.24.05 AM.png" /></span></P><P>17. After the 'login' and 'authenticate' procedures, you will see that the browser is redirected to the redirect_uri location. You can copy the '<FONT face="terminal,monaco" color="#993366">code</FONT>' parameter from the URL.&nbsp;</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2024-04-08 at 8.59.57 AM.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/92935i642C2B58390DCE85/image-size/large?v=v2&amp;px=999" role="button" title="Screenshot 2024-04-08 at 8.59.57 AM.png" alt="Screenshot 2024-04-08 at 8.59.57 AM.png" /></span></P><P>18. Go back to Postman and POST the Access Token endpoint with the <FONT face="terminal,monaco" color="#993366">grant_type</FONT> set to <FONT face="terminal,monaco" color="#993366">authorization_code</FONT> and the copied <FONT face="terminal,monaco" color="#993366">code</FONT> and the <FONT face="terminal,monaco" color="#993366">redirect_uri</FONT>. The server will respond with the <FONT face="terminal,monaco" color="#993366">access_token</FONT> with the same set of attributes populated as demonstrated in Step 11.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2024-04-08 at 9.03.29 AM.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/92936iBAA309680685FF77/image-size/large?v=v2&amp;px=999" role="button" title="Screenshot 2024-04-08 at 9.03.29 AM.png" alt="Screenshot 2024-04-08 at 9.03.29 AM.png" /></span></P><H3 id="toc-hId--2099599829">&nbsp;</H3><H3 id="toc-hId-1998853962">Step 4: Integration Flow Reciever side propagation</H3><P>Now that we have an <FONT face="terminal,monaco" color="#993366">access_token</FONT> that can be presented to the Cloud Integration runtime (to a 'Sender Adapter'), let us put together a simple IFlow that can demonstrate the fact that the user's identity from the external identity provider can be propagated to 3 backend systems - <U>a)</U> S/4HANA Onpremse, <U>b)</U> SuccessFactors and <U>c)</U> S/4HANA Cloud via <U>Principal Propagation</U> and <U>OAuth2SAMLBearer</U> mechanisms respectively.</P><P>Here is a summary of the steps we intend to achieve:</P><TABLE border="1" width="100%"><TBODY><TR><TD width="50%"><STRONG>Objective</STRONG></TD><TD width="50%"><STRONG>Steps</STRONG></TD></TR><TR><TD width="50%">Create a sample IFlow that demonstrates the user propagation sequence to 3 different types of backend systems.</TD><TD width="50%">1-2</TD></TR><TR><TD width="50%">Invoke S4HANA Cloud backend&nbsp;</TD><TD width="50%">3 - 7</TD></TR><TR><TD>Invoke SAP SuccessFactors backend</TD><TD>8 - 13</TD></TR><TR><TD>Invoke SAP S/4HANA Onpremise backend</TD><TD>14 - 17</TD></TR></TBODY></TABLE><P>1. Let's start by putting together a simple IFlow to illustrate the user propagation flow. Since we are planning to invoke with 3 backends, the quickest way to demonstrate this would be to create a <U>Router</U> that has 3 branches. Each with a 'Request-Reply' step for the backend type, S/4HANA Cloud, SuccessFactors, and S/4HANA OnPremise respectively.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2024-04-09 at 5.04.01 PM.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/94321iB1506DA98BBAAA08/image-size/large?v=v2&amp;px=999" role="button" title="Screenshot 2024-04-09 at 5.04.01 PM.png" alt="Screenshot 2024-04-09 at 5.04.01 PM.png" /></span></P><P>2. The logic we will follow is that the client passes a value in a custom header named 'target' that shall determine which of the routes is to be invoked.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2024-04-09 at 5.11.04 PM.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/94329iDAD95FEA401ADF4F/image-size/large?v=v2&amp;px=999" role="button" title="Screenshot 2024-04-09 at 5.11.04 PM.png" alt="Screenshot 2024-04-09 at 5.11.04 PM.png" /></span></P><P>3. In the property sheet of the HTTP Receiver for S/4HANA Cloud backend, notice that we've used a credential named '<FONT face="terminal,monaco" color="#993366">s4hanaCloudCredentials</FONT>' with the OAuth2 SAML Bearer Assertion type.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2024-04-09 at 5.04.51 PM.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/94322i510E3E684E9F63B9/image-size/large?v=v2&amp;px=999" role="button" title="Screenshot 2024-04-09 at 5.04.51 PM.png" alt="Screenshot 2024-04-09 at 5.04.51 PM.png" /></span></P><P>4. I will not get into the details behind how the attributes of this Security Material have been formulated. Refer to parts of&nbsp;<A href="https://community.sap.com/t5/technology-blogs-by-sap/how-to-get-principal-propagation-from-cloud-foundry-to-s-4hana-cloud-with/ba-p/13534051" target="_self">this</A> blog post for details. The points worth mentioning here are that <U>a)</U> we are using the target system type <U>SAP BTP (CF)</U> and<U> b)</U> the '<FONT face="terminal,monaco" color="#993366">userIdSource'</FONT>&nbsp;attribute is annotated for '<FONT face="terminal,monaco" color="#993366">email</FONT>' &amp; nameIdFormat is set to '<FONT face="terminal,monaco" color="#993366">urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress</FONT>', thereby implying that the user identifier from our original JWT token negotiated with the corporate identity provider will serve as the user principal to be propagated.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2024-04-09 at 5.08.29 PM.png" style="width: 833px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/94324iB398FD91A28BDD12/image-size/large?v=v2&amp;px=999" role="button" title="Screenshot 2024-04-09 at 5.08.29 PM.png" alt="Screenshot 2024-04-09 at 5.08.29 PM.png" /></span></P><P>5. Let us make a call to the IFlow URL with the access token set from step 8 described in the above section. Note that we've set the 'target' header attribute to 's4hanacloud'&nbsp; so that the call gets executed in the first route. We get an HTTP 200 OK and the service document as the response and there you have it! We were able to successfully propagate the user from an external identity provider and execute a call in an S/4HANA backend with the user's context.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2024-04-09 at 5.11.42 PM.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/94328i421B86AB9618EB8D/image-size/large?v=v2&amp;px=999" role="button" title="Screenshot 2024-04-09 at 5.11.42 PM.png" alt="Screenshot 2024-04-09 at 5.11.42 PM.png" /></span></P><P>6. How do I prove my point that the user was indeed propagated? The next two screenshots do so. Note that on the S/4HANA side, I have a 'Business User' that bears my (that is propagated from Okta) emailID. Also, note that the HTTP Call is executed with this user context and NOT with a Communication User (technical user) attached to the Communication Arrangement.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2024-04-09 at 4.24.48 PM.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/94326i27A22AD5685783C2/image-size/large?v=v2&amp;px=999" role="button" title="Screenshot 2024-04-09 at 4.24.48 PM.png" alt="Screenshot 2024-04-09 at 4.24.48 PM.png" /></span></P><P>7. Further to prove my point, I execute step no. 5, this time by presenting my *@outlook.com user (that comes from Entra ID), you see that the call fails and the error description calls out that the backend was not able to resolve the presented *.outlook.com user.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2024-04-09 at 5.13.21 PM.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/94327i890B800F01F00C1B/image-size/large?v=v2&amp;px=999" role="button" title="Screenshot 2024-04-09 at 5.13.21 PM.png" alt="Screenshot 2024-04-09 at 5.13.21 PM.png" /></span></P><P>8. Let us now look at the 2nd route, the one that invokes a SuccessFactors URL. We extend the same 'OAuthSAMLBearer Assertion' type with a credential named 'SFSFUserPrincipal'. On the processing tab, you will see that I'm invoking a GET Query on the JobProfile resource.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2024-04-09 at 5.06.05 PM.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/94332iB3049CBDC9B0A638/image-size/large?v=v2&amp;px=999" role="button" title="Screenshot 2024-04-09 at 5.06.05 PM.png" alt="Screenshot 2024-04-09 at 5.06.05 PM.png" /></span></P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2024-04-10 at 8.36.23 PM.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/94884i647EB0D62F0D3B36/image-size/large?v=v2&amp;px=999" role="button" title="Screenshot 2024-04-10 at 8.36.23 PM.png" alt="Screenshot 2024-04-10 at 8.36.23 PM.png" /></span></P><P>9. In the details of the Security Material, note that we've set the attributes per SuccessFactors <A href="https://help.sap.com/docs/SAP_SUCCESSFACTORS_EMPLOYEE_CENTRAL/736e8ee2ac8943c7b6278039a7924e97/3a77fab602834ca686824555f7560d70.html?version=2205" target="_blank" rel="noopener noreferrer">documentation</A>. The User ID is set for principal propagation. Like before, we've used the same <FONT face="terminal,monaco" color="#993366">nameIdFormat</FONT> as set in step 4 above, and don't forget to include the <FONT face="terminal,monaco" color="#993366">apiKey</FONT> attribute as well.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2024-04-09 at 5.09.01 PM.png" style="width: 966px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/94333iE5CE169F04974F33/image-size/large?v=v2&amp;px=999" role="button" title="Screenshot 2024-04-09 at 5.09.01 PM.png" alt="Screenshot 2024-04-09 at 5.09.01 PM.png" /></span></P><P>10. Let us now invoke the IFlow, this time around with the header 'target' set to 'sfsf'. I get back a response from SuccessFactors with the JobProfile details.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2024-04-09 at 5.16.44 PM.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/94334i265F9EF4FBB1193A/image-size/large?v=v2&amp;px=999" role="button" title="Screenshot 2024-04-09 at 5.16.44 PM.png" alt="Screenshot 2024-04-09 at 5.16.44 PM.png" /></span></P><P>11. Again, <EM>how do we prove that the call indeed was made in the signed-in user's context</EM>? There are many ways to establish this. A simple way I followed was to put a 'proxy' layer like API Management before the call hits the SuccessFactors backend and print out the '<U>Bearer token</U>' from the '<U>Authorization</U>' header.&nbsp; Upon Base64 decoding the token, you will see that the token bears a '<U>sfPrinciple</U>' attribute with the employee ID identifier.&nbsp;</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2024-04-09 at 2.54.16 PM.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/94335i5FCCE4AFBD05E781/image-size/large?v=v2&amp;px=999" role="button" title="Screenshot 2024-04-09 at 2.54.16 PM.png" alt="Screenshot 2024-04-09 at 2.54.16 PM.png" /></span></P><P>12. Look up the employee profile of the user in question in your SuccessFactors tenant and you can verify the matching employee ID and the corresponding email address.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2024-04-09 at 2.53.41 PM.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/94336i749BE4BD06089628/image-size/large?v=v2&amp;px=999" role="button" title="Screenshot 2024-04-09 at 2.53.41 PM.png" alt="Screenshot 2024-04-09 at 2.53.41 PM.png" /></span></P><P>13. Negative testing -&gt; If I perform the call again, this time by signing in with the email address from Entra ID you should see a 401 unauthorized exception stating that the propagated user wasn't resolved.&nbsp;</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2024-04-09 at 5.15.20 PM.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/94337iC1819ED14B8CBFF6/image-size/large?v=v2&amp;px=999" role="button" title="Screenshot 2024-04-09 at 5.15.20 PM.png" alt="Screenshot 2024-04-09 at 5.15.20 PM.png" /></span></P><P>14. Finally, we are down to the last segment of our testing. A connection to S/4HANA On-premise. I've configured an SAP Cloud Connector and an X.509 certificate signing procedure (that is beyond the scope of this demonstration) and have dialed 'Principal Propagation' for the authentication type.&nbsp;</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2024-04-09 at 5.06.26 PM.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/94413i1D03B76E1099D38B/image-size/large?v=v2&amp;px=999" role="button" title="Screenshot 2024-04-09 at 5.06.26 PM.png" alt="Screenshot 2024-04-09 at 5.06.26 PM.png" /></span></P><P>15. Invoking the client this time around with the 'target' header set to 's4hanaonpremise'. I get back a response from the server with my service document for the invoked GWSAMPLE_BASIC OData service.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2024-04-10 at 9.42.33 PM.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/94889i5506CCA84879D9A5/image-size/large?v=v2&amp;px=999" role="button" title="Screenshot 2024-04-10 at 9.42.33 PM.png" alt="Screenshot 2024-04-10 at 9.42.33 PM.png" /></span></P><P>16. As a quick verification step, let us go to the 'Monitor' section in the Cloud Connector and within the 'Most Recent Requests' tab, you can see a record for the 'User' that was propagated.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2024-04-09 at 4.54.26 PM.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/94414i8899BAAC3848E6E0/image-size/large?v=v2&amp;px=999" role="button" title="Screenshot 2024-04-09 at 4.54.26 PM.png" alt="Screenshot 2024-04-09 at 4.54.26 PM.png" /></span></P><P>17. Open the LJSTrace log file and you can hunt down a log entry that corresponds to the user subject that was propagated via the short-lived x.509 certificate.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2024-04-09 at 5.02.03 PM.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/94415iC16607E26C47C404/image-size/large?v=v2&amp;px=999" role="button" title="Screenshot 2024-04-09 at 5.02.03 PM.png" alt="Screenshot 2024-04-09 at 5.02.03 PM.png" /></span></P><P><EM>Phew!</EM></P><H2 id="toc-hId-2095743464">Summary:</H2><P>It is beyond doubt that '<FONT face="terminal,monaco" color="#993366">client credentials</FONT>' and '<FONT face="terminal,monaco" color="#993366">x.509 certificate</FONT>' are the two most prominent and widely popular ways to authenticate to an Integration Flow / API artifact in SAP Integration Suite, but should you have a requirement to authenticate and authorize with the client user's identity from a corporate Identity Provider, OpenID Connect support from SAP Cloud Identity Service along with the <FONT face="terminal,monaco" color="#993366">Authorization Code</FONT> grant type in SAP Integration Suite provide an excellent and out-of-box approach to get your job done.</P><P>Cheers, and more power to the&nbsp; <a href="https://community.sap.com/t5/c-khhcw49343/SAP+Integration+Suite/pd-p/73554900100800003241" class="lia-product-mention" data-product="23-1">SAP Integration Suite</a>&nbsp;&nbsp;Community!</P> 2024-04-11T06:53:39.270000+02:00 https://community.sap.com/t5/technology-blogs-by-sap/sap-secure-login-service-for-sap-gui-now-supports-custom-certificate/ba-p/13666599 SAP Secure Login Service for SAP GUI Now Supports Custom Certificate Authorities on AWS 2024-04-11T10:24:50.174000+02:00 Martina_K https://community.sap.com/t5/user/viewprofilepage/user-id/5013 <P><STRONG>The SAP Secure Login Service for SAP GUI solution provides your SAP GUI users with simple and secure access to their ABAP-based business applications. In March 2024, we released the long-awaited Custom Certificate Authority (CA) feature. You can now integrate your own Public Key Infrastructure (PKI) by connecting to a private CA hosted on Amazon Web Services (AWS).</STRONG></P><P>With the SAP Secure Login Service for SAP GUI, you can provide end users of SAP GUI with X.509 certificates that enable single sign-on (SSO) to ABAP-based business applications. After successful authentication, the SAP Secure Login Service provisions a short-lived X.509 certificate to the Secure Login Client on the end-user desktop. This certificate is then used for SSO to the ABAP systems. In the initial scope of the solution, the SAP-managed Cloud CA was used to sign these end user certificates.</P><P><FONT size="4"><STRONG>What’s new?</STRONG></FONT></P><P>With the newly released feature you now have the option to integrate your own PKI by connecting your cloud-based private CA running on Amazon Web Services (AWS) to the SAP Secure Login Service. After successful authentication of the end user, your private CA issues an X.509 certificate. And the SAP Secure Login Service then returns this X.509 certificate to the Secure Login Client on the end user desktop.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="SAP Secure Login Service for SAP GUI - Custom CA AWS.jpg" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/94949iB409141F953D0970/image-size/large?v=v2&amp;px=999" role="button" title="SAP Secure Login Service for SAP GUI - Custom CA AWS.jpg" alt="SAP Secure Login Service for SAP GUI - Custom CA AWS.jpg" /></span></P><P><FONT size="4"><STRONG>How does it work?</STRONG></FONT></P><P>By connecting your cloud-based private CA running on AWS, the X.509 certificates will be signed by your own customer-managed CA. The SAP Secure Login Service will just reuse your CA setup and provision the certificates to the Secure Login Client of the end users.</P><P>Configuration required for the token exchange, credentials for accessing AWS, and which AWS Private CA to be used can be configured in the administration console of SAP Secure Login Service (via the new tab “Custom CA”). This configuration is needed for secure token exchange and to ensure that only your SAP Secure Login Service subscription can be used to access your custom CA. And at the same time, that the certificates can only be used for SAP GUI SSO.</P><P>Of course, the certificates that are signed by your custom CA will look differently from the ones that are signed by the SAP Cloud Root CA. You can decide about the root, how many levels you want to have in there, and the names.</P><P>For configuration information, please refer to the documentation that is available on SAP Help Portal here:</P><P><SPAN><A href="https://help.sap.com/docs/SAP%20SECURE%20LOGIN%20SERVICE/c35917ca71e941c5a97a11d2c55dcacd/32875689a8654e0bb3c8697fb6947940.html" target="_blank" rel="noopener noreferrer">https://help.sap.com/docs/SAP%20SECURE%20LOGIN%20SERVICE/c35917ca71e941c5a97a11d2c55dcacd/32875689a8654e0bb3c8697fb6947940.html</A></SPAN></P><P><FONT size="4"><STRONG>What are the benefits?</STRONG></FONT></P><P>For compliance reasons you might not be allowed to use the SAP-managed Cloud CA to sign the end user certificates but have to use a CA that is fully under your control. With the new feature you can now integrate with your custom CA running on AWS thereby having full control how the CA is set up. For example, the root of the CA, whether it is in the AWS CA or offline, and how the signed certificates will look like.</P><P><FONT size="4"><STRONG>More information</STRONG></FONT></P><P>For more information about our SAP Secure Login Service for SAP GUI solution and to stay up to date on the latest developments, visit our topic page in SAP Community:</P><P><SPAN><A href="https://pages.community.sap.com/topics/single-sign-on" target="_blank" rel="noopener noreferrer"><STRONG>https://pages.community.sap.com/topics/single-sign-on</STRONG></A></SPAN></P><P>&nbsp;</P> 2024-04-11T10:24:50.174000+02:00 https://community.sap.com/t5/technology-blogs-by-sap/identity-federation-sap-ariba-sso-with-sap-cloud-identity-services-identity/ba-p/13666666 Identity Federation: SAP Ariba SSO with SAP Cloud Identity Services - Identity Authentication 2024-04-11T10:54:21.367000+02:00 ondrej_pandoscak https://community.sap.com/t5/user/viewprofilepage/user-id/266513 <P>See as well:&nbsp;</P><UL><LI><A href="https://community.sap.com/t5/technology-blogs-by-sap/summary-sap-ariba-sso-with-sap-cloud-identity-services-identity/ba-p/13665845" target="_self"><SPAN>Summary: SAP Ariba SSO with SAP Cloud Identity Services - Identity Authentication</SPAN></A></LI><LI><A href="https://community.sap.com/t5/technology-blogs-by-sap/overview-sap-ariba-sso-with-sap-cloud-identity-services-identity/ba-p/13665483" target="_self">Overview:&nbsp;SAP Ariba SSO with SAP Cloud Identity Services - Identity Authentication</A></LI><LI><A href="https://community.sap.com/t5/technology-blogs-by-sap/configuration-sap-ariba-sso-with-sap-cloud-identity-services-identity/ba-p/13665601" target="_self">Configuration: SAP Ariba SSO with SAP Cloud Identity Services - Identity Authentication</A></LI></UL><P><STRONG>Table of Contents:</STRONG></P><UL class="lia-list-style-type-circle"><LI>Setup SAP IAS Identity Provider Proxy (IdP Proxy) as Identity Provider (IdP) for SAP Ariba</LI><LI>SAP IAS Identity Provider Proxy (IdP Proxy) SAML Metadata Retrieval</LI><LI>Corporate Identity Provider (Corporate IdP) SAML Configuration to SAP IAS</LI><LI>Corporate Identity Provider (Corporate IdP) Metadata Retrieval</LI><LI>Setup SAP IAS Identity Provider Proxy (IdP Proxy) Identity Federation to Corporate Identity Provider (Corporate IdP)</LI><LI>Federate SAP IAS Identity Provider Proxy (IdP Proxy) Application&nbsp;to Corporate Identity Provider (Corporate IdP)</LI></UL><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="Identity Federation.png" style="width: 834px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/90386i989D4C74A0965774/image-size/large?v=v2&amp;px=999" role="button" title="Identity Federation.png" alt="Identity Federation.png" /></span></P><H1 id="toc-hId-862640483">Setup SAP IAS Identity Provider Proxy (IdP Proxy) as Identity Provider (IdP) for SAP Ariba</H1><P><STRONG>SAP IAS</STRONG><SPAN>&nbsp;<STRONG>Identity Provider Proxy</STRONG> (<STRONG>IdP Proxy</STRONG>) </SPAN><SPAN>as&nbsp;</SPAN><STRONG>Identity Federation</STRONG><SPAN>&nbsp;</SPAN><SPAN>is extension of&nbsp;</SPAN><STRONG>Identity Provider </STRONG>(<STRONG>IdP</STRONG>)<SPAN>&nbsp;configuration itself. Therefore <STRONG>SAP Ariba</STRONG>&nbsp;acting as <STRONG>Service Provider </STRONG>(<STRONG>SP</STRONG>) Single Sign-On (SSO) needs to be setup as&nbsp;<STRONG>Identity Provider</STRONG>&nbsp;(<STRONG>IdP</STRONG>) with&nbsp;<STRONG>SAP IAS</STRONG>&nbsp;<STRONG>Identity Provider Proxy</STRONG> (<STRONG>IdP Proxy</STRONG>) as per the configuration described in the blog below:</SPAN></P><UL><LI><A href="https://community.sap.com/t5/technology-blogs-by-sap/configuration-sap-ariba-sso-with-sap-cloud-identity-services-identity/ba-p/13665601" target="_self">Configuration: SAP Ariba SSO with SAP Cloud Identity Services - Identity Authentication</A></LI></UL><H1 id="toc-hId-666126978">SAP IAS Identity Provider Proxy (IdP Proxy)&nbsp;SAML&nbsp;Metadata Retrieval</H1><P>To retrieve SAML Metadata from<SPAN>&nbsp;</SPAN><STRONG>SAP IAS</STRONG>:</P><UL><LI>enter the below<SPAN>&nbsp;</SPAN><A title="Export SAML 2.0 IdP Metadata from IAS" href="https://help.sap.com/docs/conversational-ai/integration-with-sap-s-4hana/export-saml-2-0-idp-metadata-from-ias" target="_blank" rel="noopener noreferrer"><STRONG>SAP IAS</STRONG><SPAN>&nbsp;</SPAN>URL</A><SPAN>&nbsp;</SPAN>into browser:<BR />https://&lt;SAP IAS tenant&nbsp;&nbsp;id&gt;.<SPAN>accounts.ondemand.com/saml2/metadata?action=download</SPAN></LI><LI>&nbsp;store the downloaded<SPAN>&nbsp;</SPAN><STRONG>SAP IAS Metadata File</STRONG></LI></UL><H1 id="toc-hId-469613473">Corporate Identity Provider (Corporate IdP) SAML Configuration to SAP IAS</H1><P>Using the retrieved <STRONG>SAP IAS Metadata File</STRONG>, the <STRONG>Corporate Identity Provider</STRONG> (<STRONG>Corporate IdP</STRONG>) authentication configuration needs to be setup.&nbsp;</P><P>See <EM><STRONG><U>THIS</U></STRONG>&nbsp;</EM>blog (and <A href="https://help.sap.com/docs/identity-authentication/identity-authentication/configure-microsoft-azure-ad" target="_self" rel="noopener noreferrer">SAP documentation)</A>&nbsp;for reference of the setup of&nbsp;<STRONG>Microsoft Entra ID</STRONG>&nbsp;as <STRONG>Corporate Identity Provider</STRONG> (<STRONG>Corporate IdP</STRONG>) with SAP IAS Identity Proxy.</P><P>See <A href="https://learn.microsoft.com/en-us/entra/identity/saas-apps/sap-hana-cloud-platform-identity-authentication-tutorial" target="_self" rel="nofollow noopener noreferrer">Microsoft Tutorial</A>&nbsp;for reference of the setup to be performed in <STRONG>Microsoft Entra ID</STRONG>.</P><H1 id="toc-hId-273099968">Corporate Identity Provider (Corporate IdP) Metadata Retrieval</H1><P>Once the&nbsp;<STRONG>Corporate Identity Provider (Corporate IdP) SAML Configuration to SAP IAS</STRONG> setup (referenced above) is performed, download the <STRONG>Corporate Identity Provider </STRONG>(<STRONG>Corporate IdP</STRONG>)<STRONG> Metadata File</STRONG>.&nbsp;</P><P>In case of <STRONG>Microsoft Entra ID</STRONG>, follow the <U>step 9.</U> from the&nbsp;<A href="https://learn.microsoft.com/en-us/entra/identity/saas-apps/sap-hana-cloud-platform-identity-authentication-tutorial" target="_self" rel="nofollow noopener noreferrer">Microsoft Tutorial</A>&nbsp;to download the&nbsp;<STRONG>Corporate Identity Provider </STRONG>(<STRONG>Corporate IdP</STRONG>)<STRONG> Metadata File&nbsp;</STRONG>as <STRONG>Federation Metadata XML</STRONG>.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="Microsoft Entra ID.png" style="width: 692px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/94959i7ACC0DDBFE86468F/image-size/large?v=v2&amp;px=999" role="button" title="Microsoft Entra ID.png" alt="Microsoft Entra ID.png" /></span></P><P>&nbsp;</P><P>&nbsp;</P><H1 id="toc-hId-76586463">Setup SAP IAS Identity Provider Proxy (IdP Proxy) Identity Federation to Corporate Identity Provider (Corporate IdP)</H1><P>To setup the <A href="https://help.sap.com/docs/identity-authentication/identity-authentication/integration-configure-identity-federation" target="_self" rel="noopener noreferrer">Identity Federation</A> for&nbsp;<STRONG>SAP IAS Identity Provider Proxy</STRONG> (<STRONG>IdP Proxy</STRONG>) to&nbsp;<STRONG>Corporate Identity Provide</STRONG>r (<STRONG>Corporate IdP</STRONG><span class="lia-unicode-emoji" title=":disappointed_face:">😞</span></P><UL><LI>enter the SAP<SPAN>&nbsp;</SPAN><STRONG>IAS Administration Console</STRONG>&nbsp;via https://&lt;SAP IAS tenant&nbsp;&nbsp;id&gt;.<SPAN>accounts.ondemand.com/admin</SPAN></LI><LI><SPAN>navigate to&nbsp;<STRONG>Application &amp; Resources</STRONG>&nbsp;-&gt;&nbsp;<STRONG>Identity Providers</STRONG> -&gt; <STRONG>Corporate Identity Providers</STRONG> -&gt; <STRONG>[Create]</STRONG></SPAN></LI></UL><P>&nbsp;</P><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="Corporate IdPs.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/94969i7C21E1353661C18A/image-size/large?v=v2&amp;px=999" role="button" title="Corporate IdPs.png" alt="Corporate IdPs.png" /></span></P><UL><LI>&nbsp;enter the Display Name and choose the Identity Provider Type</LI></UL><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="Corporate IdP.png" style="width: 398px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/94972i13D9E15869F95433/image-size/large?v=v2&amp;px=999" role="button" title="Corporate IdP.png" alt="Corporate IdP.png" /></span></P><UL><LI>&nbsp;navigate to <STRONG>SAML 2.0 Configuration</STRONG> -&gt; <STRONG>[Browse...]&nbsp;</STRONG>and upload the&nbsp;<STRONG>Corporate Identity Provider </STRONG>(<STRONG>Corporate IdP</STRONG>)<STRONG> Metadata File</STRONG></LI></UL><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="Corporate IdP SAML.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/94978i6AC9660C2FE4DC70/image-size/large?v=v2&amp;px=999" role="button" title="Corporate IdP SAML.png" alt="Corporate IdP SAML.png" /></span></P><UL><LI>&nbsp;SAML 2.0 configuration is pre-set out of the uploaded&nbsp;<STRONG>Corporate Identity Provider </STRONG>(<STRONG>Corporate IdP</STRONG>)<STRONG> Metadata File</STRONG></LI><LI>hit&nbsp;<STRONG>[Save]</STRONG></LI></UL><H1 id="toc-hId--119927042"><STRONG>Federate SAP IAS Identity Provider Proxy (IdP Proxy) Application&nbsp;to Corporate Identity Provider (Corporate IdP)</STRONG></H1><P>Once the Identity Federation between <STRONG>SAP IAS Identity Provider Proxy</STRONG> (<STRONG>IdP Proxy</STRONG>) and <STRONG>Corporate Identity Provider</STRONG> (<STRONG>Corporate IdP</STRONG>) is established, the Application representing the <STRONG>SAP Ariba Service Provider</STRONG> (<STRONG>SP</STRONG>) in&nbsp;<STRONG>SAP IAS Identity Provider Proxy</STRONG> needs to be setup to federate to this&nbsp;<STRONG>Corporate Identity Provider</STRONG> (<STRONG>Corporate IdP</STRONG>).</P><P>(The <STRONG>SAP Ariba Service Provider (SP) Application</STRONG> was created as part of the first chapter of this blog and referenced to the steps in&nbsp;<A href="https://community.sap.com/t5/technology-blogs-by-sap/configuration-sap-ariba-sso-with-sap-cloud-identity-services-identity/ba-p/13665601" target="_self">Configuration: SAP Ariba SSO with SAP Cloud Identity Services - Identity Authentication</A>.)</P><UL><LI><SPAN>navigate to&nbsp;</SPAN><STRONG>Application &amp; Resources</STRONG><SPAN>&nbsp;-&gt;&nbsp;</SPAN><STRONG>Application&nbsp;</STRONG><SPAN>-&gt;&nbsp;application representing SAP Ariba e.g. Ariba Tenant: &lt;SAP Ariba tenant id&gt; -&gt; <STRONG>Conditional Authentication</STRONG> -&gt; choose the&nbsp;<STRONG>Corporate Identity Provider</STRONG> (<STRONG>Corporate IdP</STRONG>) name&nbsp;</SPAN></LI></UL><P><SPAN><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="Conditional Authentication.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/94993i76D175EFD1F95D8F/image-size/large?v=v2&amp;px=999" role="button" title="Conditional Authentication.png" alt="Conditional Authentication.png" /></span></SPAN></P><UL><LI>&nbsp;hit <STRONG>[Save]</STRONG></LI></UL><P>In case you are reading this line, you have successfully configured the&nbsp;<STRONG>Single Sign-On&nbsp;(SSO)</STRONG> between&nbsp;<STRONG>SAP Ariba</STRONG>&nbsp;as&nbsp;<STRONG>Service Provider</STRONG>&nbsp;(<STRONG>SP</STRONG>) and&nbsp;<STRONG>SAP IAS</STRONG>&nbsp;as&nbsp;<STRONG>Identity Provider Proxy</STRONG>&nbsp;(<STRONG>IdP Proxy</STRONG>) with <STRONG>Identity Federation</STRONG> to <STRONG>Corporate Identity Provider</STRONG> (<STRONG>Corporate IdP</STRONG>)!</P><P>See as well:&nbsp;</P><UL><LI><A href="https://community.sap.com/t5/technology-blogs-by-sap/summary-sap-ariba-sso-with-sap-cloud-identity-services-identity/ba-p/13665845" target="_self"><SPAN>Summary: SAP Ariba SSO with SAP Cloud Identity Services - Identity Authentication</SPAN></A></LI><LI><A href="https://community.sap.com/t5/technology-blogs-by-sap/overview-sap-ariba-sso-with-sap-cloud-identity-services-identity/ba-p/13665483" target="_self">Overview:&nbsp;SAP Ariba SSO with SAP Cloud Identity Services - Identity Authentication</A></LI><LI><A href="https://community.sap.com/t5/technology-blogs-by-sap/configuration-sap-ariba-sso-with-sap-cloud-identity-services-identity/ba-p/13665601" target="_self">Configuration: SAP Ariba SSO with SAP Cloud Identity Services - Identity Authentication</A></LI></UL> 2024-04-11T10:54:21.367000+02:00 https://community.sap.com/t5/technology-blogs-by-sap/identity-provisioning-documentation-joined-the-family-of-sap-cloud-identity/ba-p/13666600 Identity Provisioning Documentation Joined the Family of SAP Cloud Identity Services 2024-04-11T11:37:11.801000+02:00 ivelinakiryakov https://community.sap.com/t5/user/viewprofilepage/user-id/101024 <P data-unlink="true">SAP Cloud Identity Services consolidated the documentation for Identity Authentication, Identity Provisioning, Identity Directory and Authorization Management. They now come under one product name, on a unified SAP Help Portal&nbsp;page, accessible through a single <A href="https://help.sap.com/docs/identity-authentication/identity-authentication/identity-authentication?version=Cloud" target="_self" rel="noopener noreferrer">link</A>.</P><P>The integration of Identity Provisioning functionality into the SAP Cloud Identity Services administration console, formerly known as the Identity Authentication admin console, has streamlined the process.</P><H3 id="toc-hId-1120805729">What’s been changed?</H3><UL><LI>Identity Authentication product documentation has been rebranded as&nbsp;<A href="https://help.sap.com/docs/identity-authentication/identity-authentication/identity-authentication" target="_self" rel="noopener noreferrer">SAP Cloud Identity Services</A>. With this change, SAP Cloud Identity Services now becomes the home of Identity Provisioning features for the Cloud Identity Services infrastructure, joining the already existing Identity Directory and Authorization Management.</LI><LI>The product documentation for Identity Provisioning has been rebranded as <A href="https://help.sap.com/docs/identity-provisioning/identity-provisioning/sap-cloud-identity-services-identity-provisioning" target="_self" rel="noopener noreferrer">Identity Provisioning Service in the Neo Environment</A>. It will only cover features for the Neo environment until its deprecation (as previously announced).</LI><LI>You can find the release notes for Identity Authentication, Identity Provisioning, Identity Directory and Authorization Management under the single component <STRONG>Cloud Identity Services</STRONG> by following this&nbsp;<A href="https://help.sap.com/whats-new/cf0cb2cb149647329b5d02aa96303f56?locale=en-US&amp;Component=Cloud%20Identity%20Services" target="_blank" rel="noopener noreferrer">link</A>. If there are new features for IPS in the Neo environment, they can still be found under <STRONG>Identity Provisioning</STRONG> component for Neo at this&nbsp;<A href="https://help.sap.com/whats-new/cf0cb2cb149647329b5d02aa96303f56?version=Cloud&amp;Component=Identity%2520Provisioning&amp;locale=en-US" target="_blank" rel="noopener noreferrer">link</A>.</LI></UL><H3 id="toc-hId-924292224">What does this mean for you?</H3><UL><LI><STRONG>Unified Access</STRONG> – You get all the information you need in one single guide. No more switching between product documentations. It comes as little surprise that Identity Authentication ranked among the most frequently searched and visited topics within the Identity Provisioning documentation.</LI></UL><UL><LI><STRONG>No URL Changes</STRONG> – You access the Cloud Identity Services documentation from the same URL you used to access the Identity Authentication one. You access the Identity Provisioning Service in the Neo Environment documentation from the same URL you used to access the Identity Provisioning documentation.</LI><LI><STRONG>Simplicity</STRONG> – We believe reading and navigating through the Identity Provisioning content has become easier now that we have separated and placed the documentation relevant to each specific infrastructure or environment.</LI></UL><P>Bookmarked URLs of topics relevant for Cloud Identity infrastructure will redirect you to the common documentation.</P><P>Here are some examples of what you can find where:</P><P>&nbsp;</P><TABLE border="1" width="100%"><TBODY><TR><TD width="33.333333333333336%" height="30px"><STRONG>Feature</STRONG></TD><TD width="33.333333333333336%" height="30px"><STRONG>SAP Cloud Identity Services</STRONG></TD><TD width="33.333333333333336%" height="30px"><STRONG>IPS in the Neo Environment</STRONG></TD></TR><TR><TD width="33.333333333333336%" height="239px">Jobs</TD><TD width="33.333333333333336%" height="239px"><P><A href="https://help.sap.com/docs/identity-authentication/identity-authentication/read-provisioning-job" target="_self" rel="noopener noreferrer">Read Provisioning Job</A></P><P><A href="https://help.sap.com/docs/identity-authentication/identity-authentication/resync-provisioning-job" target="_self" rel="noopener noreferrer">Resync Provisioning Job</A></P><P><A href="https://help.sap.com/docs/identity-authentication/identity-authentication/simulate-provisioning-jobs" target="_self" rel="noopener noreferrer">Simulate Provisioning Jobs</A></P><P><A href="https://help.sap.com/docs/identity-authentication/identity-authentication/validate-provisioning-jobs" target="_self" rel="noopener noreferrer">Validate Provisioning Jobs</A></P><P><A href="https://help.sap.com/docs/identity-authentication/identity-authentication/run-provisioning-jobs-via-api" target="_self" rel="noopener noreferrer">Run Provisioning Jobs via API</A></P></TD><TD width="33.333333333333336%" height="239px"><P>Only read and resync jobs are supported.</P><P>&nbsp;</P><P><A href="https://help.sap.com/docs/identity-provisioning/identity-provisioning/read-provisioning-job" target="_self" rel="noopener noreferrer">Read Provisioning Jobs</A></P><P><A href="https://help.sap.com/docs/identity-provisioning/identity-provisioning/resync-provisioning-job" target="_self" rel="noopener noreferrer">Resync Provisioning Jobs</A></P></TD></TR><TR><TD width="33.333333333333336%" height="50px">Logs</TD><TD width="33.333333333333336%" height="50px"><A href="https://help.sap.com/docs/identity-authentication/identity-authentication/monitor-real-time-logs" target="_self" rel="noopener noreferrer">Monitor Real-Time Logs</A></TD><TD width="33.333333333333336%" height="50px"><P>Real-time logs are not supported.</P></TD></TR><TR><TD width="33.333333333333336%" height="152px">Transformations</TD><TD width="33.333333333333336%" height="152px"><P><A href="https://help.sap.com/docs/identity-authentication/identity-authentication/working-with-graphical-editor" target="_self" rel="noopener noreferrer">Working with Graphical Editor&nbsp;</A></P><P><A href="https://help.sap.com/docs/identity-authentication/identity-authentication/manage-transformations-history" target="_self" rel="noopener noreferrer">Manage Transformations History</A></P></TD><TD width="33.333333333333336%" height="152px"><P>Graphical editor and m<SPAN>anaging transformation history are not supported.</SPAN></P></TD></TR><TR><TD width="33.333333333333336%" height="30px">Connectors</TD><TD width="33.333333333333336%" height="30px"><A href="https://help.sap.com/docs/identity-authentication/identity-authentication/local-identity-directory" target="_self" rel="noopener noreferrer">Local Identity Directory</A></TD><TD width="33.333333333333336%"><P>Local Identity Directory connector is not supported.</P></TD></TR><TR><TD width="33.333333333333336%" height="30px">Migration</TD><TD width="33.333333333333336%" height="30px">Not applicable</TD><TD width="33.333333333333336%" height="30px"><A href="https://help.sap.com/docs/identity-provisioning/identity-provisioning/migrate-identity-provisioning-bundle-tenant" target="_self" rel="noopener noreferrer">Migrate Identity Provisioning Bundle Tenant</A></TD></TR></TBODY></TABLE><UL><LI><STRONG>Consistent structure</STRONG> - The documentation of SAP Cloud Identity Services and Identity Provisioning follow the same service guide template. You can easily identify IPS-related concepts and supported systems (connectors), operations and logs in the common documentation:</LI></UL><P>&nbsp;</P><TABLE border="1" width="44.44408495214809%"><TBODY><TR><TD width="25%" height="170px"><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ivelinakiryakov_5-1712824531944.png" style="width: 400px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/94977iB242CE79E0BA7335/image-size/medium?v=v2&amp;px=400" role="button" title="ivelinakiryakov_5-1712824531944.png" alt="ivelinakiryakov_5-1712824531944.png" /></span><P>&nbsp;</P></TD><TD width="12.5%" height="170px"><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ivelinakiryakov_6-1712824552755.png" style="width: 400px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/94980i173D6A76E927EC46/image-size/medium?v=v2&amp;px=400" role="button" title="ivelinakiryakov_6-1712824552755.png" alt="ivelinakiryakov_6-1712824552755.png" /></span><P>&nbsp;</P></TD><TD width="6.25%"><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ivelinakiryakov_0-1712825276265.png" style="width: 400px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/94990i3250B6B37FFED4DD/image-size/medium?v=v2&amp;px=400" role="button" title="ivelinakiryakov_0-1712825276265.png" alt="ivelinakiryakov_0-1712825276265.png" /></span><P>&nbsp;</P></TD><TD width="6.25%"><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ivelinakiryakov_0-1712825600868.png" style="width: 400px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/94999i4B622AFE5AE9839B/image-size/medium?v=v2&amp;px=400" role="button" title="ivelinakiryakov_0-1712825600868.png" alt="ivelinakiryakov_0-1712825600868.png" /></span><P>&nbsp;</P></TD></TR></TBODY></TABLE><P>We believe the newly released documentation will be easy to navigate, familiar, and consistent for you. If anything appears unclear, please do reach out. In the never-ending quest for quality, t<SPAN>here is always room for improvement.</SPAN></P><P>&nbsp;</P><P>&nbsp;</P> 2024-04-11T11:37:11.801000+02:00 https://community.sap.com/t5/technology-blogs-by-members/sap-successfactors-implementation-and-maintenance-in-projects-in-2024/ba-p/13669703 SAP Successfactors Implementation and Maintenance in Projects in 2024 2024-04-16T12:51:24.164000+02:00 MansiRai https://community.sap.com/t5/user/viewprofilepage/user-id/1438500 <H1 id="toc-hId-862730628">Introduction:</H1><P>I am new to SAP SuccessFactors and<SPAN>&nbsp;</SPAN><SPAN>continuously honing my skills and knowledge through daily learning endeavors. In this blog post we will talk about the recent updates in SAP SuccessFactors Platform and Security enhancements and how to manage the SF landscape in 2024 from platform perspective</SPAN></P><P>&nbsp;</P><H1 id="toc-hId-666217123">Important Information:</H1><H3 id="toc-hId-727869056">For New SuccessFactors Customers:</H3><P><SPAN>New SuccessFactors tenants created after December 9th 2022, IAS is automatically deployed. For new customers&nbsp;SAP is not providing the option to implement it without IAS|IPS.</SPAN></P><P><SPAN><SPAN class="">For&nbsp;</SPAN><SPAN class="">more details, please refer SAP note :&nbsp;</SPAN><A href="https://me.sap.com/notes/3097769" target="_self" rel="noopener noreferrer"><SPAN class="">3097769 - IAS / IPS - Is IAS implementation mandatory for all SuccessFactors customers?</SPAN></A></SPAN></P><H3 id="toc-hId-531355551"><SPAN class="">For<SPAN>&nbsp;</SPAN></SPAN>Old SuccessFactors Customers:</H3><P><SPAN><SPAN class="">Upon expiration of SuccessFactors SSO signing certificate on June 2, 2025, if customers do not migrate to IAS or make any changes, the User authentication and Single Sign-On functionalities will not work.</SPAN></SPAN><SPAN class=""><SPAN>&nbsp;</SPAN></SPAN><SPAN><SPAN class="">Recommendation is to take action before June 2025 to make sure your SSO functionality works fine.</SPAN></SPAN></P><P><SPAN><SPAN class="">For more details, please refer SAP note:</SPAN><SPAN class="">&nbsp;</SPAN><A href="https://me.sap.com/notes/2791410" target="_self" rel="noopener noreferrer"><SPAN class="">2791410 - Integrating SuccessFactors with Identity Authentication IAS through the Upgrade Center</SPAN></A></SPAN></P><H1 id="toc-hId-76676608">&nbsp;</H1><H1 id="toc-hId--119836897"><SPAN><SPAN class="">Steps to manage landscape:</SPAN></SPAN></H1><H2 id="toc-hId--187267683"><SPAN><SPAN class="">For Greenfield implementation projects:</SPAN></SPAN></H2><P><SPAN><SPAN class="">Below steps are already performed by SAP</SPAN></SPAN></P><UL><LI><SPAN><SPAN class="">IAS is integrated with SuccessFactors Application.</SPAN></SPAN></LI><LI><SPAN><SPAN class="">IPS configuration to sync users from SF to IAS is also partially completed. Source System as SF and Target System as IAS is created automatically.</SPAN></SPAN></LI><LI><SPAN><SPAN class="">IPS configuration to sync users from SF to People Analytics is also partially completed. Target System as People analytics is also completed.</SPAN></SPAN></LI></UL><P>Below steps are required to be done by customer</P><UL><LI>Enable sync job in IPS to sync users from SAP SF to IAS. Update transformation code if required.</LI><LI>Enable sync job in IPS to sync users from SAP SF to People analytics.</LI></UL><P>Let's see how it's done.</P><H5 id="toc-hId-3466969">Open IPS tenant and in Properties - Edit the filter to sync one user.</H5><P><SPAN><SPAN class="">Property name: &nbsp;<STRONG>sf.user.filter</STRONG></SPAN></SPAN></P><P><SPAN><SPAN class="">Value:&nbsp;<STRONG>status eq 'active' and username in 'sf_username1_placeholder','sf_username2_placeholder'</STRONG></SPAN></SPAN></P><P><SPAN class="">Put the username of users whom you want to sync as part of your testing and trigger the sync job.</SPAN><SPAN class="">Once Testing is completed, update the values as shown in the screenshot.</SPAN></P><P><SPAN class=""><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="MansiRai_SAPSuccessFactorsConsultant.png" style="width: 951px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/96132iF7FCFB1F765C0F09/image-size/large?v=v2&amp;px=999" role="button" title="MansiRai_SAPSuccessFactorsConsultant.png" alt="MansiRai_SAPSuccessFactorsConsultant.png" /></span></SPAN></P><P><SPAN><SPAN class="">To test the connectivity, first trigger the simulate job (to check connectivity) and then run the Read or FullSync job to actually sync the users.</SPAN></SPAN></P><H5 id="toc-hId--193046536"><SPAN><SPAN class="">Post testing, Schedule the read job to be triggered in specific time intervals.</SPAN></SPAN></H5><P><SPAN><SPAN class=""><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="MansiRai_SAPSuccessFactorsConsultant1.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/96133i917D416FEB0DC21D/image-size/large?v=v2&amp;px=999" role="button" title="MansiRai_SAPSuccessFactorsConsultant1.png" alt="MansiRai_SAPSuccessFactorsConsultant1.png" /></span></SPAN></SPAN></P><P>As this source system is configured in both the target systems ( IAS and People Analytics), It will start syncing the users to both the target environments.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="MansiRai_SAPSFconsultant2.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/96134iE05C5A1755FD7C98/image-size/large?v=v2&amp;px=999" role="button" title="MansiRai_SAPSFconsultant2.png" alt="MansiRai_SAPSFconsultant2.png" /></span></P><H3 id="toc-hId--647725479">Enhanced Security and Maintenance of Certificates:</H3><P>Connectivity between SAP SF - IPS - IAS is done through certificates</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="2024-04-14 10_32_15-arch1.pdf.png" style="width: 713px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/96135iEFE3EAAE54910B9A/image-size/large?v=v2&amp;px=999" role="button" title="2024-04-14 10_32_15-arch1.pdf.png" alt="2024-04-14 10_32_15-arch1.pdf.png" /></span></P><P>In IPS - Authentication Property is set as&nbsp;<STRONG>ClientCertificateAuthentication</STRONG></P><P>This certificate is generated in IPS and is required to be uploaded in Source system - SAP SuccesFactors and in Target System - IAS. <U>This certificate is renewed every year and this activity is required to be performed once a year.</U></P><P>For Source System:</P><P><U>Certificate can be downloaded from here:</U></P><P><U><STRONG><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="MansiRai_Successfactors2.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/96136iB86933287575F5FD/image-size/large?v=v2&amp;px=999" role="button" title="MansiRai_Successfactors2.png" alt="MansiRai_Successfactors2.png" /></span></STRONG></U></P><P>Certificate can be uploaded in SAP SuccesFactors in Security Center:</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="MansiRai_SAPSuccessFactorsConsultant_SF image.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/96141i14FF09ECA4AF9228/image-size/large?v=v2&amp;px=999" role="button" title="MansiRai_SAPSuccessFactorsConsultant_SF image.png" alt="MansiRai_SAPSuccessFactorsConsultant_SF image.png" /></span></P><P>For Target System:</P><P><U>Certificate can be downloaded from here:</U></P><P><U><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="MansiRai_Successfactors4.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/96139i4666006C09AED134/image-size/large?v=v2&amp;px=999" role="button" title="MansiRai_Successfactors4.png" alt="MansiRai_Successfactors4.png" /></span></U></P><P><U>Upload the certificate in IAS:</U></P><P><U><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="MansiRai_SAPSFconsultant_IAS.png" style="width: 898px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/96140i098E11DE24D9A95C/image-size/large?v=v2&amp;px=999" role="button" title="MansiRai_SAPSFconsultant_IAS.png" alt="MansiRai_SAPSFconsultant_IAS.png" /></span></U></P><H1 id="toc-hId--332664339">&nbsp;</H1><H1 id="toc-hId--529177844">Conclusion:</H1><P>In this blog post we have learned how to manage the SuccessFactors landscape for Greenfield projects in 2024.</P> 2024-04-16T12:51:24.164000+02:00 https://community.sap.com/t5/technology-blogs-by-sap/configure-custom-sap-ias-tenant-with-sap-btp-kyma-runtime-environment/ba-p/13676954 Configure Custom SAP IAS tenant with SAP BTP Kyma runtime environment 2024-04-20T15:41:26.519000+02:00 quovadis https://community.sap.com/t5/user/viewprofilepage/user-id/743 <P><A href="https://help.sap.com/docs/btp/sap-business-technology-platform/kyma-environment?q=kyma" target="_blank" rel="noopener noreferrer"><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="quovadis_1-1713617473560.png" style="width: 400px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/99375i425B16DD0B283421/image-size/medium?v=v2&amp;px=400" role="button" title="quovadis_1-1713617473560.png" alt="quovadis_1-1713617473560.png" /></span></A></P><P>This brief is to showcase how to get this done using a<SPAN>&nbsp;</SPAN><A href="https://account.hanatrial.ondemand.com/" target="_blank" rel="nofollow noopener noreferrer">SAP BTP trial account</A>.</P><P>Albeit, the entire procedure is well documented in SAP Help portal, namely under<SPAN>&nbsp;</SPAN><A href="https://help.sap.com/docs/btp/sap-business-technology-platform/configure-custom-identity-provider-for-kyma?q=kyma#procedure" target="_blank" rel="noopener noreferrer">Configure a Custom Identity Provider for Kyma,</A><SPAN>&nbsp;</SPAN>the missing piece of the puzzle is the configuration of the identity provider application.</P><P>Any OIDC provider can be used as a custom OIDC provider with a kyma cluster. However, SAP BTP platform makes it both simple and affordable with the<SPAN>&nbsp;</SPAN><EM>Always Free</EM><SPAN>&nbsp;</SPAN><A href="https://discovery-center.cloud.sap/serviceCatalog/identity-authentication?region=all" target="_blank" rel="nofollow noopener noreferrer">SAP Cloud Identity Authentication services</A>.</P><P>From experience, this is is the most error-prone part of the procedure.<BR />In order to alleviate the pain and burden of creating a SAP IAS service provider application I have prepared <A href="https://gist.github.com/ptesny/fd74164a2d8b30f4e38dc9f7a08310dc#file-skr-easy-template-md" target="_blank" rel="noopener nofollow noreferrer">automation scripts</A> that can be used entirely programmatically either from a kyma environment itself or <A href="https://gist.github.com/ptesny/fd74164a2d8b30f4e38dc9f7a08310dc#file-skr-ias-application-master-md" target="_blank" rel="noopener nofollow noreferrer">directly from a BTP subaccount level</A>.</P><P>Let's see <A href="https://gist.github.com/ptesny/fd74164a2d8b30f4e38dc9f7a08310dc#configure-custom-sap-ias-tenant-with-sap-btp-kyma-runtime-environment" target="_blank" rel="noopener nofollow noreferrer">how</A>.</P><TABLE border="1"><TBODY><TR><TD>Table of Contents<OL><LI><A href="https://gist.github.com/ptesny/fd74164a2d8b30f4e38dc9f7a08310dc#prepare-subaccount" target="_blank" rel="noopener nofollow noreferrer">prepare subaccount for kyma runtime with a custom IAS tenant</A></LI><OL><LI><A href="https://gist.github.com/ptesny/fd74164a2d8b30f4e38dc9f7a08310dc#add-entitlements" target="_blank" rel="noopener nofollow noreferrer">add relevant service plans to your subaccount entitlements</A>.</LI><LI><A href="https://gist.github.com/ptesny/fd74164a2d8b30f4e38dc9f7a08310dc#kyma-enable" target="_blank" rel="noopener nofollow noreferrer">enable Kyma runtime environment</A>.</LI></OL><LI><A href="https://gist.github.com/ptesny/fd74164a2d8b30f4e38dc9f7a08310dc#establish-trust" target="_blank" rel="noopener nofollow noreferrer">establish BTP subaccount trust with a custom SAP IAS tenant.</A></LI><OL><LI><A href="https://gist.github.com/ptesny/fd74164a2d8b30f4e38dc9f7a08310dc#subscribe" target="_blank" rel="noopener nofollow noreferrer">subscribe to a Cloud Identity service from the service marketplace</A>.</LI><LI><A href="https://gist.github.com/ptesny/fd74164a2d8b30f4e38dc9f7a08310dc#create" target="_blank" rel="noopener nofollow noreferrer">create subscription to a Cloud Identity service</A>.</LI><LI><A href="https://gist.github.com/ptesny/fd74164a2d8b30f4e38dc9f7a08310dc#establish" target="_blank" rel="noopener nofollow noreferrer">Establish BTP Trust.</A></LI></OL><LI><A href="https://gist.github.com/ptesny/fd74164a2d8b30f4e38dc9f7a08310dc#kyma-environment" target="_blank" rel="noopener nofollow noreferrer">Kyma Environment.</A></LI><OL><LI><A href="https://gist.github.com/ptesny/fd74164a2d8b30f4e38dc9f7a08310dc#kubeconfig" target="_blank" rel="noopener nofollow noreferrer">default kubeconfig for the provisioned kyma cluster</A>.</LI><LI><A href="https://gist.github.com/ptesny/fd74164a2d8b30f4e38dc9f7a08310dc#deploy" target="_blank" rel="noopener nofollow noreferrer">Deploying custom-idp service provider application</A>.</LI><LI><A href="https://gist.github.com/ptesny/fd74164a2d8b30f4e38dc9f7a08310dc#update" target="_blank" rel="noopener nofollow noreferrer">Update the kyma cluster setting to use the Custom IAS tenant.</A>.</LI></OL><LI><A href="https://gist.github.com/ptesny/fd74164a2d8b30f4e38dc9f7a08310dc#kyma-dashboard" target="_blank" rel="noopener nofollow noreferrer">Accessing Kyma Dashboard</A></LI></OL></TD></TR></TBODY></TABLE><P>PS.</P><P>1. The SAP IAS service provider application&nbsp;<A href="https://gist.github.com/ptesny/fd74164a2d8b30f4e38dc9f7a08310dc#file-skr-easy-template-md" target="_blank" rel="noopener nofollow noreferrer">automation script</A> for those you'd like to run it directly from a kyma dashboard.&nbsp;</P><P>A hint: You may want to replace all the placeholder values with the shoot name of a kyma cluster.</P><P>&nbsp;</P><pre class="lia-code-sample language-yaml"><code># Source: skr-easy/templates/binding-ias.yaml apiVersion: services.cloud.sap.com/v1 kind: ServiceBinding metadata: name: skr-ias-binding labels: app.kubernetes.io/name: skr-ias-binding spec: serviceInstanceName: '&lt;serviceInstanceName&gt;' ##fee3078 externalName: '&lt;externalName&gt;' ##fee3078 secretName: skr-ias-binding-secret parameters: credential-type: "NONE" parametersFrom: [] --- # Source: skr-easy/templates/service-ias.yaml apiVersion: services.cloud.sap.com/v1 kind: ServiceInstance metadata: name: '&lt;name&gt;' ##'fee3078' labels: app.kubernetes.io/name: '&lt;label&gt;' ##'fee3078' spec: externalName: '&lt;externalName&gt;' ##fee3078 serviceOfferingName: identity servicePlanName: application parameters: name: '&lt;name&gt;' ##'fee3078' ### name of the application created in IAS or the service instance id display-name: '&lt;display-name&gt;' ##'shoot-name-fee3078' ### display-name of the application created in IAS home-url : '&lt;home-url &gt;' ## 'https://$BTP_SUBDOMAIN.fee3078.kyma.ondemand.com' user-access: public ## allows for self-registration oauth2-configuration: grant-types: - authorization_code - authorization_code_pkce_s256 token-policy: token-validity: 3600 refresh-parallel: 3 access-token-format: default public-client: true ## if set to true, enables PKCE flow for the application, where the client does not need to provide a credential. redirect-uris: - 'https://dashboard.kyma.cloud.sap' - 'http://localhost:8000' subject-name-identifier: ## https://help.sap.com/docs/identity-authentication/identity-authentication/configure-subject-name-identifier-sent-to-application?locale=en-US attribute: mail ##userUuid fallback-attribute: none ##uid default-attributes: ## https://help.sap.com/docs/identity-authentication/identity-authentication/configure-default-attributes-sent-to-application?locale=en-US assertion-attributes: ## https://help.sap.com/docs/identity-authentication/identity-authentication/configure-user-attributes-sent-to-application?locale=en-US email: mail groups: companyGroups first_name: firstName last_name: lastName login_name: loginName mail: mail scope: companyGroups user_uuid: userUuid locale: language</code></pre><P>&nbsp;</P><P><SPAN>2. Let's assume one needs to provision a kyma cluster with a <A href="https://gist.github.com/ptesny/fd74164a2d8b30f4e38dc9f7a08310dc#file-skr-ias-application-master-md" target="_blank" rel="noopener nofollow noreferrer">custom IAS from the start</A>.</SPAN><BR /><SPAN>In this case the SAP IAS service provider application must be created before the kyma environment is enabled.</SPAN></P><P>SAP IAS service instance application plan parameters for those who need to enable a kyma cluster configured with a custom SAP IAS from the get-go:</P><P>&nbsp;</P><pre class="lia-code-sample language-json"><code>{ "name": "quovadis", "display-name": "quovadis", "user-access": "public", "oauth2-configuration": { "grant-types": [ "authorization_code", "authorization_code_pkce_s256" ], "token-policy": { "token-validity": 3600, "refresh-parallel": 3, "access-token-format": "default" }, "public-client": true, "redirect-uris": [ "https://dashboard.kyma.cloud.sap", "http://localhost:8000" ] }, "subject-name-identifier": { "attribute": "mail", "fallback-attribute": "none" }, "default-attributes": null, "assertion-attributes": { "email": "mail", "groups": "companyGroups", "first_name": "firstName", "last_name": "lastName", "login_name": "loginName", "mail": "mail", "scope": "companyGroups", "user_uuid": "userUuid", "locale": "language" } }</code></pre><P>&nbsp;</P><P>As the SAP IAS service provider OAuth2 application must be configured with the authorization code with PKCE grant type, one needs to provide the following&nbsp; service bindings parameters:</P><P>&nbsp;</P><pre class="lia-code-sample language-json"><code> { "credential-type": "NONE" }</code></pre><P>&nbsp;</P><P>The resulting binding will contain both the clientid and the issuer url. These values can be used directly with the kyma cluster provisioning wizard.</P><DIV class=""><PRE>{ <SPAN class="">"clientid"</SPAN>: <SPAN class=""><SPAN class="">"</SPAN>f61*************<SPAN class="">"</SPAN></SPAN>, <SPAN class="">"url"</SPAN>: <SPAN class=""><SPAN class="">"</SPAN>https://***.trial-accounts.ondemand.com<SPAN class="">"</SPAN></SPAN>, }</PRE></DIV><P>From now on, one can update/create the kyma environment settings, either from the BTP cockpit or using the <A title="SAP BTP Command Line Interface (btp CLI)" href="https://tools.hana.ondemand.com/#cloud" target="_blank" rel="noopener nofollow noreferrer">btp cli</A> with the below json parameters (saved to a local config.json file)</P><P>&nbsp;</P><pre class="lia-code-sample language-json"><code>{ "administrators": [ "email1@domain.com", "email2@domain.com", "emailN@domain.com" ], "oidc": { "clientID": "f61********************", "groupsClaim": "groups", "issuerURL": "https://***.trial-accounts.ondemand.com", "signingAlgs": [ "RS256" ], "usernameClaim": "sub", "usernamePrefix": "-" }, "name": "quovadis" }</code></pre><P>&nbsp;</P><P>Eventually, the below script shows how to create a new kyma environment using btp cli with BTP Trial account, namely:</P><P>&nbsp;</P><pre class="lia-code-sample language-bash"><code>btp create accounts/environment-instance --display-name quovadis --environment kyma --service kymaruntime --plan trial --parameters config.json Creating an environment instance for subaccount e691b16b-**********... environment id: B1A10B19-************ environment name: quovadis environment: kyma landscape: state: CREATING state message: Creating environment instance. Command runs in the background. Use 'btp get accounts/environment-instance' to verify status. OK btp list accounts/environment-instance Showing environment details for subaccount e691b16b-*************: environment name environment id environment type state state message landscape *******trial AA23C91E-************ cloudfoundry OK Environment instance created. cf-ap21 quovadis B1A10B19-************ kyma OK Environment instance created. OK</code></pre><P>&nbsp;</P><P>and then how to dispose of it:</P><P>&nbsp;</P><pre class="lia-code-sample language-bash"><code>btp delete accounts/environment-instance B1A10B19-************** Do you really want to delete the specified environment instance and all content? [no]&gt; yes Deleting environment instance B1A10B19-******** and all its data in subaccount e691b16b-***********... environment name: quovadis environment id: B1A10B19-*************** environment type: kyma Command runs in the background. Use 'btp list accounts/environment-instance' to verify status. OK</code></pre><P>&nbsp;</P><P>Alternatively, a kyma environment update can be performed as well, for instance:</P><P>&nbsp;</P><pre class="lia-code-sample language-bash"><code>btp update accounts/environment-instance B1A10B19-******** --plan trial --parameters config2.json Updating environment instance with ID B1A10B19-*********** OK</code></pre><P>&nbsp;</P><P>Please note it is not possible to amend the list of modules via a kyma environment update.</P> 2024-04-20T15:41:26.519000+02:00 https://community.sap.com/t5/technology-blogs-by-members/streamlining-user-provisioning-from-ibm-verify-to-sap-cloud-identity/ba-p/13695010 Streamlining User Provisioning from IBM Verify to SAP Cloud Identity Services 2024-05-08T12:57:02.652000+02:00 TusharTrivedi https://community.sap.com/t5/user/viewprofilepage/user-id/150726 <P>SAP Cloud Identity Services (CIS), part of SAP BTP, can be used to integrate Identity Access Management (IAM). In our last blog, we discussed the integration of SAP Cloud Identity Services (CIS) with IBM Security Verify, and now we're taking the next step in this integration. User provisioning is the process of setting up new user accounts in a system or application. In this blog, we will explore a common use case - - transitioning user provisioning from IBM Verify to SAP Cloud Identity Services, and how this transition can streamline operations and enhance security.</P><P><STRONG>The Challenge of User Provisioning</STRONG></P><P>User provisioning is the process of granting and controlling access to resources within an organisation’s information technology infrastructure. Historically, on-boarding or off-boarding users has been a laborious and time-consuming procedure that frequently required numerous processes across multiple systems. As businesses embrace cloud solutions, the complexity of user provisioning has grown, necessitating automated and integrated approaches.</P><P><STRONG>Transitioning from IBM Verify to SAP Cloud Identity Services</STRONG></P><P>IBM Verify is a comprehensive identity and access management system that includes multi-factor authentication (MFA) and adaptive access control, while SAP Cloud Identity Services offers identity lifecycle management, single sign-on (SSO), and access governance features. Integrating these two systems can help organisations automate and streamline user provisioning operations, while also improving security and user experience.</P><P>&nbsp;</P><P><STRONG><U>How does it work?</U></STRONG></P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Picture 1.jpg" style="width: 600px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/107254iC87D93636632C1FF/image-dimensions/600x390?v=v2" width="600" height="390" role="button" title="Picture 1.jpg" alt="Picture 1.jpg" /></span></P><P>The diagram shows that IBM Security Verify acts as a central user management system. It creates user accounts and manages their attributes, and also provisions them (or creates them) in SAP Cloud Identity Services, potentially syncing relevant user attributes. Selected attributes from Verify are&nbsp;mapped&nbsp;to specific target attributes in SAP Cloud Identity Services, ensuring consistent user information across both systems. SCIM, a standardised protocol, enables communication between Verify and SAP Cloud Identity Services. On the left side of the diagram, IBM Security Verify acts as a SCIM server, receiving requests for user management and then modifying the target directory as needed. This streamlines user creation and ensures consistent user information across both systems.</P><P>&nbsp;</P><P><STRONG><U>Prerequisites</U></STRONG></P><UL><LI>SAP Cloud Identity Services (for trial instance check this <A href="https://help.sap.com/docs/cloud-identity?locale=en-US" target="_blank" rel="noopener noreferrer">link</A>)</LI><LI>IBM Security Verify (for trial instance check this <A href="https://www.ibm.com/docs/en/security-verify?topic=overview-accessing-security-verify" target="_blank" rel="noopener nofollow noreferrer">link</A>)</LI><LI>A smartphone with IBM Security Verify App</LI></UL><P>&nbsp;</P><P><STRONG><U>Configurations and Settings in IBM Security Verify and SAP Cloud Identity Services</U></STRONG></P><P>Log into <A href="https://ibmlabs.verify.ibm.com/ui/admin" target="_blank" rel="noopener nofollow noreferrer">IBM Security Verify</A> as an administrator  </P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Picture 2.jpg" style="width: 600px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/107255iF33506AB018341EE/image-dimensions/600x315?v=v2" width="600" height="315" role="button" title="Picture 2.jpg" alt="Picture 2.jpg" /></span></P><P>When a user logs in, the home screen as shown below will be displayed.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Picture 3.jpg" style="width: 600px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/107256iA46ECE028C7D63C1/image-dimensions/600x315?v=v2" width="600" height="315" role="button" title="Picture 3.jpg" alt="Picture 3.jpg" /></span></P><P>On the left panel, click on "Applications" under "Applications". On the right side of the screen, there is an “Add application” button. Click on it.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Picture 4.jpg" style="width: 600px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/107258i998C9B160EB85555/image-dimensions/600x329?v=v2" width="600" height="329" role="button" title="Picture 4.jpg" alt="Picture 4.jpg" /></span></P><P>Fill in the necessary details under “General” section as below and save the details.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Picture 5.jpg" style="width: 600px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/107259iF49D6F1784AAD6A7/image-dimensions/600x363?v=v2" width="600" height="363" role="button" title="Picture 5.jpg" alt="Picture 5.jpg" /></span></P><P>Before we go further, let’s log into SAP BTP account and you will be navigated on SAP BTP Cockpit. As suggested below, navigate to the “Instances and Subscriptions” tab which is under “Services.”</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Picture 6.jpg" style="width: 601px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/107261i1A4FCC6A1C0D1C12/image-dimensions/601x326?v=v2" width="601" height="326" role="button" title="Picture 6.jpg" alt="Picture 6.jpg" /></span></P><P>You have to enable the cloud identity services application.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Picture 7.jpg" style="width: 601px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/107262i0B72D5F41CB61C9B/image-dimensions/601x316?v=v2" width="601" height="316" role="button" title="Picture 7.jpg" alt="Picture 7.jpg" /></span></P><P>Once enabled, it will look as below. Now, click on Cloud Identity Services application and you will be redirected to the login screen of the SAP authentication screen as shown below.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Picture 8.jpg" style="width: 601px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/107263iCC19230226369943/image-dimensions/601x316?v=v2" width="601" height="316" role="button" title="Picture 8.jpg" alt="Picture 8.jpg" /></span></P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Picture 9.jpg" style="width: 600px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/107266i357621A8168E5EF0/image-dimensions/600x315?v=v2" width="600" height="315" role="button" title="Picture 9.jpg" alt="Picture 9.jpg" /></span></P><P>After a successful login, you can see the home screen of Cloud identity Services. Go to the “Identity Providers” as highlighted below :</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Picture 10.jpg" style="width: 601px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/107268i5D2F63349F825C38/image-dimensions/601x337?v=v2" width="601" height="337" role="button" title="Picture 10.jpg" alt="Picture 10.jpg" /></span></P><P>Click on the Corporate Identity providers and create new identity provider.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Picture 11.jpg" style="width: 601px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/107269i7DEC6BF3C2F442CB/image-dimensions/601x313?v=v2" width="601" height="313" role="button" title="Picture 11.jpg" alt="Picture 11.jpg" /></span></P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Picture 12.jpg" style="width: 601px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/107270iDFD2CD3C9DA26807/image-dimensions/601x337?v=v2" width="601" height="337" role="button" title="Picture 12.jpg" alt="Picture 12.jpg" /></span></P><P>Once the new identity provider is successfully added,&nbsp; click on the identity provider type and select SAML 2.0 compliant, as shown below:</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Picture 13.jpg" style="width: 600px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/107271i5C962799BF791BA2/image-dimensions/600x315?v=v2" width="600" height="315" role="button" title="Picture 13.jpg" alt="Picture 13.jpg" /></span></P><P>Go to the SAML configuration section and fill in the information as shown below:</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Picture 14.jpg" style="width: 600px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/107275iD992FDB591A7B11C/image-dimensions/600x315?v=v2" width="600" height="315" role="button" title="Picture 14.jpg" alt="Picture 14.jpg" /></span></P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Picture 15.jpg" style="width: 601px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/107279i5840BC903244CD42/image-dimensions/601x314?v=v2" width="601" height="314" role="button" title="Picture 15.jpg" alt="Picture 15.jpg" /></span></P><P>You can browse the “Metadata” file from your device once you download it from IBM Security Verify dashboard. Go to the &nbsp;“Sign on” section of the application and on the right side of the screen, download the file from the given URL and upload the same in SAP Cloud Identity Services as highlighted below:</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Picture 16.jpg" style="width: 598px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/107280i74553FB8FBABC481/image-dimensions/598x329?v=v2" width="598" height="329" role="button" title="Picture 16.jpg" alt="Picture 16.jpg" /></span></P><P>Click on the Trusting application section and add SAP BTP trial subaccount.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Picture 17.jpg" style="width: 600px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/107281i7C0241A7448A67D6/image-dimensions/600x315?v=v2" width="600" height="315" role="button" title="Picture 17.jpg" alt="Picture 17.jpg" /></span></P><P>Establish the trust configuration, which is under the “Security” section &nbsp;for the cloud identity application as shown in the below screenshots.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Picture 18.jpg" style="width: 600px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/107282i6B60DB321260CD72/image-dimensions/600x315?v=v2" width="600" height="315" role="button" title="Picture 18.jpg" alt="Picture 18.jpg" /></span></P><P>You will see the below steps once you click on establish trust. In the first step, choose tenant and click on the next.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Picture 19.jpg" style="width: 600px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/107284iC5DF2A58932143A3/image-dimensions/600x315?v=v2" width="600" height="315" role="button" title="Picture 19.jpg" alt="Picture 19.jpg" /></span></P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Picture 20.jpg" style="width: 601px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/107285i669823593CB1EF97/image-dimensions/601x317?v=v2" width="601" height="317" role="button" title="Picture 20.jpg" alt="Picture 20.jpg" /></span></P><P>After selecting a tenant, choose domain for your SAP Cloud Identity Services application.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Picture 21.jpg" style="width: 600px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/107286iDC0DF0A0829D035F/image-dimensions/600x315?v=v2" width="600" height="315" role="button" title="Picture 21.jpg" alt="Picture 21.jpg" /></span></P><P>Click on the next button and configure parameters as shown in the below screenshot.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Picture 22.jpg" style="width: 601px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/107288iD40F34CDECC0FD9A/image-dimensions/601x317?v=v2" width="601" height="317" role="button" title="Picture 22.jpg" alt="Picture 22.jpg" /></span></P><P>Click on the next button and review the setup that you have done while establishing the trust. Finally, click on the finish button and save the details.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Picture 23.jpg" style="width: 600px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/107289iD6BAA6A35F4A9AA5/image-dimensions/600x315?v=v2" width="600" height="315" role="button" title="Picture 23.jpg" alt="Picture 23.jpg" /></span></P><P>Once done, you can see the trust new active trust configuration as shown below:</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Picture 24.jpg" style="width: 601px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/107392i27CD4C569D25B32C/image-dimensions/601x317?v=v2" width="601" height="317" role="button" title="Picture 24.jpg" alt="Picture 24.jpg" /></span></P><P>Now go back to IBM Security Verify and click on “Sign-on” section, then select “Use metadata” checkbox. It will allow us to upload the metadata file which we have downloaded from SAP BTP as shown below:</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Picture 25.jpg" style="width: 601px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/107394i216EC7591BDAD303/image-dimensions/601x317?v=v2" width="601" height="317" role="button" title="Picture 25.jpg" alt="Picture 25.jpg" /></span></P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Picture 26.jpg" style="width: 600px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/107395i35F9A561397134EF/image-dimensions/600x315?v=v2" width="600" height="315" role="button" title="Picture 26.jpg" alt="Picture 26.jpg" /></span></P><P>Upload the metadata file which you have recently saved on your device to IBM Verify dashboard.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Picture 27.jpg" style="width: 600px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/107397i52227C152B94583A/image-dimensions/600x339?v=v2" width="600" height="339" role="button" title="Picture 27.jpg" alt="Picture 27.jpg" /></span></P><P>Now go to the “Account lifecycle” tab and add SCIM URL, Username and password detail as shown in below image. You can get all the details from SAP Cloud Identity Services application page.</P><P>&nbsp;</P><P>To get SCIM URL, go to SAP CIS and get the URL details from the browser and add “SCIM” at the end of URL.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Picture 28.jpg" style="width: 600px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/107398i0F1E9139A1B89A00/image-dimensions/600x333?v=v2" width="600" height="333" role="button" title="Picture 28.jpg" alt="Picture 28.jpg" /></span></P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Picture 29.jpg" style="width: 600px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/107399iC0B3302E3F629661/image-dimensions/600x333?v=v2" width="600" height="333" role="button" title="Picture 29.jpg" alt="Picture 29.jpg" /></span></P><P>After adding the above details, scroll down and you can see “Attribute mapping” section. &nbsp;Click on the checkbox for which attribute you want to map from IBM Verify to SAP CIS and want to keep updated. Here we have checked email. &nbsp;Save this detail once changes are completed.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Picture 30.jpg" style="width: 600px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/107400i05DBB07F4608DEC7/image-dimensions/600x351?v=v2" width="600" height="351" role="button" title="Picture 30.jpg" alt="Picture 30.jpg" /></span></P><P>We have completed the configurations in IBM Security Verify and SAP Cloud Identity Services. Let’s add user with attribute&nbsp; into Verify and check if it is mapped to Cloud Identity Users dashboard.</P><P>Go to the Users tab under the “Directory” section on the left side of the verify dashboard and click on the “Add User” button as shown in below screenshot.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Picture 31.jpg" style="width: 601px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/107401iD25469100AB22F06/image-dimensions/601x359?v=v2" width="601" height="359" role="button" title="Picture 31.jpg" alt="Picture 31.jpg" /></span></P><P>Fill out the necessary information for the user as mentioned in the below image and click on the “Save” user tab.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Picture 32.jpg" style="width: 300px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/107402i6BC43DACFD285AE2/image-dimensions/300x427?v=v2" width="300" height="427" role="button" title="Picture 32.jpg" alt="Picture 32.jpg" /></span></P><P>Scroll down and you can add more detail about the user. Here we have added an email ID, mobile number and user company details.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Picture 33.jpg" style="width: 300px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/107404i61838B107F605CA6/image-dimensions/300x495?v=v2" width="300" height="495" role="button" title="Picture 33.jpg" alt="Picture 33.jpg" /></span>&nbsp;<span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Picture 34.jpg" style="width: 293px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/107405i6D6E7519C623DBAE/image-dimensions/293x495?v=v2" width="293" height="495" role="button" title="Picture 34.jpg" alt="Picture 34.jpg" /></span></P><P>Once done, click on the Save button and the user detail will be saved.</P><P>Open the Cloud Identity Services application and go to the user section to check whether the newly-created user from Verify is mapped.</P><P>Click on the “Instance and subscription” section from the “Services” section on the left menu, and once the application list is shown, click on the Cloud Identity Services application as shown below.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Picture 35.jpg" style="width: 601px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/107406i9D4A6985D7838094/image-dimensions/601x353?v=v2" width="601" height="353" role="button" title="Picture 35.jpg" alt="Picture 35.jpg" /></span></P><P>When the new application is loaded, click on the “User Management” tile and all the user list will be displayed.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Picture 36.jpg" style="width: 600px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/107407i4908B40D66F3039E/image-dimensions/600x354?v=v2" width="600" height="354" role="button" title="Picture 36.jpg" alt="Picture 36.jpg" /></span></P><P>As you can see in the below screenshot, a new user is created, which is added from Verify and mapped into SAP Cloud Identity Services. Also, the user detail is mapped into Cloud Identity Services.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Picture 37.jpg" style="width: 600px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/107408i49144A562C9FB9B1/image-dimensions/600x351?v=v2" width="600" height="351" role="button" title="Picture 37.jpg" alt="Picture 37.jpg" /></span></P><P><STRONG><U>Conclusion</U></STRONG></P><P>Effective user provisioning is critical to maintaining security, compliance, and operational efficiency. Centralising identity management, improving security, and streamlining administration activities enables organisations to successfully manage user identities and access controls across their entire IT infrastructure. Embracing integrated identity management solutions is more than just convenient - - &nbsp;it is a strategic need for businesses looking to flourish in an increasingly linked and security-conscious environment.</P><P><STRONG><U>More information:</U></STRONG></P><P>Refer to our another blog on <A href="https://community.sap.com/t5/technology-blogs-by-members/integrating-ibm-security-verify-with-sap-cloud-identity-services-in-sap-btp/ba-p/13651722" target="_blank">SAP Cloud Identity Service integration with IBM Security Verify</A>.</P><P>If you have any question or query about&nbsp;SAP BTP please refer to <A href="https://community.sap.com/" target="_blank">SAP Community</A> and for any question or query about IBM Security Verify refer to <A href="https://community.ibm.com/community/user/security/communities/community-home?CommunityKey=e7c36119-46d7-42f2-97a9-b44f0cc89c6d" target="_blank" rel="noopener nofollow noreferrer">IBM Security Verify Community</A></P> 2024-05-08T12:57:02.652000+02:00 https://community.sap.com/t5/technology-blogs-by-sap/enabling-saml-single-sign-on-for-sap-s-4-hana-and-sap-btp-apps-using-the/ba-p/13694598 Enabling SAML Single Sign-On for SAP S/4 HANA and SAP BTP Apps using the same SAP IDP 2024-05-08T17:48:21.660000+02:00 cvsabhishek https://community.sap.com/t5/user/viewprofilepage/user-id/124781 <P><FONT size="2">co-author:&nbsp;<A class="" href="https://community.sap.com/t5/user/viewprofilepage/user-id/733853" target="_self"><SPAN class="">santosh_kumar97</SPAN></A></FONT></P><P><U><FONT size="5"><STRONG>Introduction</STRONG></FONT></U></P><P data-unlink="true"><SPAN>The SAP <A href="https://help.sap.com/docs/cloud-identity-services/cloud-identity-services/what-is-identity-authentication" target="_self" rel="noopener noreferrer">Cloud Identity Services</A> (SCI) are the dedicated cloud services that provide functionalities for authentication &amp; single sign-on and identity lifecycle across SAP solutions. SCI includes the Identity Authentication (IAS), Identity Provisioning (IPS), Identity Directory (IdDS) and soon also the Authorization Management services (AMS).</SPAN><BR />In this blog, we will be using the Authentication and SSO feature of the Cloud Identity Services to show how apps built across multiple platforms, e.g: SAP BTP and SAP S4 HANA, can use a single user to login and navigate seamlessly. <SPAN>Cloud Identity Services</SPAN>&nbsp;tenant will be used as an <A href="https://community.sap.com/t5/enterprise-resource-planning-q-a/what-is-sap-idp/qaq-p/12648903" target="_self">IDP(<SPAN>SAP Identity Provider</SPAN>)</A>.&nbsp;</P><P data-unlink="true"><U><FONT size="5"><STRONG>Overview</STRONG></FONT></U></P><OL><LI>Establish Trust between S4 HANA and&nbsp;<SPAN>Cloud Identity Services</SPAN> Tenant</LI><LI>Establish 'Trust' &nbsp;between the&nbsp;SAP BTP system and&nbsp;<SPAN>Cloud Identity Services</SPAN> Tenant</LI><LI><SPAN>Testing the SAML Single Sign-On<BR /><BR /></SPAN></LI></OL><P><U><FONT size="5"><STRONG><BR />Establish Trust between S4 HANA and&nbsp;<SPAN>Cloud Identity Services</SPAN> Tenant<BR /></STRONG></FONT></U></P><OL><LI>Firstly we need to extract the SAML metadata from S4 HANA system. To achieve this, we go to Transaction:<STRONG>SAML2<BR /><BR /></STRONG><SPAN>&nbsp; &nbsp;</SPAN><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="cvsabhishek_0-1715143345167.png" style="width: 662px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/107212iB4A4A350E214BB43/image-dimensions/662x183?v=v2" width="662" height="183" role="button" title="cvsabhishek_0-1715143345167.png" alt="cvsabhishek_0-1715143345167.png" /></span><BR /><BR /><BR /></LI><LI>Choose "Create SAML 2.0 Local Provider".<BR /><BR /><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="cvsabhishek_1-1715143828791.png" style="width: 694px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/107213iC8AF02A0C75D0D3E/image-dimensions/694x439?v=v2" width="694" height="439" role="button" title="cvsabhishek_1-1715143828791.png" alt="cvsabhishek_1-1715143828791.png" /></span><BR /><BR /><BR /></LI><LI><SPAN>Give a provider name in the dialog box that appears.<BR /><BR /><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="cvsabhishek_2-1715144080929.png" style="width: 696px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/107214iB63DB41677BC4EDF/image-dimensions/696x391?v=v2" width="696" height="391" role="button" title="cvsabhishek_2-1715144080929.png" alt="cvsabhishek_2-1715144080929.png" /></span></SPAN></LI><LI><SPAN><SPAN>In the Service Provider Settings, Choose selection mode: "<STRONG>Automatic</STRONG>", since we have only 1 Identity Provider connected and we&nbsp;</SPAN><SPAN>do not want to choose an Identity Provider every time.<BR /><BR /><BR /></SPAN></SPAN></LI><LI><SPAN><SPAN>Once we are done configuring the Local Provider, we will extract the SAML2 metadata using the "Metadata" button. Store this file for later use in the&nbsp;Cloud Identity Services Tenant.<BR /><BR /></SPAN></SPAN><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="cvsabhishek_8-1715147124071.png" style="width: 690px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/107238i6BE83347F445DF98/image-dimensions/690x452?v=v2" width="690" height="452" role="button" title="cvsabhishek_8-1715147124071.png" alt="cvsabhishek_8-1715147124071.png" /></span><P>&nbsp;</P><SPAN>We will leave the S4 configuration for now and return later. We move to the Cloud Identity Services for the configurations.<BR /><BR /><BR /></SPAN></LI><LI><SPAN><SPAN><SPAN>Logon to the Cloud Identity Services tenant and extract the SAML configuration.<BR /><BR /></SPAN></SPAN></SPAN><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="cvsabhishek_9-1715147325714.png" style="width: 691px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/107241i5EEF441339D4CF10/image-dimensions/691x240?v=v2" width="691" height="240" role="button" title="cvsabhishek_9-1715147325714.png" alt="cvsabhishek_9-1715147325714.png" /></span><BR /><SPAN><SPAN><BR /><BR /></SPAN></SPAN><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="cvsabhishek_5-1715146070720.png" style="width: 695px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/107233i52DAF805D47EDE6F/image-dimensions/695x319?v=v2" width="695" height="319" role="button" title="cvsabhishek_5-1715146070720.png" alt="cvsabhishek_5-1715146070720.png" /></span><BR /><BR /><BR /><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="cvsabhishek_6-1715146224972.png" style="width: 696px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/107234iC1932E51ED61396B/image-dimensions/696x174?v=v2" width="696" height="174" role="button" title="cvsabhishek_6-1715146224972.png" alt="cvsabhishek_6-1715146224972.png" /></span><BR /><P>&nbsp;</P></LI><LI>Get the 'Signing Certificate'&nbsp;<BR /><BR /><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="cvsabhishek_7-1715146434946.png" style="width: 689px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/107236iB89755D7797FAC07/image-dimensions/689x150?v=v2" width="689" height="150" role="button" title="cvsabhishek_7-1715146434946.png" alt="cvsabhishek_7-1715146434946.png" /></span><P>To extract the Signing Certificate, copy the 'Certificate Information' to a text file and save it as *.cer file. Then you can use a 'Keystore Explorer' app or something similar to create a proper certificate.Store this certificate in your local folder.&nbsp;<BR />Incase of KeyStore Explorer, open KeyStore Explorer, then click on 'Examine Certificate'. Choose the .cer file created above and click on 'Examine'. Then Click 'Export'. This signing cretificate will be used later when configuring in the S4 system.</P></LI><LI>&nbsp;Now let's create an application in&nbsp;<SPAN>Cloud Identity Services</SPAN> for our S4 HANA system. The purpose of creating this application is to establish the Trust between&nbsp;<SPAN>Cloud Identity Services</SPAN> tenant and S4 HANA system.<BR /><BR /></LI><LI>Go to "Applications and Resources" tab in the&nbsp;<SPAN>Cloud Identity Services</SPAN> and choose "Applications". Then click on "Create Application".Give a Display Name; Type as "SAP on-premise Solution" and create.<BR /><BR /><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="cvsabhishek_0-1715147843630.png" style="width: 672px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/107244i509E46BEECEC7F99/image-dimensions/672x145?v=v2" width="672" height="145" role="button" title="cvsabhishek_0-1715147843630.png" alt="cvsabhishek_0-1715147843630.png" /></span><BR /><BR /><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="cvsabhishek_2-1715147920847.png" style="width: 395px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/107246iC8940B36123EC059/image-dimensions/395x460?v=v2" width="395" height="460" role="button" title="cvsabhishek_2-1715147920847.png" alt="cvsabhishek_2-1715147920847.png" /></span><BR /><P>&nbsp;</P></LI><LI>Now under SAML 2.0 configuration, we upload the metadata.xml file which we retrieved from the S4 system in step 5.<BR />Once we upload the metadata file, everything gets auto-populated.<BR /><BR /><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="cvsabhishek_0-1715151482507.png" style="width: 693px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/107287iAC6143A84AABAFDA/image-dimensions/693x403?v=v2" width="693" height="403" role="button" title="cvsabhishek_0-1715151482507.png" alt="cvsabhishek_0-1715151482507.png" /></span><BR /><BR /><BR /></LI><LI>Set all the switches to ON state.<BR /><BR /><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="cvsabhishek_1-1715151614677.png" style="width: 708px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/107291i9DBFD8B29796035C/image-dimensions/708x518?v=v2" width="708" height="518" role="button" title="cvsabhishek_1-1715151614677.png" alt="cvsabhishek_1-1715151614677.png" /></span><P><SPAN>In the section "Subject Name Identifier" please choose "Identity Directory" and value as "Email" because we will use Email for authentication.<BR /></SPAN></P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="cvsabhishek_2-1715151685859.png" style="width: 672px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/107292iF42F760A36C8A1F0/image-dimensions/672x549?v=v2" width="672" height="549" role="button" title="cvsabhishek_2-1715151685859.png" alt="cvsabhishek_2-1715151685859.png" /></span><BR /><P>&nbsp;</P></LI><LI>Let's continue the SAML2 configuration in S4, by providing the metadata xml that we got from the<SPAN>Cloud Identity Services</SPAN>&nbsp;system in step 6.<BR />The process for that is we choose the 'Trusted Providers' tab and click on 'Add'-&gt; 'Upload metadata File'<BR /><BR /><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="cvsabhishek_3-1715151969125.png" style="width: 685px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/107293iC6D27A56CB7CC21D/image-dimensions/685x178?v=v2" width="685" height="178" role="button" title="cvsabhishek_3-1715151969125.png" alt="cvsabhishek_3-1715151969125.png" /></span><P>&nbsp;</P></LI><LI>We go through a series of steps now.<BR /><BR />Upload the metadata.xml file that we downloaded from&nbsp;<SPAN>Cloud Identity Services</SPAN> Tenant.<BR /><BR /><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="cvsabhishek_4-1715152067386.png" style="width: 688px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/107294iCE16BC1C8F7178E2/image-dimensions/688x313?v=v2" width="688" height="313" role="button" title="cvsabhishek_4-1715152067386.png" alt="cvsabhishek_4-1715152067386.png" /></span><BR /><BR /><P>Upload the Signing Certificate that we created in step 7.<BR /><BR /></P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="cvsabhishek_5-1715152166572.png" style="width: 682px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/107296i3E6F9197471C47D7/image-dimensions/682x308?v=v2" width="682" height="308" role="button" title="cvsabhishek_5-1715152166572.png" alt="cvsabhishek_5-1715152166572.png" /></span><BR /><BR /><BR /><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="cvsabhishek_6-1715152337507.png" style="width: 681px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/107299i95D282A0E3F9687A/image-dimensions/681x320?v=v2" width="681" height="320" role="button" title="cvsabhishek_6-1715152337507.png" alt="cvsabhishek_6-1715152337507.png" /></span><P><SPAN>For better security choose SHA-256 instead of SHA-1 in Signature and Encryption.</SPAN></P><SPAN>Click on next and finish all the sections.<BR /><BR /></SPAN></LI><LI><SPAN><SPAN>Now click on 'Edit', then 'Add' and then select the 'Unspecified' and save the settings.<BR /><BR /></SPAN></SPAN><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="cvsabhishek_7-1715152497093.png" style="width: 695px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/107301iC266BDAEA5F65739/image-dimensions/695x180?v=v2" width="695" height="180" role="button" title="cvsabhishek_7-1715152497093.png" alt="cvsabhishek_7-1715152497093.png" /></span> <BR /><BR /><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 697px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/107362i8F6C35FCDEF7BA87/image-dimensions/697x300?v=v2" width="697" height="300" role="button" title="image.png" alt="image.png" /></span><BR /><P>&nbsp;</P></LI><LI>Click on Enable to Active the Config.<BR /><BR /><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="cvsabhishek_9-1715152619654.png" style="width: 686px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/107303i4FB079576E6B48D0/image-dimensions/686x239?v=v2" width="686" height="239" role="button" title="cvsabhishek_9-1715152619654.png" alt="cvsabhishek_9-1715152619654.png" /></span><BR /><BR /></LI><LI><SPAN>Goto Transaction SICF , enter the service name or external alias example /sap/bc/ui2/flp and open the service.<BR /></SPAN><BR /><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="cvsabhishek_10-1715152818498.png" style="width: 703px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/107305iF4E2FC4B10F54789/image-dimensions/703x522?v=v2" width="703" height="522" role="button" title="cvsabhishek_10-1715152818498.png" alt="cvsabhishek_10-1715152818498.png" /></span><BR /><BR /><P>Double-click on the service to open it.<BR /><BR /></P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="cvsabhishek_11-1715152843405.png" style="width: 699px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/107307i91A60607A0CF85EF/image-dimensions/699x331?v=v2" width="699" height="331" role="button" title="cvsabhishek_11-1715152843405.png" alt="cvsabhishek_11-1715152843405.png" /></span><P>&nbsp;</P></LI><LI><SPAN><SPAN>Select Logon Data tab. Choose the Alternative Logon Procedure and set SAML Logon at 1 and Save.<BR /><BR /></SPAN></SPAN><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="cvsabhishek_12-1715152874579.png" style="width: 621px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/107308i14128E06F1E3CA48/image-dimensions/621x558?v=v2" width="621" height="558" role="button" title="cvsabhishek_12-1715152874579.png" alt="cvsabhishek_12-1715152874579.png" /></span><BR /><BR /><BR /><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="cvsabhishek_13-1715152902646.png" style="width: 641px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/107309iD432952BE3DF039C/image-dimensions/641x372?v=v2" width="641" height="372" role="button" title="cvsabhishek_13-1715152902646.png" alt="cvsabhishek_13-1715152902646.png" /></span><P>We create the url for this service as follows <A target="_blank" rel="noopener">https://&lt;HOST&gt;:&lt;PORT&gt;/sap/bc/ui2/flp?sap-client=&lt;CLIENT&gt;</A><BR /><BR /></P></LI></OL><P><U><FONT size="5"><STRONG><BR /><BR />Establish Trust between SAP BTP and&nbsp;<SPAN>Cloud Identity Services</SPAN> Tenant</STRONG></FONT></U></P><OL><LI>Login to your SAP BTP sub-account.<BR />Go to tab 'Trust Configuration'.<BR /><BR /><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="cvsabhishek_0-1715163132578.png" style="width: 682px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/107403iB6B56CD86067A4BA/image-dimensions/682x360?v=v2" width="682" height="360" role="button" title="cvsabhishek_0-1715163132578.png" alt="cvsabhishek_0-1715163132578.png" /></span><P>Download the SAML metadata for the BTP system and create new SAML configuration.<BR /><BR /></P></LI><LI>We create a new SAML Trust Configuration by uploading the SAML metadata of the&nbsp;<SPAN>Cloud Identity Services</SPAN> system. Click on save once the metadata is uploaded.<BR /><BR /><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="cvsabhishek_1-1715163568186.png" style="width: 704px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/107409i04578D6DD292FF44/image-dimensions/704x570?v=v2" width="704" height="570" role="button" title="cvsabhishek_1-1715163568186.png" alt="cvsabhishek_1-1715163568186.png" /></span><BR /><BR /><BR />Once the trust is established on the BTP side, it will be shown as follows.<BR /><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="cvsabhishek_2-1715163787687.png" style="width: 707px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/107410iF7038CDDF2452168/image-dimensions/707x258?v=v2" width="707" height="258" role="button" title="cvsabhishek_2-1715163787687.png" alt="cvsabhishek_2-1715163787687.png" /></span><P>&nbsp;</P><BR /><BR /></LI><LI>We now configure Trust on the&nbsp;<SPAN>Cloud Identity Services&nbsp;</SPAN>Tenant side. To achieve this we will be creating an application on the&nbsp;<SPAN>Cloud Identity Services&nbsp;</SPAN>system and uploading the SAML metadata file of the BTP sub-account downloaded in step 1.<BR /><BR /><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="cvsabhishek_3-1715164058984.png" style="width: 485px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/107411i3CB561CEEA227B54/image-dimensions/485x554?v=v2" width="485" height="554" role="button" title="cvsabhishek_3-1715164058984.png" alt="cvsabhishek_3-1715164058984.png" /></span><BR /><BR /><P>In the SAML2.0 configuration, we upload the metadata file and save.</P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="cvsabhishek_4-1715164184914.png" style="width: 591px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/107414i7E8FBD1F09D1781C/image-dimensions/591x550?v=v2" width="591" height="550" role="button" title="cvsabhishek_4-1715164184914.png" alt="cvsabhishek_4-1715164184914.png" /></span><BR /><BR /><P>Enable all Signing options</P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="cvsabhishek_5-1715164255636.png" style="width: 503px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/107415i532E19AA5FF1D717/image-dimensions/503x444?v=v2" width="503" height="444" role="button" title="cvsabhishek_5-1715164255636.png" alt="cvsabhishek_5-1715164255636.png" /></span><P>&nbsp;</P>For Subject Name Identifier, give 'Identity Directory' and 'Email', &nbsp;then 'Save'.<BR /><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="cvsabhishek_6-1715164323618.png" style="width: 582px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/107416i8C0FEB4AC5B0B1AC/image-dimensions/582x461?v=v2" width="582" height="461" role="button" title="cvsabhishek_6-1715164323618.png" alt="cvsabhishek_6-1715164323618.png" /></span><P>&nbsp;</P><BR /><BR />We are done with the Trust establishment of&nbsp;<SPAN>Cloud Identity Services</SPAN> and BTP.<BR /><BR /></LI></OL><P><FONT size="5"><STRONG><U><BR /><BR />Testing the SAML Single Sign-On</U><BR /></STRONG></FONT></P><P>Now, it's time to check if our configurations work.</P><OL><LI>Let's open the browser in Incognito mode.<BR /><BR /></LI><LI>Enter the service url of the S4 HANA application that we retrieved from the Step 17 of S4 Trust establishing.<BR />For our use case, we have chosen the flp app url.<BR /><BR /><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="cvsabhishek_0-1715149049372.png" style="width: 640px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/107247iC93720938D690D07/image-dimensions/640x64?v=v2" width="640" height="64" role="button" title="cvsabhishek_0-1715149049372.png" alt="cvsabhishek_0-1715149049372.png" /></span><P>&nbsp;</P></LI><LI>On Enter, the url routes to our&nbsp;<SPAN>Cloud Identity Services</SPAN> login url, asking for credentials from our IDP.<BR />Remember, the users should be maintained in the IDP prior to logging in.<BR /><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="cvsabhishek_1-1715149248075.png" style="width: 650px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/107248iA7645EAD4BADFA72/image-dimensions/650x417?v=v2" width="650" height="417" role="button" title="cvsabhishek_1-1715149248075.png" alt="cvsabhishek_1-1715149248075.png" /></span><BR /><BR /></LI><LI>Enter your credentials and click on 'Continue'.<BR /><BR /><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="cvsabhishek_0-1715149462315.png" style="width: 637px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/107249iEEA4E6D8268F50A9/image-dimensions/637x278?v=v2" width="637" height="278" role="button" title="cvsabhishek_0-1715149462315.png" alt="cvsabhishek_0-1715149462315.png" /></span><P>And Voila! You are logged in using your&nbsp;<SPAN>Cloud Identity Services&nbsp;</SPAN>credentials.<BR /><BR /></P></LI><LI>Now to test the Single Sign-On spanning multiple environments, let's take an application from our BTP environment, which has&nbsp;<SPAN>Cloud Identity Services</SPAN> enabled.<BR /><BR /><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="cvsabhishek_1-1715149603352.png" style="width: 669px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/107250i3A689359EC2D62B9/image-dimensions/669x97?v=v2" width="669" height="97" role="button" title="cvsabhishek_1-1715149603352.png" alt="cvsabhishek_1-1715149603352.png" /></span><BR /><P>&nbsp;</P></LI><LI>We will open a new tab, beside the S4 app that we are already logged-on and open the BTP app as well. On Enter, we are routed to the login page, with 2 options, default IDP and&nbsp;<SPAN>Cloud Identity Services&nbsp;</SPAN>IDP. We will choose the&nbsp;<SPAN>Cloud Identity Services</SPAN> IDP for login.<BR /><BR /><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="cvsabhishek_5-1715150455282.png" style="width: 668px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/107260i44C5549862ED7457/image-dimensions/668x278?v=v2" width="668" height="278" role="button" title="cvsabhishek_5-1715150455282.png" alt="cvsabhishek_5-1715150455282.png" /></span><BR /><P>&nbsp;</P><BR />Lo and Behold!! We are logged in, without entering any more credentials.<BR /><BR /><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="cvsabhishek_4-1715150346733.png" style="width: 670px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/107257i85062082102910AA/image-dimensions/670x382?v=v2" width="670" height="382" role="button" title="cvsabhishek_4-1715150346733.png" alt="cvsabhishek_4-1715150346733.png" /></span><P>&nbsp;</P></LI></OL> 2024-05-08T17:48:21.660000+02:00 https://community.sap.com/t5/technology-blogs-by-sap/identity-access-management-iam-reference-architectures-2024/ba-p/13697891 Identity Access Management (IAM) Reference Architectures 2024 2024-05-10T17:20:21.397000+02:00 1Gunnar https://community.sap.com/t5/user/viewprofilepage/user-id/11449 <H1 id="toc-hId-865442847"><STRONG>Identity Access Management Reference Architectures in 2024</STRONG></H1><P>We are happy to share with you that we just released an update to our reference architectures (2024 version).</P><P>The latest version is published in&nbsp;<A href="https://discovery-center.cloud.sap/refArchCatalog/?category=security" target="_self" rel="nofollow noopener noreferrer">SAP Discovery Center</A> along with further links to our documentation and to related missions. We want to support you trying out easily what we describe.</P><P>If you are new to this topic, consider reading my&nbsp;<A href="https://community.sap.com/t5/technology-blogs-by-sap/identity-lifecycle-sap-reference-architecture-for-identity-access/ba-p/13504029" target="_self">older blog post about Cloud leading Identity Lifecycle from 2021.</A>&nbsp;The 1st chapter is still valid to start with - although it's 3 years old <span class="lia-unicode-emoji" title=":slightly_smiling_face:">🙂</span></P><P data-unlink="true">We have an updated version of the <A href="https://support.sap.com/en/offerings-programs/support-services/security-optimization-services-portfolio.html?anchorId=section_1784311506" target="_self" rel="noopener noreferrer">SAP Secure Operations Map</A>&nbsp;which allows you to verify your security requirements and map them to the regional requirements like NIST or BSI.<BR />The Secure Operations Map contains in the application layer the three main IAM pillars that are now described in the SAP Discovery Center:</P><H3 id="toc-hId-927094780"><A href="https://discovery-center.cloud.sap/refArchDetail/ref-arch-cloud-leading-authentication" target="_self" rel="nofollow noopener noreferrer">Authentication flows</A></H3><H3 id="toc-hId-730581275"><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="[SAP Official]_SAP_Cloud_Leading_Authentication_L2.png" style="width: 400px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/110029iB2CEA4D6F70D5B65/image-size/medium?v=v2&amp;px=400" role="button" title="[SAP Official]_SAP_Cloud_Leading_Authentication_L2.png" alt="[SAP Official]_SAP_Cloud_Leading_Authentication_L2.png" /></span><BR /><A href="https://discovery-center.cloud.sap/refArchDetail/ref-arch-cloud-leading-identity-lifecycle-authorizations" target="_self" rel="nofollow noopener noreferrer">Authorization flows as part of the identity lifecycle</A></H3><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="[SAP-official]_SAP_Cloud_Identity_Services_Authorization_L1.png" style="width: 400px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/110031iA2E47F0A81B02F75/image-size/medium?v=v2&amp;px=400" role="button" title="[SAP-official]_SAP_Cloud_Identity_Services_Authorization_L1.png" alt="[SAP-official]_SAP_Cloud_Identity_Services_Authorization_L1.png" /></span></P><H2 id="toc-hId-404985051"><A href="https://discovery-center.cloud.sap/refArchDetail/ref-arch-cloud-leading-identity-lifecycle" target="_self" rel="nofollow noopener noreferrer">Identity Lifecycle flows</A></H2><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="[SAP Official]_SAP_Cloud_Identity_Services_Identity_Lifecycle_L1.png" style="width: 400px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/110027iF904C1A7D2C1D674/image-size/medium?v=v2&amp;px=400" role="button" title="[SAP Official]_SAP_Cloud_Identity_Services_Identity_Lifecycle_L1.png" alt="[SAP Official]_SAP_Cloud_Identity_Services_Identity_Lifecycle_L1.png" /></span></P><P>&nbsp;</P><P>Please read them and we can use this community to discuss.</P><P>If you want to know more about the SAP Cloud Identity Services I recommend <A href="https://community.sap.com/t5/technology-blogs-by-sap/sap-cloud-identity-services-why-and-how-to-integrate-them-for-a-consistent/ba-p/13560015" target="_self">this blog post</A>.</P><P>&nbsp;</P><P>PS: Yes, we are already working on an integrated architecture which considers SAP Access Control - but we need a bit more time.</P><P>&nbsp;</P> 2024-05-10T17:20:21.397000+02:00 https://community.sap.com/t5/human-capital-management-blogs-by-members/sso-sf-single-sign-on-for-sap-successfactors/ba-p/13697478 [SSO] [SF] (Single Sign-On) for SAP SuccessFactors 2024-05-11T06:44:44.370000+02:00 AhmedAranda https://community.sap.com/t5/user/viewprofilepage/user-id/154294 <UL><LI><FONT size="5"><STRONG><U>IAS Tenant preparation: Log onto Identity Authentication service</U></STRONG></FONT></LI></UL><OL><LI><STRONG>&nbsp;</STRONG>Navigate to Identity provisioning &gt; Source &gt; Properties &gt; sf.user.filter&nbsp; make it (active eq "true")</LI><LI>Navigate to Identity provisioning &gt; Source &gt; Outbound Certificates and make sure that the certificate is valid, if not generate a new one and delete the old one and activate the automatic generation</LI><LI>Go to Identity provisioning &gt; Target &gt; Outbound Certificates and make sure that the certificate is valid, if not generate a new one and delete the old one and activate the automatic generation</LI></OL><P>Note: If the IAS tenant links were not provided from SAP, you can activate from the Upgrade Center, and after completing the configuration, testing and activation will be done again from the Upgrade Center</P><UL><LI><FONT size="5"><STRONG><U>Created trust between Azure Active Directory and Identity Authentication service</U></STRONG></FONT></LI></UL><P><STRONG>Step 1: Download Identity Authentication service tenant metadata</STRONG></P><P>Navigate to Applications and resources &gt; Tenant Setting &gt; Single Sign-On &gt; SAML 2.0 Configuration and download the IAS Meta data file</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2024-05-11 065825.png" style="width: 400px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/108926iF5BD30107BA3D0E5/image-size/medium?v=v2&amp;px=400" role="button" title="Screenshot 2024-05-11 065825.png" alt="Screenshot 2024-05-11 065825.png" /></span></P><P>Download&nbsp;the metadata file.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2024-05-11 065937.png" style="width: 400px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/108927i75280C3C146197FB/image-size/medium?v=v2&amp;px=400" role="button" title="Screenshot 2024-05-11 065937.png" alt="Screenshot 2024-05-11 065937.png" /></span></P><P><STRONG>Step 2: Create enterprise application in Azure Active Directory</STRONG></P><P>Navigate to the Enterprise applications, Click&nbsp;New application.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot (267).png" style="width: 400px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/108939i857C350E39AA0B7C/image-size/medium?v=v2&amp;px=400" role="button" title="Screenshot (267).png" alt="Screenshot (267).png" /></span></P><P>Azure Active Directory has templates for a variety of applications, one of them is the SAP Cloud Platform Identity Authentication Service.&nbsp;Search&nbsp;for this and select it.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot (269).png" style="width: 400px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/108940iC01880ECFF32656F/image-size/medium?v=v2&amp;px=400" role="button" title="Screenshot (269).png" alt="Screenshot (269).png" /></span></P><P>A new column on the right side will appear to give the application a name. Give the application a name and click&nbsp;Add.</P><P><FONT size="3">Go to&nbsp;Single sign-on&nbsp;and select&nbsp;SAML&nbsp;as Single-Sign On method.</FONT></P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot (270).png" style="width: 400px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/108941i11A6EC811D8C987A/image-size/medium?v=v2&amp;px=400" role="button" title="Screenshot (270).png" alt="Screenshot (270).png" /></span></P><P> <span class="lia-inline-image-display-wrapper lia-image-align-left" image-alt="Screenshot (271).png" style="width: 400px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/108942i34B2A8D9FFC3D306/image-size/medium?v=v2&amp;px=400" role="button" title="Screenshot (271).png" alt="Screenshot (271).png" /></span></P><P>&nbsp;</P><P>&nbsp;</P><P>&nbsp;</P><P>&nbsp;</P><P><STRONG>STEP 3: Upload the IAS tenant metadata file you get from the step 1&nbsp;</STRONG></P><P>Select the application you just created, Click&nbsp;Upload metadata&nbsp;to upload the metadata file from Identity Authentication service.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot (273).png" style="width: 400px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/108947i3EBB679C78AEF1AA/image-size/medium?v=v2&amp;px=400" role="button" title="Screenshot (273).png" alt="Screenshot (273).png" /></span></P><P>All the details are now taken from the metadata file. There’s nothing to do for you other than saving the details. Therefore, click&nbsp;Save.</P><P><STRONG>STEP 4: Download single sign-on metadata from Azure Active Directory</STRONG></P><P>Download the federation metadata as shown below.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="aranda_12-1715334222762.png" style="width: 400px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/108548iC740874D16E66A3B/image-size/medium?v=v2&amp;px=400" role="button" title="aranda_12-1715334222762.png" alt="aranda_12-1715334222762.png" /></span></P><P>With this information we can setup the trust between Azure Active Directory and Identity Authentication service.</P><P><STRONG>Step 5: Create corporate identity provider in IAS</STRONG></P><P>Go back to IAS and navigate to Identity provider &gt; Create &gt; Microsoft ADFS / Entra AD (SAML 2.0) Type</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ssd.png" style="width: 400px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/108944i395853CA96A7E75D/image-size/medium?v=v2&amp;px=400" role="button" title="ssd.png" alt="ssd.png" /></span></P><P> <span class="lia-inline-image-display-wrapper lia-image-align-left" image-alt="aranda_14-1715334222768.png" style="width: 400px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/108550i316E778C466E734A/image-size/medium?v=v2&amp;px=400" role="button" title="aranda_14-1715334222768.png" alt="aranda_14-1715334222768.png" /></span></P><P>&nbsp;</P><P>&nbsp;</P><P>&nbsp;</P><P>&nbsp;</P><P>&nbsp;</P><P>&nbsp;</P><P>&nbsp;</P><P><STRONG>STEP 6: Upload Azure Active Directory federation metadata file</STRONG></P><P>Click&nbsp;SAML 2.0 Configuration&nbsp;and to upload the recently downloaded federation metadata from Azure Active Directory.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="aranda_15-1715334222777.png" style="width: 400px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/108552i8A6F9F6E33C3BC8E/image-size/medium?v=v2&amp;px=400" role="button" title="aranda_15-1715334222777.png" alt="aranda_15-1715334222777.png" /></span></P><P>Choose the file from your local file system.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="aranda_16-1715334222782.png" style="width: 400px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/108551iC47F5399986D9CB9/image-size/medium?v=v2&amp;px=400" role="button" title="aranda_16-1715334222782.png" alt="aranda_16-1715334222782.png" /></span></P><P>All fields below are automatically going to be filled due to the information provided through the uploaded file.</P><P>Click&nbsp;Save&nbsp;at the top of the page.</P><P><STRONG>STEP 6: Add a new user in the Users and groups Microsoft Azure application</STRONG></P><P data-unlink="true">Go back to your&nbsp;overview of enterprise applications&nbsp;in Microsoft Azure AD and click your application. Add a new user by clicking&nbsp;<STRONG>Add user</STRONG>&nbsp;in the&nbsp;<STRONG>Users and groups</STRONG>&nbsp;submenu, as shown on the screenshot.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="aranda_17-1715334222788.png" style="width: 400px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/108553iDE382E1C645AC867/image-size/medium?v=v2&amp;px=400" role="button" title="aranda_17-1715334222788.png" alt="aranda_17-1715334222788.png" /></span></P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="aranda_18-1715334222793.png" style="width: 400px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/108554i5A8199C61BFFF2BA/image-size/medium?v=v2&amp;px=400" role="button" title="aranda_18-1715334222793.png" alt="aranda_18-1715334222793.png" /></span></P><P>By hitting the result tile, you select the user, which should appear under&nbsp;Selected members&nbsp;panel. Finish your user assignment with clicks on&nbsp;<STRONG>Select</STRONG>&nbsp;and&nbsp;<STRONG>Assign</STRONG>.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="aranda_19-1715334222799.png" style="width: 400px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/108555i40CE7E86C27A151A/image-size/medium?v=v2&amp;px=400" role="button" title="aranda_19-1715334222799.png" alt="aranda_19-1715334222799.png" /></span></P><P>Congrats Now you created trust between Azure Active Directory and Identity Authentication service.</P><UL><LI><FONT size="5"><STRONG><U>IAS Tenant Final Preparation: </U></STRONG></FONT></LI></UL><P>Navigate to Identity provisioning &gt; Source &gt; Jobs and run now read job to get all users from SF then schedule the job for future new hires.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2024-05-10 120631.png" style="width: 400px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/108930iBAF78458541D5C1A/image-size/medium?v=v2&amp;px=400" role="button" title="Screenshot 2024-05-10 120631.png" alt="Screenshot 2024-05-10 120631.png" /></span></P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2024-05-10 120828.png" style="width: 400px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/108931i2301BDF299D8E755/image-size/medium?v=v2&amp;px=400" role="button" title="Screenshot 2024-05-10 120828.png" alt="Screenshot 2024-05-10 120828.png" /></span></P><P>Navigate to Applications and resources &gt; Applications &gt; SuccessFactors &gt; Conditional Authentication and create a rule for all domains you need it to access the system from the identity provider you created... this step will define the domains witch will access as SSO, any other domain will access from the default identity provider.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="aranda_22-1715334222816.png" style="width: 400px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/108559i7F07FB07C5ED3FF8/image-size/medium?v=v2&amp;px=400" role="button" title="aranda_22-1715334222816.png" alt="aranda_22-1715334222816.png" /></span></P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2024-05-10 121953.png" style="width: 400px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/108932i14F69134B531ADFC/image-size/medium?v=v2&amp;px=400" role="button" title="Screenshot 2024-05-10 121953.png" alt="Screenshot 2024-05-10 121953.png" /></span></P><P>Set the Default Identity Provider as Identity Authentication.</P><P>Navigate to Identity provider &gt; Identity Federation &gt; switch On Use Identity Authentication user store and Switch On User Access</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="aranda_24-1715334222826.png" style="width: 400px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/108560iD12AF981EB601304/image-size/medium?v=v2&amp;px=400" role="button" title="aranda_24-1715334222826.png" alt="aranda_24-1715334222826.png" /></span></P><P>Now you can test and be sure that the user you are try to test with is already added to the SF tenant.</P><P>Hope you enjoy the process.</P><P>Thanks</P><P>Ahmed Aranda&nbsp;</P> 2024-05-11T06:44:44.370000+02:00 https://community.sap.com/t5/technology-blogs-by-sap/configuration-sap-business-network-sso-with-sap-cloud-identity-services/ba-p/13699090 Configuration: SAP Business Network SSO with SAP Cloud Identity Services - Identity Authentication 2024-05-15T16:02:00.238000+02:00 ondrej_pandoscak https://community.sap.com/t5/user/viewprofilepage/user-id/266513 <P>See as well:&nbsp;</P><UL><LI><A href="https://community.sap.com/t5/technology-blogs-by-sap/summary-sap-ariba-sso-with-sap-cloud-identity-services-identity/ba-p/13665845" target="_self"><SPAN>Summary: SAP Ariba SSO with SAP Cloud Identity Services - Identity Authentication</SPAN></A></LI><LI><A href="https://community.sap.com/t5/technology-blogs-by-sap/overview-sap-ariba-sso-with-sap-cloud-identity-services-identity/ba-p/13665483" target="_self">Overview:&nbsp;SAP Ariba SSO with SAP Cloud Identity Services - Identity Authentication</A></LI></UL><P><STRONG>Table of Contents:</STRONG></P><UL class="lia-list-style-type-circle"><LI>SAP Business Network Single Sign-On (SSO) Overview<UL><LI>SAP Business Network Access<UL><LI>SAP Business Network Credentials Access (SSO Disabled)</LI><LI>SAP Business Network SSO Access</LI><LI>SAP Business Network SSO Access via IdP-Initiated URL</LI><LI>SAP Business Network SSO &amp; Credentials Access</LI></UL></LI></UL></LI><LI>SAP Business Network Single Sign-On (SSO) Setup<UL><LI>SAP IAS SAML Metadata Retrieval</LI><LI>SAP Business Network SAML Metadata Retrieval</LI><LI>SAP IAS SAML Authentication Configuration</LI><LI>SAP Business Network User Configuration</LI><LI>SAP Business Network SAML Authentication Configuration (non-self-service)</LI></UL></LI></UL><H1 id="toc-hId-865494740">SAP Business Network Single Sign-On Overview</H1><P><STRONG>Note:</STRONG>&nbsp;Single Sign-On (SSO) is supported only for <STRONG>SAP Business Network</STRONG> <STRONG>Buyer</STRONG> access (<STRONG>SAP Business Network</STRONG> <STRONG>Supplier</STRONG> access is not supported).</P><H2 id="toc-hId-798063954">SAP Business Network Access</H2><P><STRONG>SAP Business Network</STRONG> can be accessed via <A href="https://service.ariba.com" target="_blank" rel="noopener nofollow noreferrer">https://service.ariba.com</A>&nbsp;</P><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="SBN_Access.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/109385iEEC62B3B3D133773/image-size/large?v=v2&amp;px=999" role="button" title="SBN_Access.png" alt="SBN_Access.png" /></span></P><P>&nbsp;To access <STRONG>SAP Business Network</STRONG> as <STRONG>Buyer</STRONG>, navigate to <STRONG>[Buyer]</STRONG> button or directly navigate to&nbsp;<A href="https://service.ariba.com/Buyer.aw" target="_blank" rel="noopener nofollow noreferrer">https://service.ariba.com/Buyer.aw</A>&nbsp;</P><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="SBN_Buyer_Access.png" style="width: 875px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/109387iF97896113B20D519/image-size/large?v=v2&amp;px=999" role="button" title="SBN_Buyer_Access.png" alt="SBN_Buyer_Access.png" /></span></P><P>&nbsp;</P><P>To access the <STRONG>SAP Business Network</STRONG> as <STRONG>Buyer</STRONG>, enter the <STRONG>Buyer</STRONG> user login name and hit <STRONG>[Next]</STRONG>. Based on the <STRONG>SAP Business Network Buyer</STRONG> account SSO setup, one of below login screens will appear.</P><P><STRONG><SPAN>SAP Business Network Credentials Access (SSO Disabled)</SPAN></STRONG></P><P><SPAN>In case <STRONG>SAP Business Network</STRONG> Single Sign-on (SSO) for <STRONG>Buyer</STRONG>&nbsp;account is disabled, login screen to enter the <STRONG>SAP Business Network</STRONG> <U>password</U> is displayed.</SPAN></P><P><SPAN><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="SBN_Buyer_Access_NoSSO.png" style="width: 866px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/109394i2DCB3738A072D205/image-size/large?v=v2&amp;px=999" role="button" title="SBN_Buyer_Access_NoSSO.png" alt="SBN_Buyer_Access_NoSSO.png" /></span></SPAN></P><P><STRONG><SPAN>SAP Business Network SSO Access</SPAN></STRONG></P><P><SPAN>In case <STRONG>SAP Business Network</STRONG> Single Sign-on (SSO) for <STRONG>Buyer</STRONG>&nbsp;account is enabled with&nbsp;<STRONG>SAP Business Network&nbsp;</STRONG>credentials access is disabled, configured SSO login screen to enter the SSO credentials is&nbsp;displayed (e.g. the SAP IAS login screen in case the SSO is configured with SAP IAS).</SPAN></P><P><SPAN><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="SBN_Buyer_Access_SSO.png" style="width: 501px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/109424i663B2A90C2E8234C/image-size/large?v=v2&amp;px=999" role="button" title="SBN_Buyer_Access_SSO.png" alt="SBN_Buyer_Access_SSO.png" /></span></SPAN></P><P><STRONG><SPAN>SAP Business Network SSO Access via IdP-Initiated URL</SPAN></STRONG></P><P>With the assumption that the <STRONG>SAP Business Network</STRONG> SSO is enabled with <STRONG>SAP IAS</STRONG> <U>as per this blog instructions</U>, you can access <STRONG>SAP Business Network</STRONG> instead of&nbsp;<A href="https://service.ariba.com" target="_blank" rel="noopener nofollow noreferrer">https://service.ariba.com</A>&nbsp;link, by following the IdP-Initiated URL:</P><UL><LI>https://&lt;SAP IAS tenant&nbsp;&nbsp;id&gt;.<SPAN>accounts.ondemand.com</SPAN><SPAN>/saml2/idp/sso?sp=ANxxxxxxxxxxx-T&amp;index=1</SPAN></LI></UL><P>Using this approach, you can skip one step, which is providing the <STRONG>SAP Business Network</STRONG> user id and login directly within your <STRONG>SAP IAS</STRONG> login credentials.</P><P><STRONG><SPAN>SAP Business Network SSO &amp; Credentials Access</SPAN></STRONG></P><P><SPAN><SPAN>In case <STRONG>SAP Business Network</STRONG> Single Sign-on (SSO) for <STRONG>Buyer</STRONG>&nbsp;account is enabled together with&nbsp;<STRONG>SAP Business Network&nbsp;</STRONG>credentials access, login screen to enter the <STRONG>SAP Business Network</STRONG> <U>password</U> or [Sign in with SSO] choice is displayed.</SPAN></SPAN></P><P><SPAN><SPAN><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="SBN_Buyer_Access_SSO+Credentials.png" style="width: 892px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/109427i61437FA59F629C43/image-size/large?v=v2&amp;px=999" role="button" title="SBN_Buyer_Access_SSO+Credentials.png" alt="SBN_Buyer_Access_SSO+Credentials.png" /></span></SPAN></SPAN></P><H1 id="toc-hId-472467730">SAP Business Network Single Sign-On (SSO) Setup</H1><H2 id="toc-hId-405036944">SAP IAS SAML Metadata Retrieval</H2><P>To retrieve SAML Metadata from <STRONG>SAP IAS</STRONG>:</P><UL><LI>enter the below <A title="Export SAML 2.0 IdP Metadata from IAS" href="https://help.sap.com/docs/conversational-ai/integration-with-sap-s-4hana/export-saml-2-0-idp-metadata-from-ias" target="_blank" rel="noopener noreferrer"><STRONG>SAP IAS</STRONG> URL</A> into browser:<BR />https://&lt;SAP IAS tenant&nbsp;&nbsp;id&gt;.<SPAN>accounts.ondemand.com/saml2/metadata?action=download</SPAN></LI><LI>&nbsp;store the downloaded <STRONG>SAP IAS Metadata File</STRONG></LI></UL><H2 id="toc-hId-208523439">SAP Business Network SAML Metadata Retrieval</H2><P><STRONG>Note:</STRONG>&nbsp;Retrieval of SAP Business Network SAML Metadata is not self-service and needs to be requested via case opened against&nbsp;<SPAN><STRONG>SBN-AN-LOG</STRONG> component. This blog instructions are bypassing the <STRONG>SAP Business Network</STRONG> SAML Metadata retrieval and instead it provides manual steps of setting the <STRONG>SAP Business Network</STRONG> Buyer Account in <STRONG>SAP IAS</STRONG>.</SPAN></P><P>To retrieve the SAP Business Network signing certificate navigate to&nbsp;<A href="https://support.ariba.com/item/view/192337" target="_blank" rel="noopener nofollow noreferrer">https://support.ariba.com/item/view/192337</A>&nbsp;and download&nbsp;<STRONG>Current Certificate – RSA </STRONG>certificate for&nbsp;<SPAN><STRONG>service.ariba.com</STRONG> and store it as <STRONG>SAP Business Network Signing Certificate File</STRONG></SPAN></P><H2 id="toc-hId-12009934">SAP IAS SAML Authentication Configuration</H2><P><U>Prerequisites:</U></P><UL><LI><STRONG>SAP IAS</STRONG> user added as <STRONG>Administrator&nbsp;</STRONG>to SAP IAS (<STRONG>Users &amp; Authorizations</STRONG> -&gt; <STRONG>Administrators</STRONG> -&gt; <STRONG>[Add]</STRONG>)</LI><LI>Retrieve <STRONG>SAP Business Network</STRONG> Buyer Account ANId (e.g.&nbsp;<STRONG>ANxxxxxxxxxxx-T</STRONG>)<UL><LI>Replace&nbsp;<STRONG>xxxxxxxxxxx&nbsp;</STRONG>with your SAP Business Network Buyer Account AN Id</LI></UL></LI></UL><P><STRONG>Note:&nbsp;SAP Business Network</STRONG> SSO setup requires the IdP-Initiated SSO to be enabled in <STRONG>SAP IAS</STRONG>.</P><P>To enable IdP-Initiated SSO in <STRONG>SAP IAS</STRONG>:</P><UL><LI>enter the SAP <STRONG>IAS Administration Console</STRONG>&nbsp;via https://&lt;SAP IAS tenant&nbsp;&nbsp;id&gt;.<SPAN>accounts.ondemand.com/admin</SPAN></LI><LI>navigate to&nbsp;<STRONG>Application &amp; Resources</STRONG> -&gt;&nbsp;</LI><LI><STRONG>Application &amp; Resources</STRONG> -&gt;&nbsp;<STRONG>Tenant Settings&nbsp;</STRONG>-&gt; <STRONG>Single Sign-On</STRONG> -&gt;&nbsp;<STRONG><SPAN>IdP-Initiated SSO</SPAN></STRONG></LI></UL><P><STRONG><SPAN><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="IdP_InitiatedSSO.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/109975i96B0438E81D09A72/image-size/large?v=v2&amp;px=999" role="button" title="IdP_InitiatedSSO.png" alt="IdP_InitiatedSSO.png" /></span></SPAN></STRONG></P><P><STRONG>&nbsp;<span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="IdP_InitiatedSSO1.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/109992i0F798C01CB1965FB/image-size/large?v=v2&amp;px=999" role="button" title="IdP_InitiatedSSO1.png" alt="IdP_InitiatedSSO1.png" /></span></STRONG></P><P><STRONG>&nbsp;<SPAN>To configure </SPAN><STRONG>SAP IAS</STRONG><SPAN>&nbsp;SAML Authentication with </SPAN><STRONG>SAP Business Network</STRONG><SPAN>:</SPAN></STRONG></P><UL><LI>enter the SAP <STRONG>IAS Administration Console</STRONG>&nbsp;via https://&lt;SAP IAS tenant&nbsp;&nbsp;id&gt;.<SPAN>accounts.ondemand.com/admin</SPAN></LI><LI>navigate to <STRONG>Application &amp; Resources</STRONG> -&gt; <STRONG>Application&nbsp;</STRONG>-&gt; <STRONG>[Create]</STRONG> to create <A href="https://help.sap.com/docs/identity-authentication/identity-authentication/configuring-applications?version=Cloud" target="_blank" rel="noopener noreferrer">Application</A> for <STRONG>SAP Ariba</STRONG> as <STRONG>Service Provider</STRONG> (<STRONG>SP</STRONG>)<UL><LI>Enter the <STRONG>Display Name</STRONG>, choose <STRONG>SAP Ariba solution</STRONG> as <STRONG>Type</STRONG>, <STRONG>SAML 2.0</STRONG> as <STRONG>Protocol Type</STRONG> and hit <STRONG>[Create]</STRONG></LI></UL></LI></UL><P>&nbsp;</P><P><STRONG><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="ApplicationSBN.png" style="width: 400px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/110000i16A56620334DAB08/image-size/large?v=v2&amp;px=999" role="button" title="ApplicationSBN.png" alt="ApplicationSBN.png" /></span></STRONG></P><UL><LI>navigate to SAML 2.0 Configuration and enter:<UL><LI><STRONG>Name</STRONG> &lt;SAP Business Network Buyer Account AN Id&gt; (e.g. ANxxxxxxxxxxx-T)</LI><LI><STRONG>Assertion Consumer Service Endpoints</STRONG><UL><LI>Index 0: <A href="https://service.ariba.com/Buyer.aw/ad/relaySAML?anid=ANxxxxxxxxxxx-T" target="_blank" rel="noopener nofollow noreferrer">https://service.ariba.com/Buyer.aw/ad/relaySAML?anid=ANxxxxxxxxxxx-T</A></LI><LI>Index 1:&nbsp;<A href="https://service.ariba.com/Buyer.aw/ad/remoteLogin?anid=ANxxxxxxxxxxx-T" target="_blank" rel="noopener nofollow noreferrer">https://service.ariba.com/Buyer.aw/ad/remoteLogin?anid=ANxxxxxxxxxxx-T</A></LI></UL></LI><LI><DIV class=""><STRONG>Signing Certificate</STRONG></DIV><UL><LI>upload the downloaded&nbsp;<SPAN><STRONG>SAP Business Network Signing Certificate File</STRONG></SPAN></LI></UL></LI><LI><STRONG>Signing Options</STRONG><UL><LI><STRONG>Sign authentication responses</STRONG> -&gt; true</LI></UL></LI></UL></LI></UL><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="ApplicationSBN1.png" style="width: 474px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/110005i9E44604D9DB84B57/image-size/large?v=v2&amp;px=999" role="button" title="ApplicationSBN1.png" alt="ApplicationSBN1.png" /></span></P><P>&nbsp;</P><UL><LI>hit <STRONG>[Save]</STRONG></LI></UL><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="SAP IAS Config Save.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/92068i5727879C586D4A16/image-size/large?v=v2&amp;px=999" role="button" title="SAP IAS Config Save.png" alt="SAP IAS Config Save.png" /></span></P><UL><LI>&nbsp;navigate to <STRONG>Subject Name Identifier</STRONG> and set the <STRONG>Primary Attribute</STRONG> Value to <STRONG>Login Name&nbsp;</STRONG>and hit <STRONG>[Save]</STRONG></LI></UL><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="SAP IAS Subject Name Identifier.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/92072iE6FE24D2077F6F63/image-size/large?v=v2&amp;px=999" role="button" title="SAP IAS Subject Name Identifier.png" alt="SAP IAS Subject Name Identifier.png" /></span></P><P><STRONG>Note: Subject Name Identifier</STRONG> setting can vary based on the customer user setup in <STRONG>SAP IAS</STRONG>. The property chosen in the <STRONG>Subject Name Identifier</STRONG> in the user profile in <STRONG>SAP IAS</STRONG> shall hold the very same value as the&nbsp;<STRONG>Corporate Username</STRONG> of the user in <STRONG>SAP Business Network</STRONG>.</P><UL><LI>navigate to <STRONG>Users &amp; Authorizations</STRONG> -&gt; <STRONG>User Management</STRONG> -&gt; and specific user <STRONG>SAP IAS</STRONG>&nbsp;<STRONG>Login Name</STRONG> needs to match user <STRONG>SAP Ariba UniqueName</STRONG></LI></UL><P><STRONG>&nbsp;SAP IAS&nbsp;</STRONG>User Profile:<span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="SAP IAS User Profile.png" style="width: 986px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/92075iAD5074CBCF3D6EAC/image-size/large?v=v2&amp;px=999" role="button" title="SAP IAS User Profile.png" alt="SAP IAS User Profile.png" /></span></P><P><STRONG>&nbsp;SAP Business Network&nbsp;</STRONG>User Profile:</P><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="SBN User.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/110024i8FB5C4A34899DFD5/image-size/large?v=v2&amp;px=999" role="button" title="SBN User.png" alt="SBN User.png" /></span></P><P>&nbsp;</P><H2 id="toc-hId--184503571">SAP Business Network User Configuration</H2><P><STRONG>Note:</STRONG>&nbsp;</P><UL><LI>Navigate to <STRONG>SAP Business Network Buyer</STRONG> account <STRONG>Settings</STRONG> -&gt; <STRONG>Users</STRONG> -&gt; <STRONG>Manage Users</STRONG></LI></UL><P><STRONG><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="SBN Users.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/110019i662062D693F16E9A/image-size/large?v=v2&amp;px=999" role="button" title="SBN Users.png" alt="SBN Users.png" /></span></STRONG></P><UL><LI><STRONG>Actions </STRONG>-&gt;<STRONG> Edit </STRONG>-&gt;&nbsp;<STRONG>Corporate Username</STRONG></LI></UL><P><STRONG>&nbsp;<span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="SBN User.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/110026i910FCF5A56560EAF/image-size/large?v=v2&amp;px=999" role="button" title="SBN User.png" alt="SBN User.png" /></span></STRONG></P><H2 id="toc-hId--381017076"><SPAN>SAP Business Network SAML Authentication Configuration&nbsp;(non-self-service)</SPAN></H2><P><STRONG>Note:</STRONG> <STRONG>SAP Business Network</STRONG> Single Sign-On (SSO) configuration is not self-service and needs to be requested as per the instructions below.</P><P>Create case against&nbsp;<STRONG>SBN-AN-LOG</STRONG> component providing below details:</P><UL><LI><U><STRONG>SAP Business Network</STRONG> Buyer Account Id</U> (e.g.&nbsp;ANxxxxxxxxxxx-T)</LI><LI><U><STRONG>SAP IAS</STRONG> URL</U>&nbsp;https://&lt;SAP IAS tenant&nbsp;&nbsp;id&gt;.<SPAN>accounts.ondemand.com</SPAN></LI><LI><U><STRONG>SAP IAS Metadata File</STRONG></U></LI><LI><SPAN><U><STRONG>Disable SAP Business Network Login</STRONG></U><STRONG>: </STRONG>Yes/No</SPAN></LI><LI><SPAN><U><STRONG>SAP IAS</STRONG> User Profile field value for&nbsp;<STRONG>SAP IAS for&nbsp;</STRONG><STRONG>SAP Business Network</STRONG> Admin User</U> (e.g. I0****6 - this needs to match the SAP IAS user profile property value, which is set as Subject Name Identifier)</SPAN><UL><LI><SPAN><STRONG>SAP Business Network</STRONG> Admin User is not maintained in the list of the users in <STRONG>SAP Business Network</STRONG> and thus his&nbsp;<STRONG>Corporate Username&nbsp;</STRONG>cannot be set, therefore the <STRONG>SAP IAS</STRONG> Login Id shall be setup extra and passed as this setting</SPAN></LI></UL></LI></UL><P><SPAN>SAP personnel as part of the case execution will apply below setting in the <STRONG>SAP Business Network</STRONG>:</SPAN></P><UL><LI><SPAN>Assertion Issuer:&nbsp;<U><STRONG>SAP IAS</STRONG> URL</U>&nbsp;(e.g.&nbsp;</SPAN>https://&lt;SAP IAS tenant&nbsp;&nbsp;id&gt;.<SPAN>accounts.ondemand.com</SPAN></LI><LI><SPAN>Corporate User ID: <U><STRONG>SAP IAS</STRONG> User Profile field value for&nbsp;<STRONG>SAP IAS for&nbsp;</STRONG><STRONG>SAP Business Network</STRONG> Admin User</U>&nbsp;(e.g.&nbsp;I0****6)</SPAN></LI><LI><SPAN>Site Minder Affliate Name:&nbsp;<U><STRONG>SAP Business Network</STRONG> Buyer Account Id</U>&nbsp;<U>(</U>e.g.&nbsp;ANxxxxxxxxxxx-T<U>)</U></SPAN></LI><LI><SPAN>Get Assertion Service URL:&nbsp;</SPAN>https://&lt;SAP IAS tenant&nbsp;&nbsp;id&gt;.<SPAN>accounts.ondemand.com</SPAN><SPAN>/saml2/idp/sso?sp=&lt;<U><STRONG>SAP Business Network</STRONG> Buyer Account Id</U>&gt;&amp;index=1&nbsp;</SPAN><SPAN>(e.g. </SPAN>https://&lt;SAP IAS tenant&nbsp;&nbsp;id&gt;.<SPAN>accounts.ondemand.com</SPAN><SPAN>/saml2/idp/sso?sp=ANxxxxxxxxxxx-T&amp;index=1&nbsp;</SPAN></LI><LI><SPAN>Portal Query URL:&nbsp;</SPAN></LI><LI>https://&lt;SAP IAS tenant&nbsp;&nbsp;id&gt;.<SPAN>accounts.ondemand.com</SPAN><SPAN>/saml2/idp/sso?sp=&lt;<U><STRONG>SAP Business Network</STRONG> Buyer Account Id</U>&gt;&amp;index=1&nbsp;</SPAN><SPAN>(e.g. </SPAN>https://&lt;SAP IAS tenant&nbsp;&nbsp;id&gt;.<SPAN>accounts.ondemand.com</SPAN><SPAN>/saml2/idp/sso?sp=ANxxxxxxxxxxx-T&amp;index=1&nbsp;</SPAN></LI><LI><SPAN>Portal Login URL:&nbsp;</SPAN></LI><LI>https://&lt;SAP IAS tenant&nbsp;&nbsp;id&gt;.<SPAN>accounts.ondemand.com</SPAN><SPAN>/saml2/idp/sso?sp=&lt;<U><STRONG>SAP Business Network</STRONG> Buyer Account Id</U>&gt;&amp;index=1&nbsp;</SPAN><SPAN>(e.g. </SPAN>https://&lt;SAP IAS tenant&nbsp;&nbsp;id&gt;.<SPAN>accounts.ondemand.com</SPAN><SPAN>/saml2/idp/sso?sp=ANxxxxxxxxxxx-T&amp;index=1&nbsp;</SPAN></LI><LI><SPAN>Disable Manual Logon to AN:&nbsp;<U><STRONG>Disable SAP Business Network Login</STRONG></U></SPAN></LI><LI><SPAN>Certificate Store for Site Minder SSL: *.crt certificate extracted from </SPAN><U><STRONG>SAP IAS Metadata File</STRONG></U></LI></UL><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="SBN SSO Setup.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/111020i3318D60BC224C18D/image-size/large?v=v2&amp;px=999" role="button" title="SBN SSO Setup.png" alt="SBN SSO Setup.png" /></span></P><P>&nbsp;</P><P><SPAN>Once the instructions in opened case are executed, you have successfully configured the <STRONG>Single Sign-On</STRONG> (<STRONG>SSO</STRONG>) between <STRONG>SAP Business Network </STRONG>as <STRONG>Service Provider</STRONG> (<STRONG>SP</STRONG>) and <STRONG>SAP IAS</STRONG> as <STRONG>Identity Provider</STRONG> (<STRONG>IdP</STRONG>)!</SPAN></P><P>See as well:&nbsp;</P><UL><LI><A href="https://community.sap.com/t5/technology-blogs-by-sap/summary-sap-ariba-sso-with-sap-cloud-identity-services-identity/ba-p/13665845" target="_self"><SPAN>Summary: SAP Ariba SSO with SAP Cloud Identity Services - Identity Authentication</SPAN></A></LI><LI><A href="https://community.sap.com/t5/technology-blogs-by-sap/overview-sap-ariba-sso-with-sap-cloud-identity-services-identity/ba-p/13665483" target="_self">Overview:&nbsp;SAP Ariba SSO with SAP Cloud Identity Services - Identity Authentication</A></LI></UL> 2024-05-15T16:02:00.238000+02:00