https://raw.githubusercontent.com/ajmaradiaga/feeds/main/scmt/topics/Security-blog-posts.xmlSAP Community - Security2026-04-12T11:01:38.130633+00:00python-feedgenSecurity blog posts in SAP Communityhttps://community.sap.com/t5/artificial-intelligence-blogs-posts/leverage-ai-agents-in-enterprise-security/ba-p/14267632Leverage AI Agents in Enterprise Security2025-11-13T11:03:37.441000+01:00Prasanth_RJhttps://community.sap.com/t5/user/viewprofilepage/user-id/2218098<H1 id="toc-hId-1635657254"><STRONG>Leveraging AI Agents in Enterprise Security</STRONG></H1><P>As the world of cybersecurity evolves rapidly, the scale and sophistication of attacks are also increasing. Malicious actors are becoming smarter, and with the help of AI, the curation of attacks is advancing. Meanwhile, cybersecurity professionals struggle with alert fatigue and resource shortages. Traditional security tools, reliant on static rules and signature-based detection, are struggling to keep up. This has created a critical gap between the speed of attacks and the response capabilities of human security teams. To address this, enterprises require an advanced security platform that can think, learn, adapt, and respond intelligently.</P><H2 id="toc-hId-1568226468"><STRONG>Security Challenges</STRONG></H2><H3 id="toc-hId-1500795682">Large Alert Volumes (CVE)</H3><P>SIEMs and IDS systems generate thousands of alerts daily, making manual review nearly impossible. Many alerts are noise or false positives. The time to identify and contain a breach averages <STRONG>277 days</STRONG>, costing organizations millions.[1]</P><H3 id="toc-hId-1304282177">Zero-day Attack Vectors</H3><P>Zero-day vulnerabilities are unknown security flaws with no available patches. They are dangerous because attackers can exploit them before defenders have any chance to react.</P><H3 id="toc-hId-1107768672">Human Resource Limitations</H3><P>As environments scale, manual log analysis becomes infeasible. This leads to alert fatigue, causing critical threats to be missed.</P><H3 id="toc-hId-911255167">Blind Spots</H3><P>Complex environments often have limited visibility due to network and endpoint blind spots. Attackers exploit these gaps with tactics like zero-day exploits, ransomware, and social engineering.</P><H3 id="toc-hId-714741662">Delayed Response Time</H3><P>Even after detecting a threat, organizations may take hours or days to respond—significantly increasing damage.</P><H2 id="toc-hId-389145438"><STRONG>Current Implementation in HCM</STRONG></H2><P>Today’s processes rely heavily on traditional DevSecOps methods such as SAST, DAST, IDS/IPS, and vulnerability scanning. These tools are rule-based and require extensive manual review.</P><H3 id="toc-hId-321714652"><STRONG>Security Development & Operations Lifecycle</STRONG></H3><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ANMOL_AGARWAL31_1-1763028125571.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/339989iDBED379ED8C944C6/image-size/large?v=v2&px=999" role="button" title="ANMOL_AGARWAL31_1-1763028125571.png" alt="ANMOL_AGARWAL31_1-1763028125571.png" /></span></P><P> </P><P>Despite integration across the lifecycle, these tools still need significant manual effort and cross-team communication:</P><UL><LI><STRONG>SAST & DAST:</STRONG> More than 70% false positives requiring manual review.</LI><LI><STRONG>Security Controls:</STRONG> Manual remediation even for small changes.</LI><LI><STRONG>Secret Scanners:</STRONG> Find sensitive information in code repositories.</LI><LI><STRONG>CI/CD Automation:</STRONG> Pipeline-dependent, rule-based, requires continuous rule maintenance.</LI></UL><H3 id="toc-hId-125201147"><STRONG>HXM SIEM Process</STRONG></H3><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ANMOL_AGARWAL31_2-1763028177240.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/339990iEBEEC9B3E790F6BC/image-size/large?v=v2&px=999" role="button" title="ANMOL_AGARWAL31_2-1763028177240.png" alt="ANMOL_AGARWAL31_2-1763028177240.png" /></span></P><P> </P><UL><LI>Policy and Security Requirements: BISO</LI><LI>Tooling: SecOps</LI><LI>Response: App/Platform Ops</LI></UL><H2 id="toc-hId-146859280"><STRONG>AI Agents: Autonomous Security Analysts</STRONG></H2><P>An AI agent in cybersecurity is an autonomous system powered by LLMs, ML, and NLP. It perceives logs, network traffic, and user behavior; analyzes threats; and can take predefined actions—without constant human intervention.</P><H2 id="toc-hId--49654225"><STRONG>How AI Agents Work</STRONG></H2><P>AI agents perform multiple roles and can collaborate with other agents or external tools via APIs.</P><H3 id="toc-hId--539570737">Example Roles</H3><UL><LI><STRONG>Threat Hunting & Detection:</STRONG> Detect anomalies and zero-day attacks without rule dependency.</LI><LI><STRONG>Threat Analysis & Correlation:</STRONG> Reduce noise by correlating logs across systems.</LI><LI><STRONG>Automated Response & Patching:</STRONG> Quarantine devices, revoke access, or roll back systems.</LI><LI><STRONG>Forensics:</STRONG> Trace attack origins and impacts.</LI><LI><STRONG>Proactive & Predictive Defense:</STRONG> Identify misconfigurations and predicted attack vectors.</LI></UL><H2 id="toc-hId--442681235"><STRONG>AI Agent Development Frameworks</STRONG></H2><UL><LI><STRONG>LangChain:</STRONG> For multi-step LLM workflows integrating reasoning and tool usage.</LI><LI><STRONG>AutoGen:</STRONG> Microsoft’s framework for multi-agent collaboration.</LI><LI><STRONG>CrewAI:</STRONG> Role-based multi-agent orchestration framework.</LI></UL><H2 id="toc-hId--639194740"><STRONG>What Gaps Can AI Close?</STRONG></H2><H3 id="toc-hId--1129111252">Advanced Threat Detection</H3><P>AI agents detect unknown threats using unsupervised learning, closing gaps in rule-based security tools.</P><H3 id="toc-hId--1325624757">Anomaly Detection & Behavior Analysis</H3><P>Agents establish baseline behavior and flag deviations—catching stealthy attacks that evade traditional detection.</P><H3 id="toc-hId--1522138262">Zero-Day Vulnerability Detection</H3><P>Agents analyze behavior patterns to detect zero-day attacks earlier, giving analysts time to respond.</P><H3 id="toc-hId--1718651767">Real-Time Threat Detection</H3><P>AI filters large SIEM/IDS data streams and reduces false positives, allowing analysts to focus on high-impact events.</P><H3 id="toc-hId--1915165272">Social Engineering & AI-driven Phishing</H3><P>Agents analyze email content, sender reputation, and context to detect highly realistic phishing attempts.</P><H3 id="toc-hId--1943495086">Automating Routine Investigations</H3><P>Agents continuously scan for IOCs and ensure compliance without manual audits.</P><H3 id="toc-hId--2140008591">Incident Response Automation</H3><P>Once a threat is confirmed, agents execute predefined actions such as blocking IPs or isolating endpoints.</P><H2 id="toc-hId--2043119089"><STRONG>Real-World Use Cases</STRONG></H2><UL><LI><STRONG>Microsoft Security Copilot:</STRONG> Phishing triage and vulnerability remediation.[2]</LI><LI><STRONG>CrowdStrike Charlotte AI:</STRONG> Doubles detection triage speed and reduces computational load by 50%.[3]</LI><LI><STRONG>360 Security Agent:</STRONG> Identified and analyzed an APT in 1 minute.[4]</LI><LI><STRONG>Darktrace Antigena:</STRONG> Real-time autonomous device isolation.[5]</LI></UL><P>AI agent adoption spans:</P><UL><LI><STRONG>SOAR platforms</STRONG></LI><LI><STRONG>SOCs</STRONG></LI><LI><STRONG>Endpoint security</STRONG></LI><LI><STRONG>Cloud security</STRONG></LI></UL><H2 id="toc-hId-2055334702"><STRONG>Challenges & Responsible Deployment</STRONG></H2><UL><LI><STRONG>Hallucinations:</STRONG> LLMs may generate incorrect insights.</LI><LI><STRONG>Adversarial Attacks:</STRONG> Agents may be vulnerable to prompt injection or model poisoning.</LI><LI><STRONG>Data Privacy Risks:</STRONG> Continuous monitoring must comply with regulations.</LI><LI><STRONG>Need for Human Oversight:</STRONG> Ethical or critical decisions require human judgment.</LI></UL><P>Responsible deployment requires red-teaming, runtime guardrails, confidential computing, and human-in-the-loop workflows.</P><H2 id="toc-hId-1858821197"><STRONG>Conclusion</STRONG></H2><P>The cybersecurity gap—driven by complex threats and limited human capacity—is one of the biggest challenges of our digital era. AI agents provide unprecedented scale, speed, and intelligence, transforming security from reactive to proactive. With thoughtful governance, AI agents help organizations stay ahead of threats and build a safer digital ecosystem.</P><H3 id="toc-hId-1368904685"><STRONG>References</STRONG></H3><OL><LI>Multi-AI Agent Security Technology (folio3.ai)</LI><LI>Microsoft Security Copilot (windowsnew.ai)</LI><LI>How AI Agents Improve Cybersecurity (nvidia.com)</LI><LI>360 AI Agents – Tencent</LI><LI>Multi-AI Agent Security Technology (foli3.ai)</LI></OL>2025-11-13T11:03:37.441000+01:00https://community.sap.com/t5/technology-blog-posts-by-sap/project-foxhound-on-the-scent-of-client-side-web-vulnerabilities/ba-p/14272605Project Foxhound - on the Scent of Client-Side Web Vulnerabilities2025-11-19T11:10:41.188000+01:00Fempelhttps://community.sap.com/t5/user/viewprofilepage/user-id/10046<P><SPAN class=""><SPAN class=""><span class="lia-inline-image-display-wrapper lia-image-align-left" image-alt="logo_foxhound.png" style="width: 200px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/342623i26737B2381B0CC35/image-size/small?v=v2&px=200" role="button" title="logo_foxhound.png" alt="logo_foxhound.png" /></span>In this article</SPAN><SPAN class="">,</SPAN><SPAN class=""> we show how the open-source </SPAN></SPAN><A href="https://github.com/SAP/project-foxhound" target="_blank" rel="noopener noreferrer nofollow">Project Foxhound</A><SPAN class=""><SPAN class=""> has evolved </SPAN><SPAN class="">from its </SPAN><SPAN class="">academic </SPAN><SPAN class="">roots </SPAN><SPAN class="">t</SPAN><SPAN class="">o become </SPAN><SPAN class="">the </SPAN></SPAN><A class="" href="https://www.dais.unive.it/~calzavara/papers/www25.pdf" target="_blank" rel="noreferrer noopener nofollow"><SPAN class=""><SPAN class="">best tool</SPAN></SPAN></A><SPAN class=""><SPAN class=""> for discovering client-side security </SPAN><SPAN class="">vulnerabilities. </SPAN></SPAN></P><P><SPAN class=""><SPAN class=""><SPAN class=""><SPAN class="">The most recent </SPAN><SPAN class="">development on this journey is that </SPAN><SPAN class="">Foxhound </SPAN><SPAN class="">was</SPAN><SPAN class=""> selected to appear as part of </SPAN></SPAN><A class="" href="https://www.blackhat.com/eu-25/arsenal/schedule/#project-foxhound-48440" target="_blank" rel="noreferrer noopener nofollow"><SPAN class=""><SPAN class="">Black Hat Arsenal</SPAN><SPAN class=""> 2025</SPAN></SPAN></A><SPAN class=""><SPAN class=""> in London in December! If you are attending the conference, be sure to check out our demo, where we are hoping to reveal some exciting new features and integrations!</SPAN></SPAN><SPAN class=""> </SPAN></SPAN></SPAN></P><H4 id="toc-hId-2023679887"> </H4><H4 id="toc-hId-1827166382"><SPAN class=""><SPAN class=""><SPAN class=""><SPAN class=""><SPAN class="">Background</SPAN></SPAN></SPAN></SPAN></SPAN></H4><P><SPAN>The world-wide-web is one of the most pervasive innovations of the modern age, underpinning communications, banking, education and business. However, programming flaws or misconfigurations can cause security vulnerabilities, exposing the systems and their data to malicious attackers. According to a recent report from IBM, the </SPAN><A href="https://www.ibm.com/reports/data-breach" target="_blank" rel="noopener nofollow noreferrer"><SPAN>average cost</SPAN></A><SPAN> of a Cybersecurity data breach is $4.4M.</SPAN><SPAN> </SPAN></P><P><SPAN>In recent years, web applications have seen a paradigm shift from on-premise, monolithic server applications, to heterogeneous collections of cloud-based microservices. As such, much of the application logic has shifted from the server to the client, with program logic running as JavaScript code in a user's browser. This shift has brought with it new classes of client-side (or DOM-based) web vulnerabilities, for example:</SPAN><SPAN> </SPAN></P><UL class="lia-list-style-type-disc"><LI><SPAN>Client-Side Cross-Site Scripting (XSS)</SPAN><SPAN> </SPAN></LI><LI><SPAN>Client-Side Cross-Site Request Forgery (CSRF)</SPAN><SPAN> </SPAN></LI><LI><SPAN>Request Hijacking</SPAN><SPAN> </SPAN></LI><LI><SPAN>Markup Injection</SPAN><SPAN> </SPAN></LI></UL><P><SPAN>Most state-of-the-art tools, however, are still focused on detection of their server-side counterparts (such as reflected XSS). Hunting for client-side issues, remains a manual effort, requiring time-intensive and costly penetration tests.</SPAN><SPAN> </SPAN></P><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="image (8).png" style="width: 729px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/342604i0E33F8E07828D261/image-dimensions/729x189?v=v2" width="729" height="189" role="button" title="image (8).png" alt="image (8).png" /></span></P><P><EM> Figure 1: JavaScript vulnerable to client-side XSS</EM></P><H4 id="toc-hId-1630652877"> </H4><H4 id="toc-hId-1434139372"><SPAN><SPAN class="">Project </SPAN><SPAN class="">Foxhound</SPAN></SPAN></H4><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="foxhound quote.png" style="width: 651px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/342600i4D673F5B9208373D/image-dimensions/651x250?v=v2" width="651" height="250" role="button" title="foxhound quote.png" alt="foxhound quote.png" /></span></P><P><SPAN class="">This is </SPAN><SPAN class="">where project</SPAN><SPAN class=""> Foxhound come</SPAN><SPAN class="">s</SPAN><SPAN class=""> in </SPAN><SPAN class="">–</SPAN> <SPAN class="">providing </SPAN><SPAN class="">a state-of-the-art</SPAN><SPAN class=""> framework for the detection of client-side web application vulnerabilities. It has seen a wide range of proven </SPAN><SPAN class="">use-cases</SPAN><SPAN class="">, from academic studies to industrial-scale dynamic testing and even education.</SPAN></P><H4 id="toc-hId-1237625867"><STRONG><SPAN class=""><SPAN class=""><SPAN class=""><SPAN class="">Features</SPAN></SPAN></SPAN></SPAN></STRONG></H4><P><SPAN>Foxhound is a modified web browser based on Firefox with the following enhancements:</SPAN><SPAN> </SPAN></P><UL class="lia-list-style-type-disc"><LI><SPAN>An instrumented JavaScript engine and content model to track insecure data-flows using dynamic taint-tracking. </SPAN><SPAN> </SPAN></LI><LI><SPAN>Taint tracking makes it possible to automatically detect client-side vulnerabilities by </SPAN><I><SPAN>tainting</SPAN></I><SPAN> certain attacker-controlled strings, e.g., </SPAN><SPAN>location.hash</SPAN><SPAN>, and notifying the user when tainted data reaches a sensitive sink, e.g., </SPAN><SPAN>eval()</SPAN><SPAN> or </SPAN><SPAN>.innerHTML</SPAN><SPAN>.</SPAN><SPAN> </SPAN></LI><LI><SPAN>Foxhound also tracks a history of operations performed on the string at runtime, allowing automatic detection of potential input sanitization which essentially reduces false positives.</SPAN><SPAN> </SPAN></LI><LI><SPAN>Integration with popular browser automation frameworks, such as Selenium and Playwright. </SPAN><SPAN> </SPAN></LI></UL><H4 id="toc-hId-1041112362"><SPAN><SPAN class=""><SPAN class="">History</SPAN></SPAN><SPAN class=""> </SPAN></SPAN></H4><P><SPAN>The technology for Foxhound was conceived at SAP Security Research </SPAN><A href="https://swag.cispa.saarland/papers/lekies2013flows.pdf" target="_blank" rel="noopener nofollow noreferrer"><SPAN>back in 2013</SPAN></A><SPAN>, where it was successfully used to discover that at least 10% of web applications are vulnerable to cross-site scripting. This paper spawned multiple follow-ups, with many research groups implementing their own instrumented browsers, which is not a trivial task!</SPAN><SPAN> </SPAN></P><P><SPAN>We saw the need in the community for an open-source, up-to-date tool for teams to use as a platform for their own research. This gap was the main inspiration to open-source our implementation, which was released in 2022 – and Foxhound was born! </SPAN><SPAN> </SPAN></P><P><SPAN>Since then, the Foxhound community has grown from the initial founders at SAP and the <A href="https://www.tu-braunschweig.de/en/ias" target="_self" rel="nofollow noopener noreferrer">University of Braunschweig</A> and is currently in use by groups at CISPA (Germany), Waterloo (Canada), and Venice (Italy). With the support of the SAP Open Source team, the project has evolved and matured, appearing in podcasts, at conferences, and even has a new logo!</SPAN><SPAN> </SPAN></P><P><SPAN>Foxhound has also proven its worth in industry, with SAP using it to dynamically test UI5 applications since 2023 as part of the </SPAN><A href="https://www.csoonline.com/article/3541180/sap-se-revamps-application-security-scanning-using-simulation-and-automation-2.html" target="_blank" rel="noopener nofollow noreferrer"><SPAN>award-winning FioriDAST tool</SPAN></A><SPAN>.</SPAN><SPAN> </SPAN></P><H4 id="toc-hId-844598857"><SPAN><SPAN class=""><SPAN class="">Why Foxhound?!</SPAN></SPAN><SPAN class=""> </SPAN></SPAN></H4><P><SPAN>Foxhound offers several advantages over existing tools and techniques to outperform the competition. Firstly, as Foxhound uses dynamic testing, it benefits from lower false positives and higher accuracy compared to static analysis techniques. Secondly, Foxhound is non-invasive and does not require actively probing an application with potentially harmful and inaccurate payloads.</SPAN><SPAN> </SPAN></P><P><SPAN>In fact, </SPAN><A href="https://www.dais.unive.it/~calzavara/papers/www25.pdf" target="_blank" rel="noopener nofollow noreferrer"><SPAN>a recent independent academic study</SPAN></A><SPAN> found that Foxhound was the best tool for dynamic JavaScript analysis. To quote the paper: </SPAN><I><SPAN>"the only effective solution given the current state of the art is Project Foxhound."</SPAN></I><SPAN> </SPAN></P><P><SPAN><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="undefined.png" style="width: 903px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/342602i30D606B450364532/image-size/large?v=v2&px=999" role="button" title="undefined.png" alt="undefined.png" /></span></SPAN></P><P><EM> <SPAN class=""><SPAN class="">Figure </SPAN></SPAN><SPAN class=""><SPAN class=""><SPAN class="">2</SPAN></SPAN></SPAN><SPAN class=""><SPAN class="">: Foxhound hard at work detecting </SPAN><SPAN class="">a cross-site scripting vulnerability at </SPAN></SPAN><A class="" href="https://domgo.at/" target="_blank" rel="noreferrer noopener nofollow"><SPAN class=""><SPAN class="">https://domgo.at</SPAN></SPAN></A><SPAN class=""><SPAN class=""> </SPAN></SPAN><SPAN class=""> </SPAN></EM></P><H4 id="toc-hId-648085352"> </H4><H4 id="toc-hId-451571847"><SPAN><SPAN class=""><SPAN class="">Find out More</SPAN></SPAN><SPAN class=""> </SPAN></SPAN></H4><P><SPAN>The next opportunity to experience Foxhound live and meet the team in person will be at </SPAN><A href="https://www.blackhat.com/eu-25/arsenal/schedule/#project-foxhound-48440" target="_blank" rel="noopener nofollow noreferrer"><SPAN>Black Hat Europe</SPAN></A><SPAN>, where Foxhound has been selected to appear as part of the Arsenal program. So be sure to pass by our booth to check out the latest features!</SPAN><SPAN> </SPAN></P><P><SPAN>If you can’t make it to Black Hat, but are still interested in the project, check out the following links:</SPAN><SPAN> </SPAN></P><UL><LI><SPAN>The best place to find out more is on our </SPAN><A href="https://github.com/SAP/project-foxhound" target="_blank" rel="noopener nofollow noreferrer"><SPAN>GitHub repository</SPAN></A><SPAN> where we also manage development via issues and pull requests and actions.</SPAN><SPAN> </SPAN></LI><LI><SPAN>Binaries for selected platforms are provided by the University of Braunschweig on a </SPAN><A href="https://foxhound.ias.tu-bs.de/" target="_blank" rel="noopener nofollow noreferrer"><SPAN>dedicated server</SPAN></A><SPAN>.</SPAN><SPAN> </SPAN></LI><LI><SPAN>More resources include </SPAN><A href="https://github.com/SAP/project-foxhound/wiki/Publications" target="_blank" rel="noopener nofollow noreferrer"><SPAN>academic papers</SPAN></A><SPAN>, talks at </SPAN><A href="https://youtu.be/iZ8F1h51zas?feature=shared" target="_blank" rel="noopener nofollow noreferrer"><SPAN>IEEE S&P 2025</SPAN></A><SPAN> and the </SPAN><A href="https://media.ccc.de/v/god2024-56282-protecting-web-application" target="_blank" rel="noopener nofollow noreferrer"><SPAN>German OWASP day,</SPAN></A><SPAN> and even a </SPAN><A href="https://podcast.opensap.info/open-source-way/2023/10/25/project-foxhound-hunting-cross-site-scripting-on-the-web/" target="_blank" rel="noopener nofollow noreferrer"><SPAN>Podcast</SPAN></A><SPAN>!</SPAN><SPAN> </SPAN></LI></UL><P><STRONG>Authors of this Article</STRONG></P><UL><LI><SPAN>Thomas Barber, Product Security Expert, SAP BTP</SPAN></LI><LI><SPAN>Ulrike Fempel, SAP Open Source Program Office</SPAN></LI></UL>2025-11-19T11:10:41.188000+01:00https://community.sap.com/t5/technology-blog-posts-by-sap/introducing-application-vulnerability-report-for-cloudfoundry-applications/ba-p/14281684Introducing Application Vulnerability Report for Cloudfoundry Applications – Try It Now!2025-12-02T08:25:25.852000+01:00Yoganandahttps://community.sap.com/t5/user/viewprofilepage/user-id/75<TABLE border="1" width="100%"><TBODY><TR><TD width="100%"><P class="lia-align-center" style="text-align: center;"><FONT color="#993300"><STRONG>Application Vulnerability Report Service is currently in Beta Phase <BR />Try it out and provide feedback on your observations<BR />SAP Technical Support Ticket Component : <FONT color="#0000FF">BC-CP-SEC-AVR</FONT></STRONG></FONT></P></TD></TR></TBODY></TABLE><H3 id="toc-hId-1895491145"><STRONG>What Is Application Vulnerability Report?</STRONG></H3><P>Security is a top priority in today’s digital landscape, especially when applications rely heavily on open-source components. These components, while powerful and cost-effective, often come with publicly known vulnerabilities that can put your business data at risk.</P><P>The <STRONG>Application Vulnerability Report</STRONG> is a newly introduced feature for <STRONG>SAP Business Technology Platform (BTP)</STRONG> services that helps you <STRONG>detect and remediate vulnerabilities in your Cloud Foundry applications</STRONG>. This tool scans your application for known security issues based on <STRONG>Common Vulnerabilities and Exposures (CVEs)</STRONG>, ensuring that you stay ahead of potential threats.<BR /><BR /><FONT color="#993366"><STRONG>Currently in Beta Phase and available in eu-10 region</STRONG>.. </FONT>Once Beta Phase is completed.. roll-out to other regions are expected in Q2 or Q3 2026.</P><H3 id="toc-hId-1698977640"><FONT color="#FF6600">How to enable in your tenant ?</FONT></H3><P><STRONG>Go to Entitlements in your SAP BTP Sub-account to add <FONT color="#800080">Application Vulnerability Report</FONT> to add the plans</STRONG><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="2025-12-02_07-58-18.png" style="width: 872px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/347349i7738C4E67E3A7A98/image-size/large?v=v2&px=999" role="button" title="2025-12-02_07-58-18.png" alt="2025-12-02_07-58-18.png" /></span></P><H3 id="toc-hId-1502464135">Service Marketplace</H3><P><SPAN>Search for </SPAN><SPAN class="">application-vulnerability-report-service</SPAN><SPAN> in the SAP BTP </SPAN><SPAN class="">Service Marketplace </SPAN><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="2025-12-02_07-59-10.png" style="width: 896px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/347351iFA4CF76136F80CA0/image-size/large?v=v2&px=999" role="button" title="2025-12-02_07-59-10.png" alt="2025-12-02_07-59-10.png" /></span></P><H3 id="toc-hId-1305950630">Create Instance in your Cloud Foundry space</H3><UL><LI>Go to your Cloud Foundry Space (example : Dev, UAT, TST...etc)</LI><LI>Create a new Instance for <STRONG>Application Vulnerability Report</STRONG> with default plan</LI><LI>Provide a Instance Name</LI></UL><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="2025-12-02_08-32-48.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/347352i842A08BDE0279914/image-size/large?v=v2&px=999" role="button" title="2025-12-02_08-32-48.png" alt="2025-12-02_08-32-48.png" /></span></P><H3 id="toc-hId-1109437125"><SPAN>Create Service Key</SPAN></H3><UL><LI><SPAN>Create a New Service Key for API Access</SPAN></LI></UL><P><SPAN><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="2025-12-02_08-34-24.png" style="width: 824px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/347353i27C3C5AE2AFC001C/image-size/large?v=v2&px=999" role="button" title="2025-12-02_08-34-24.png" alt="2025-12-02_08-34-24.png" /></span></SPAN></P><H3 id="allow-the-user-to-access-the-space" id="toc-hId-912923620"><SPAN>Allow the User to Access the Space</SPAN></H3><P><SPAN>You need to manually add the application-vulnerability-report-scanner@sap.com user to your Cloud Foundry space. This enables the <SPAN class="">application vulnerability report</SPAN> to download the droplets of the respective applications and scan them accordingly.</SPAN></P><OL><LI>Log on to the CF space that you want to scan.</LI><LI>Select the<SPAN> </SPAN><SPAN class="">Space Members</SPAN><SPAN> </SPAN>tab and choose<SPAN> </SPAN><SPAN class="">Add Member</SPAN>.</LI><LI>Enter the<SPAN> </SPAN>application-vulnerability-report-scanner@sap.com<SPAN> </SPAN>user and assign the<SPAN> </SPAN><SPAN class="">Space Auditor</SPAN><SPAN> </SPAN>role to it.</LI></OL><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="2025-12-02_08-41-38.png" style="width: 956px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/347355i171C8D88B9EADC90/image-size/large?v=v2&px=999" role="button" title="2025-12-02_08-41-38.png" alt="2025-12-02_08-41-38.png" /></span></P><H3 id="toc-hId-716410115"><STRONG>Why Is This Important?</STRONG></H3><P>Open-source vulnerabilities are one of the most frequent security challenges in modern application development. Attackers are quick to exploit these weaknesses, and failing to address them promptly can lead to severe consequences, including data breaches and compliance violations.</P><P>By using the Application Vulnerability Report, you can:</P><UL><LI><STRONG>Identify vulnerabilities early</STRONG> in your application lifecycle.</LI><LI><STRONG>Understand the severity</STRONG> of each issue based on CVE data.</LI><LI><STRONG>Take corrective actions quickly</STRONG> to secure your SAP BTP landscape.</LI></UL><H3 id="toc-hId-519896610"> </H3><H3 id="toc-hId-323383105"><FONT color="#800080"><SPAN class="">Application Vulnerability Report</SPAN><SPAN> - Process overview</SPAN></FONT></H3><P><FONT color="#000000"><SPAN>The <SPAN class="">application vulnerability report</SPAN> supports you in the detection of vulnerabilities in custom applications during runtime. Instead of a shift-left support approach during pipeline runs, this service provides security-relevant information for what has already been deployed (and maybe forgotten). The service scans the applications using a proprietary scanning layer that utilizes open-source scanners such as Open Source Vulnerabilities (OSV) and trivy, as well as custom SAP BTP-specific and 0-day exploit targeted scanners. This unique combination offers a very broad and up-to-date coverage of vulnerabilities in your applications. By using an API, you can integrate the report data into your incident and security workflow.</SPAN></FONT></P><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="jpeg (1)1764659722.png" style="width: 666px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/347350iF7393CD884DAB60E/image-size/large?v=v2&px=999" role="button" title="jpeg (1)1764659722.png" alt="jpeg (1)1764659722.png" /></span></P><H3 id="toc-hId-126869600"><FONT color="#FF00FF">Overview of the each Process flow</FONT></H3><H4 id="toc-hId--438278281"><STRONG>1. Applications Running on SAP BTP</STRONG></H4><UL><LI>This is the starting point.</LI><LI>It includes all your <STRONG>Cloud Foundry applications</STRONG> deployed on SAP Business Technology Platform.</LI><LI>Example : CAP, Python, Javascript, Java, Go, Dot-Net... any programming languages those are deployed in your Space.. (This also includes NPM Libraries, Pip libraries or any libraries which are consumed in your applications)</LI><LI>These applications often use <STRONG>open-source libraries and packages</STRONG>, which can have vulnerabilities.</LI></UL><HR /><H4 id="toc-hId--634791786"><STRONG>2. Scanning Layer</STRONG></H4><P>This layer performs the <STRONG>security scans</STRONG> on your applications. It's currently runs weekly scan. It consists of multiple scanning sources:</P><UL><LI><P><FONT color="#FF00FF"><STRONG>Commercial</STRONG></FONT><BR />Uses commercial vulnerability databases and tools to identify known issues.</P></LI><LI><P><FONT color="#FF00FF"><STRONG>Trivy/OSV</STRONG></FONT><BR /><STRONG>Trivy</STRONG> is an open-source vulnerability scanner, and <STRONG>OSV</STRONG> (Open Source Vulnerabilities) is a database of vulnerabilities in open-source software.<BR />These help detect issues in widely used open-source components.</P></LI><LI><P><FONT color="#FF00FF"><STRONG>BTP Specific</STRONG></FONT><BR />Scans for vulnerabilities specific to <STRONG>SAP BTP services and configurations</STRONG>, ensuring platform-level security.</P></LI><LI><P><FONT color="#FF00FF"><STRONG>0 Day</STRONG></FONT><BR />Focuses on <STRONG>zero-day vulnerabilities</STRONG>, which are newly discovered and not yet patched.<BR />These are critical because attackers often exploit them quickly.</P></LI></UL><HR /><H4 id="toc-hId--831305291"><STRONG>3. Application Vulnerability Report for SAP BTP</STRONG></H4><UL><LI>After scanning, all findings are consolidated into a <STRONG>single report</STRONG>.</LI><LI>This report provides:<UL><LI><STRONG>List of vulnerabilities</STRONG></LI><LI><STRONG>Severity levels</STRONG></LI><LI><STRONG>Recommendations for remediation</STRONG></LI></UL></LI><LI>It acts as a <STRONG>centralized dashboard</STRONG> for security insights.</LI></UL><HR /><H4 id="toc-hId--1027818796"><STRONG>4. API for Customers</STRONG></H4><UL><LI>Customers can <STRONG>access the report via API</STRONG>.</LI><LI>This allows integration with:<UL><LI><STRONG>Security dashboards</STRONG></LI><LI><STRONG>CI/CD pipelines</STRONG></LI><LI><STRONG>Monitoring tools</STRONG></LI></UL></LI><LI>Ensures automation and continuous security checks.</LI></UL><HR /><H4 id="toc-hId--1224332301"><STRONG>5. Customers</STRONG></H4><UL><LI>End-users (developers, security teams) consume the report and take <STRONG>corrective actions</STRONG> to secure applications.</LI></UL><P> </P><H4 id="toc-hId--1420845806"><FONT color="#FF00FF">Technical Usage</FONT><BR /><BR />How to get findings of your deployed CF applications running.<span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="2025-12-02_09-43-39.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/347367i3495E311BCED4211/image-size/large?v=v2&px=999" role="button" title="2025-12-02_09-43-39.png" alt="2025-12-02_09-43-39.png" /></span></H4><P><STRONG>Example : Scanned Finding Report</STRONG><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="2025-12-03_09-06-34.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/347835i8D868D2DC99AE3FB/image-size/large?v=v2&px=999" role="button" title="2025-12-03_09-06-34.png" alt="2025-12-03_09-06-34.png" /></span></P><P> </P><H3 id="toc-hId--1323956304">Reference:</H3><UL><LI><A href="https://help.sap.com/docs/application-vulnerability-report/application-vulnerability-report-e02c6e1a86544ce981810c8c8a12e750/initial-setup" target="_self" rel="noopener noreferrer">Initial Setup Process</A></LI><LI><A href="https://help.sap.com/docs/application-vulnerability-report/application-vulnerability-report-e02c6e1a86544ce981810c8c8a12e750/authentication" target="_self" rel="noopener noreferrer">Authentication Process</A></LI><LI><A href="https://help.sap.com/docs/application-vulnerability-report/application-vulnerability-report-e02c6e1a86544ce981810c8c8a12e750/auditing-and-logging-information" target="_self" rel="noopener noreferrer">Audit Logging Process</A></LI><LI><A href="https://roadmaps.sap.com/board?PRODUCT=73554900100800006073&range=CURRENT-LAST" target="_self" rel="noopener noreferrer">Roadmap for AVR</A></LI></UL><H3 id="toc-hId--1520469809">External resource:</H3><UL><LI><A href="https://osv.dev/" target="_self" rel="nofollow noopener noreferrer">OSV database </A></LI></UL>2025-12-02T08:25:25.852000+01:00https://community.sap.com/t5/technology-blog-posts-by-sap/beta-version-of-application-vulnerability-report-for-sap-btp-now-available/ba-p/14283839Beta Version of Application Vulnerability Report for SAP BTP Now Available2025-12-04T14:18:40.970000+01:00Fabian_Richterhttps://community.sap.com/t5/user/viewprofilepage/user-id/1859514<P><SPAN class="">Earlier this month, we released the application vulnerability report (beta) for SAP Business Technology Platform (SAP BTP). You can use this new service to detect and remediate open-source application vulnerabilities in your SAP BTP deployed applications.</SPAN><SPAN class=""> </SPAN></P><H2 id="toc-hId-1766469780"><STRONG><SPAN>What is this new service all about?</SPAN></STRONG><SPAN> </SPAN></H2><P><SPAN>Frequent security issues in open-source components endanger business data in customer deployed applications. Customers are responsible for performing vigilant patch and vulnerability management. By leveraging the new application vulnerability report for SAP BTP, open-source vulnerabilities in your Cloud Foundry applications can be detected and remediated. It's crucial to fix such vulnerabilities quickly, as attackers are usually aware of them and might try to break into vulnerable systems.</SPAN><SPAN> </SPAN></P><H2 id="toc-hId-1569956275"><STRONG><SPAN>What does the new application vulnerability report service offer you?</SPAN></STRONG><SPAN> </SPAN></H2><P><SPAN>The application vulnerability report supports you in the detection of vulnerabilities in custom applications during runtime. It enables you to act on criticality and other provided vulnerability details, like mitigation recommendations. </SPAN><SPAN> </SPAN></P><P><SPAN>If we take a closer look at the process, the service scans the applications using a proprietary scanning layer that utilizes open-source scanners as well as custom SAP BTP-specific and 0-day exploit targeted scanners. This unique combination offers a very broad and up-to-date coverage of vulnerabilities in your applications. By using an API, you can also integrate the report data into your incident and security workflow.</SPAN><SPAN> </SPAN></P><P><SPAN>Let’s have a quick look at the architecture overview:</SPAN><SPAN> </SPAN></P><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="Fabian_Richter_0-1764845089098.png" style="width: 400px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/348480iF8F3D2E11CE07ED0/image-size/medium?v=v2&px=400" role="button" title="Fabian_Richter_0-1764845089098.png" alt="Fabian_Richter_0-1764845089098.png" /></span></P><P class="lia-align-center" style="text-align: center;"><I><SPAN>Application Vulnerability Report for SAP BTP – Architecture Overview</SPAN></I><SPAN> </SPAN></P><H2 id="toc-hId-1373442770"><STRONG><SPAN>Get started now!</SPAN></STRONG><SPAN> </SPAN></H2><P><SPAN>You can find lots of useful information in this practical hands-on blog post:</SPAN><SPAN> </SPAN></P><P><A href="https://community.sap.com/t5/technology-blog-posts-by-sap/introducing-application-vulnerability-report-for-cloudfoundry-applications/ba-p/14281684" target="_blank"><SPAN>Introducing Application Vulnerability Report for Cloud Foundry Applications – Try It Now!</SPAN></A><SPAN> </SPAN></P><P><SPAN>The complete documentation is available on </SPAN><A href="https://help.sap.com/docs/application-vulnerability-report?locale=en-US" target="_blank" rel="noopener noreferrer"><SPAN>SAP Help Portal</SPAN></A><SPAN>.</SPAN><SPAN> </SPAN></P><P><SPAN>Please note that this is a </SPAN><STRONG><SPAN>beta service</SPAN></STRONG><SPAN> available on SAP BTP for subaccounts in trial and enterprise accounts. It is currently available in the “cf-eu10” landscape. Once the beta phase is completed, we plan to roll out the service to other regions.</SPAN><SPAN> </SPAN></P><P><SPAN>If you are interested in what’s more to come, check out the road map in </SPAN><A href="https://roadmaps.sap.com/board?PRODUCT=73554900100800006073&range=CURRENT-LAST" target="_blank" rel="noopener noreferrer"><SPAN>SAP Road Map Explorer</SPAN></A><SPAN>.</SPAN><SPAN> </SPAN></P><P><SPAN>Try it out, and we look forward to your feedback!</SPAN><SPAN> </SPAN></P><P><SPAN> </SPAN></P><P><STRONG><SPAN>Also make sure to join our community to learn more about the security services and features in SAP Business Technology Platform here:</SPAN></STRONG><SPAN> </SPAN></P><P><A href="https://community.sap.com/topics/btp-security" target="_blank"><STRONG><SPAN>https://community.sap.com/topics/btp-security</SPAN></STRONG></A><SPAN> </SPAN></P>2025-12-04T14:18:40.970000+01:00https://community.sap.com/t5/technology-blog-posts-by-sap/building-secure-sapui5-applications-best-practices-for-developers/ba-p/14267269Building Secure SAPUI5 Applications: Best Practices for Developers2025-12-10T08:16:09.335000+01:00Manisha_19https://community.sap.com/t5/user/viewprofilepage/user-id/1695623<H3 id="toc-hId-1893818948"><STRONG>Introduction</STRONG></H3><P>In today’s enterprise landscape, security is fundamental, not optional. As the user-facing gateway to SAP systems, SAPUI5 apps must be built with security in mind from the start.</P><P>This blog shares practical, developer-focused techniques to help you secure your SAPUI5 applications from input validation and Cross-Site Scripting (XSS) prevention to using ESLint and safe communication practices. By adopting secure coding habits early, you can ensure your UI remains clean, efficient, and resilient against modern threats.</P><H3 id="toc-hId-1697305443"><STRONG>Why Security Matters in SAPUI5</STRONG></H3><P>The UI layer is where users interact, input data, and access sensitive information.<BR />Even a small oversight like an unsanitized binding or debug log can lead to security exposure or data misuse.</P><P>By following secure UI5 coding standards, developers can:</P><UL><LI>Maintain data integrity and confidentiality</LI><LI>Prevent unauthorized access</LI><LI>Build user trust through reliable and safe design</LI></UL><H3 id="toc-hId-1500791938"><STRONG>Secure Coding Practices for SAPUI5 Developers</STRONG></H3><P><STRONG>1. Validate and Sanitize User Input</STRONG></P><P>Always validate what users enter before sending it to your backend.</P><UL><LI>Use data types in input fields for built-in validation:</LI></UL><pre class="lia-code-sample language-markup"><code><Input value="{path: 'age', type: 'sap.ui.model.type.Integer'}" /></code></pre><UL><LI>Add custom formatters or validators for domain-specific logic.</LI><LI>Reject invalid inputs early, don’t rely on the backend to catch them.</LI></UL><P><STRONG> 2. </STRONG><STRONG>Prevent Cross-Site Scripting (XSS)</STRONG></P><P>XSS attacks occur when untrusted input is rendered as executable code in the browser.<BR />To prevent it in UI5:</P><UL><LI>Use <STRONG>Text</STRONG> control instead of <STRONG>FormattedText</STRONG> unless the content is sanitized.</LI><LI>Escape dynamic strings using encodeHTML().</LI><LI>Avoid direct DOM manipulation like innerHTML or jQuery .html().</LI><LI>Never include untrusted HTML in views or models.</LI></UL><P><STRONG> 3. </STRONG><STRONG>Protect Sensitive Information</STRONG></P><UL><LI>Do <STRONG>not</STRONG> store tokens, passwords, or system URLs in <STRONG>localStorage</STRONG> or <STRONG>sessionStorage</STRONG>.</LI><LI>Avoid exposing business logic or identifiers in console logs.</LI><LI>Remove debug logs before deployment as they often reveal internal system details.</LI></UL><P><STRONG> 4. </STRONG><STRONG>Use ESLint for Secure and Consistent Code </STRONG></P><P>Static code analysis helps detect vulnerabilities and enforces coding standards.</P><P>Install and configure ESLint with SAP’s recommended rules:</P><pre class="lia-code-sample language-bash"><code>npm install eslint eslint-config-ui5 --save-dev</code></pre><P>Create a .eslintrc.json file:</P><pre class="lia-code-sample language-json"><code>{
"extends": ["eslint-config-ui5"]
}</code></pre><P><STRONG>Benefits:</STRONG></P><UL><LI>Detects unsafe DOM access or unused imports</LI><LI>Prevents insecure practices like eval statements</LI><LI>Promotes consistent, readable, and maintainable code</LI></UL><P>Run ESLint regularly as part of your build or CI pipeline:</P><pre class="lia-code-sample language-bash"><code>eslint .</code></pre><P><STRONG> 5. </STRONG><STRONG>Secure Communication with Backend</STRONG></P><P>Even though backend services handle authentication, the UI must communicate securely.</P><UL><LI>Always use <STRONG>HTTPS</STRONG> for service endpoints.</LI><LI>Avoid hardcoding URLs use destination configurations or environment variables.</LI><LI>Enable <STRONG>Cross-Site Request Forgery</STRONG> <STRONG>(CSRF) protection</STRONG> in your ODataModel configuration:</LI></UL><pre class="lia-code-sample language-javascript"><code>let oModel = new sap.ui.model.odata.v2.ODataModel("/odata/service", {
tokenHandling: true
});</code></pre><H3 id="toc-hId-1304278433"><STRONG>Developer Mindset: Security as a Habit</STRONG></H3><P>Security isn’t a one-time setup, it’s an ongoing practice.<BR />Adopt a security-first mindset by:</P><UL><LI>Reviewing code with security in mind</LI><LI>Regularly updating libraries and dependencies</LI><LI>Integrating linting and vulnerability scans in CI/CD</LI></UL><P>When security becomes part of your coding routine, your applications naturally grow more resilient and trustworthy.</P><H3 id="toc-hId-1107764928"><STRONG>Conclusion</STRONG></H3><P>Building secure SAPUI5 applications isn’t just about backend policies, it starts right in your controllers, bindings, and XML views.<BR />By validating inputs, preventing XSS, protecting sensitive data, and using tools like ESLint, you strengthen your application’s defense without compromising usability or performance.</P>2025-12-10T08:16:09.335000+01:00https://community.sap.com/t5/technology-blog-posts-by-sap/new-version-8-6-of-the-sap-cryptographic-library-with-quantum-safe/ba-p/14280039New version 8.6 of the SAP Cryptographic Library with quantum-safe cryptography and FIPS 140-3 mode2025-12-12T17:10:56.764000+01:00Christian_Cohrs1https://community.sap.com/t5/user/viewprofilepage/user-id/181868<H3 id="toc-hId-1895455438">Overview</H3><P>The SAP Cryptographic Library enables applications like SAP S/4 HANA to support security protocols such as TLS (Transport Layer Security), SNC (Secure Network Communication), SSF (Secure Store and Forward) and X.509. While the library already includes "modern" cryptographic algorithms such as those based on Elliptic Curve Cryptography, these were until now all part of the group of "classic" algorithms. </P><P>Most "classic" algorithms for asymmetric cryptography are vulnerable when a cryptographically relevant quantum computer becomes reality. This might have an impact even today if attackers record encrypted communication and store it for later decryption ("harvest-now-decrypt-later"). </P><H3 id="toc-hId-1698941933">Quantum-safe cryptography in the SAP Cryptographic Library</H3><P>The new version 8.6 of the library enables support for a quantum-safe TLS 1.3 handshake. When the library is installed on an SAP NetWeaver ABAP system and TLS 1.3 is used to establish a connection, then a hybrid ECDHE-MLKEM key agreement based on X25519MLKEM768 takes place. ML-KEM is a new, quantum-safe algorithm for key encapsulation, which was already standardized as FIPS-203. This makes it impossible, even for a quantum computer, to determine the session key and decrypt the session communication. </P><H3 id="toc-hId-1502428428">New FIPS 140-3 certification of the FIPS crypto kernel</H3><P><span class="lia-inline-image-display-wrapper lia-image-align-left" image-alt="FIPS 140-3 Logo Color.jpg" style="width: 200px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/346969iB07BD5CD89083833/image-size/small?v=v2&px=200" role="button" title="FIPS 140-3 Logo Color.jpg" alt="FIPS 140-3 Logo Color.jpg" /></span></P><P>FIPS stands for Federal Information Processing Standard. A FIPS certification is required by US public sector agencies, healthcare, and financial industries, and many more. FIPS 140-3 validates the proper implementation of the algorithms in cryptographic modules.</P><P>The FIPS crypto kernel is a dedicated module in the SAP Cryptographic Library that was recently certified as compliant with FIPS 140-3. The certificate is available from the National Institute of Standards and Technology (NIST): <A href="https://csrc.nist.gov/projects/cryptographic-module-validation-program/certificate/5093" target="_self" rel="nofollow noopener noreferrer">Certificate #5093</A>.</P><P>For SAP Application Server ABAP and SAP HANA, <A href="https://me.sap.com/notes/2180024" target="_self" rel="noopener noreferrer">SAP note 2180024</A> explains the configuration steps that are required to switch the SAP Cryptographic Library to FIPS mode.</P><H3 id="toc-hId-1305914923">Release Details</H3><P>The release note "<A href="https://me.sap.com/notes/3685428" target="_self" rel="noopener noreferrer">3685428 - Fixes and features in CommonCryptoLib 8.6.2</A>" has now been published. More information about the SAP Cryptographic Library is available in "<A href="https://me.sap.com/notes/1848999" target="_self" rel="noopener noreferrer">1848999 - Central Note for CommonCryptoLib 8 (SAPCRYPTOLIB)</A>".</P>2025-12-12T17:10:56.764000+01:00https://community.sap.com/t5/technology-blog-posts-by-sap/sap-integrated-business-planning-on-demand-stay-secure-with-sap-earlywatch/ba-p/14293573SAP Integrated Business Planning On Demand - Stay Secure with SAP EarlyWatch Alert2025-12-19T06:11:34.454000+01:00marcus_trehyhttps://community.sap.com/t5/user/viewprofilepage/user-id/1446930<P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="Security with SAP IBP OD.jpg" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/353883iAAD057987323660A/image-size/large?v=v2&px=999" role="button" title="Security with SAP IBP OD.jpg" alt="Security with SAP IBP OD.jpg" /></span></P><P>With SAP Integrated Business Planning On Demand, SAP takes care of many security-related topics as cloud provider. However, in order to stay secure, customers are still responsible for the mitigation of risks such as business or technical users having critical authorizations.</P><P><SPAN>Here, the </SPAN><A href="https://community.sap.com/t5/c-khhcw49343/SAP+EarlyWatch+Alert/pd-p/f811a31e-b1e7-42ac-9f17-9051d8410d93" target="_self">SAP EarlyWatch Alert</A><SPAN> report in </SPAN><A href="https://community.sap.com/t5/c-khhcw49343/SAP+for+Me/pd-p/e1868089-7a3a-410f-8dcc-3f2380ed5fa4" target="_self">SAP for Me</A><SPAN> </SPAN><SPAN>comes into play as it gives you insights into security risks in the chapter "Security (SAP IBP OD)". This chapter provides insights and alerts you on the following topics:</SPAN></P><UL><LI><STRONG>Assignment of Users to Business Role SAP_BR_ADMINISTRATOR</STRONG> - check for usage of this role in production, leading to segregation of duties (SoD) conflicts as it is intended only for initial system configuration</LI><LI><STRONG>Use of Read/Write Unrestricted</STRONG> - get alerts on business roles with unrestricted write, read and value help access, allowing users global data access</LI><LI><STRONG>Critical Business Catalog Assignment</STRONG> - be warned about over-assignment of critical authorizations which should have limited use in production</LI><LI><STRONG>Critical Authorization Combinations</STRONG> - get alerts for users assigned excess authorizations through critical combinations of business catalogs</LI><LI><STRONG>Communication (Inbound/Outbound)</STRONG> - get alerts on customer-managed communication arrangements based on user/password authentication, where certificate-based authentication is more secure</LI><LI><STRONG>Upcoming Certificate Expiration</STRONG> - get early warnings for customer-managed certificates which will expire within the next 90 days</LI></UL><P>You can find more details on each of these chapters below or by directly accessing the <A href="https://me.sap.com/ewa/report" target="_self" rel="noopener noreferrer">SAP EarlyWatch Alert report</A>* for your systems in SAP for Me. <BR /><FONT size="2"><EM>* an authorized user is needed to access this application - refer to this <A href="https://support.sap.com/en/offerings-programs/support-services/earlywatch-alert.html?anchorId=section_543542880_co" target="_self" rel="noopener noreferrer">SAP Support page</A> on how to get access.</EM></FONT></P><P><FONT size="5"><STRONG>Assignment of Users to Business Role SAP_BR_ADMINISTRATOR</STRONG></FONT></P><P>The role SAP_BR_ADMINISTRATOR is predefined by SAP and is intended only for the initial configuration of a system. Using this role in production is not recommended by SAP and may lead to compliance issues. This section checks the role's usage and points to in-depth information on Identity Access Management. It provides a link to the procedure for creating a more restricted administration role, suitable for use in production.</P><P><FONT size="5"><STRONG>Use of Read/Write Unrestricted</STRONG></FONT></P><P>Using unrestricted fields in the maintenance of business roles allow users to have global data access. SAP best practices recommend to carefully review which users need to have restricted data access and maintain the access appropriately, e.g. ensuring employees only have access to data belonging to their sales organization. This chapter includes the number of business roles with unrestricted write, read or value help access, and describes the related SAP Fiori app Maintain Business Roles.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="Use of Read/Write Unrestricted Table Example" style="width: 998px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/353889i3A3F3CBA9ED2DF83/image-size/large?v=v2&px=999" role="button" title="readWriteUnrestricted.png" alt="Use of Read/Write Unrestricted Table Example" /><span class="lia-inline-image-caption" onclick="event.preventDefault();">Use of Read/Write Unrestricted Table Example</span></span></P><P> </P><P><FONT size="5"><STRONG>Critical Business Catalog Assignment</STRONG></FONT></P><P>Business catalogs contain a bundle of privileges needed for accessing an app or features that are then assigned to users via business roles. This section checks for selected critical business catalogs and their assignment to business roles and users and rates this according to the valuation rules from SAP Note 863362. In case any critical business catalogs are assigned, additional details are presented as sub-chapters.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="Business Catalog Assignments Overview Table Example" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/353890i015073ED958850CA/image-size/large?v=v2&px=999" role="button" title="BusinessCatalogAssignments.png" alt="Business Catalog Assignments Overview Table Example" /><span class="lia-inline-image-caption" onclick="event.preventDefault();">Business Catalog Assignments Overview Table Example</span></span></P><P> </P><P><FONT size="5"><STRONG>Critical Authorization Combinations</STRONG></FONT></P><P>Segregation of duties in SAP Integrated Business Planning (SAP IBP) is supported by the use of business catalogs and business roles. Creatinga a business role by combining catalogs may grant excess authorization to users and lead to a negative impact on your business processes. The section gives user counts where such critical combinations are found, with a link to information on assessing the associated risks.</P><P><FONT size="5"><STRONG>Communication (Inbound/Outbound)</STRONG></FONT></P><P>Certificate-based communication is recommended for technical users involved in inbound/outbound communication. It is usually easier to detect a compromised certificate than to detect a compromised password. This section lists customer-managed communication arrangements that are password-based, and points to recommendations for a certificate-based approach.</P><P><FONT size="5"><STRONG>Upcoming Certificate Expiration</STRONG></FONT></P><P>Certificates with an expiration date in the next 90 days are listed in this section, with alerts for certifcates where a short-term expiration under 30 days is found.</P>2025-12-19T06:11:34.454000+01:00https://community.sap.com/t5/technology-blog-posts-by-sap/enhance-security-with-new-cqcs/ba-p/14307490Enhance security with new CQCs2026-01-14T15:52:03.764000+01:00JamieFulenhttps://community.sap.com/t5/user/viewprofilepage/user-id/20349<P>As part of your foundational support experience, SAP Enterprise Supports offers proactive services to help to mitigate issues and risks in relation to the security of your SAP solutions. The services are included as part of your SAP cloud subscription. The CQC for Security Optimization is being expanded to support SAP S/4HANA Cloud Public Edition.</P><P><FONT face="helvetica" size="3">After a detailed security analysis, the service will provide recommendations to improve your configuration and authorizations. For this pilot delivery, SAP will assign a dedicated expert to guide you through the process.</FONT></P><P><FONT face="helvetica" size="3">Upon completion of the service, you will receive a comprehensive report that includes an executive summary, detailed findings, and recommendations to mitigate risks and enhance your security posture. You can expect to receive the results approximately one week after the session.</FONT></P><P><FONT face="helvetica" size="3">If you wish to participate, please ensure you meet the following prerequisites:</FONT></P><UL><LI><FONT face="helvetica" size="3"><SPAN>Grant remote access to your SAP cloud solution to SAP.</SPAN></FONT></LI><LI><FONT face="helvetica" size="3"><SPAN>Be available to collaborate with SAP Expert within a mutually agreed 2 to 3 week time frame.</SPAN></FONT></LI><LI><FONT face="helvetica" size="3"><SPAN>Be willing to provide open and honest feedback on the service content and respond to our survey requests.</SPAN></FONT></LI></UL><P><FONT face="helvetica" size="3">We look forward to working with you and helping you enhance your SAP security.</FONT></P><P><FONT face="helvetica" size="3">Contact us today to get started. <BR /></FONT><FONT face="helvetica" size="3"><A href="mailto:esac@sap.com" target="_blank" rel="noopener nofollow noreferrer">esac@sap.com</A></FONT></P><P><EM><FONT face="helvetica" size="3">Additional information about the SAP Enterprise Support Advisory Council can be found <A href="https://support.sap.com/en/offerings-programs/enterprise-support/enterprise-support-advisory-council.html" target="_blank" rel="noopener noreferrer">here</A>.</FONT></EM></P>2026-01-14T15:52:03.764000+01:00https://community.sap.com/t5/enterprise-resource-planning-blog-posts-by-sap/don-t-let-your-integration-take-a-coffee-break-client-certificate-changes/ba-p/14304537Don't Let Your Integration Take a Coffee Break: Client Certificate Changes In 2026!2026-01-16T08:40:45.053000+01:00marc_roederhttps://community.sap.com/t5/user/viewprofilepage/user-id/180997<H1 id="toc-hId-1658654950"><SPAN>Introduction</SPAN></H1><P><SPAN>If integrations were people, you’d dread them slipping out for coffee breaks just when you need them most. SAP S/4HANA Cloud Public Edition, Integrated Business Planning (IBP), and SAP Marketing Cloud (SMC) are all about to experience an important update to how client certificates are issued. This change, prompted by evolving industry standards, involves a change of the Certificate Authority (CA) for the Default Client certificate. It’s important to note that this CA change has the potential to cause one of those dreaded coffee breaks—disruptions in connectivity—if not handled properly. </SPAN></P><P><SPAN>Here’s what’s happening, who should pay attention, and how to keep your setup on track.</SPAN></P><H3 id="toc-hId-1720306883"><SPAN>Which Certificate?</SPAN></H3><P>Each SAP S/4HANA Cloud Public Edition, SAP IBP, or SAP Marketing Cloud tenant includes an SAP-managed client certificate named “Client Default.” This certificate is used for outbound calls in customer-managed communication scenarios: the source system (S/4, IBP, or SMC) initiates a call to another system, using the certificate for authentication. The text discusses a change in the Client Default certificate.</P><P>If you’re unsure about the various types of certificates, check out this blog post, which clarifies different use cases and their respective user interfaces: <A href="https://community.sap.com/t5/enterprise-resource-planning-blog-posts-by-sap/inbound-outbound-certificate-bound-certificate-management-in-sap-s-4hana/ba-p/14331144" target="_self">Inbound, Outbound, Certificate Bound: Certificate Management in SAP S/4HANA Cloud Public Edition</A>.</P><H2 id="toc-hId-1394710659"><SPAN>Who Is Affected?</SPAN></H2><P><SPAN>If you use the Client Default certificate for outbound authentication in SAP S/4HANA Cloud Public Edition, IBP, or SMC, this change applies to you. Anyone relying on these certificates for outbound integrations should pay attention, as missing the update could lead to disruptions in communication.</SPAN></P><P><SPAN>This only applies to customer managed integration scenarios. SAP managed ones will be taken care of by SAP, of course.</SPAN></P><H2 id="toc-hId-1198197154"><SPAN>What Is Changing?</SPAN></H2><P><SPAN>Currently, the Default Client certificates for outbound communication are issued by <EM>DigiCert</EM>. In February 2026, <EM>SAP Cloud Root CA</EM> becomes the new certificate authority for newly issued client certificates. You’ll also notice updates to certificate subject names, including additional organizational fields. These changes will be present in all new client certificates issued during routine rotation.</SPAN></P><P><SPAN>To help visualize the upcoming changes, here’s a quick comparison of the old and new default client certificates:</SPAN></P><TABLE><TBODY><TR><TD width="103"><P><STRONG><SPAN>Certificate Attribute</SPAN></STRONG></P></TD><TD width="249"><P><STRONG><SPAN>Old (Before Rotation)</SPAN></STRONG></P></TD><TD width="249"><P><STRONG><SPAN>New (After Rotation)</SPAN></STRONG></P></TD></TR><TR><TD width="103"><P><STRONG>Subject</STRONG></P></TD><TD width="249"><P>CN=<<EM>your tenant hostname></EM></P></TD><TD width="249"><P>CN=<EM><your tenant hostname><BR /></EM>OU=<EM><some UID</EM><EM>></EM></P></TD></TR><TR><TD width="103"><P><STRONG><SPAN>Issuer</SPAN></STRONG></P></TD><TD width="249"><P><SPAN>DigiCert Global G2</SPAN></P></TD><TD width="249"><P><SPAN>SAP Cloud Root CA</SPAN></P></TD></TR><TR><TD width="103"><P><STRONG>Extended Key Usage</STRONG></P></TD><TD width="249"><P>Client Authentication,<BR />Server Authentication</P></TD><TD width="249"><P>Client Authentication</P></TD></TR></TBODY></TABLE><P><SPAN>The new OU value is specific to the product (S/4/IBP/ SMC) and will remain the same during future certificate rotations.</SPAN></P><H2 id="toc-hId-1001683649"><SPAN>Timeline and Notification: When and How Will You be Informed?</SPAN></H2><P>New systems will receive client certificates signed by <EM>SAP Cloud Root CA</EM> starting late March 2026. Existing systems will begin renewal with a staging certificate from late February 2026, fully transitioning during their next scheduled key rotation. In case you wonder: the fact that these dates are close to the 2602 release is a pure coincidence. System upgrades and certificate changes are separate processes.<BR />The rotation schedule and rotation process do not change. There will be no additional certificate rotation.</P><P><STRONG><SPAN>Example:</SPAN></STRONG><SPAN> if your current Client Default certificate is valid until April 2026, the CA change will happen in April for you. If your certificate expires in November, you’ll keep your <EM>DigiCert</EM> certificate until November and then switch to <EM>SAP Cloud Root CA</EM>.</SPAN></P><P>The usual notification email about certificate rotation will include additional details about the change in Certificate Authority. Please review it carefully to ensure you understand the updates and can take the right actions in response. The process for certificate rotation is described on <SPAN><A href="https://help.sap.com/docs/SAP_S4HANA_CLOUD/55a7cb346519450cb9e6d21c1ecd6ec1/2e409eb8853b4347a372261d6519cf3f.html?locale=en-US&version=LATEST" target="_blank" rel="noopener noreferrer">this help page</A></SPAN>.</P><H1 id="toc-hId-676087425"><SPAN>Potential Issues and Required Action</SPAN></H1><P><SPAN>For clarity, we'll refer to the system, tenant, service, or device that receives and validates connections from your SAP cloud tenant (S/4 cloud, IBP, SMC) as the <EM>target</EM> <EM>environment</EM>. Such target environments could be anything from BTP apps, SAP solutions like SAP Ariba or SAP SuccessFactors, third-party products running in the cloud or on-premises, or even custom-built applications.</SPAN></P><H2 id="toc-hId-608656639"><SPAN>How Things Might Break</SPAN></H2><P><SPAN>Misalignment of configurations in your SAP cloud tenant and the target environment can lead to two categories of issues:</SPAN></P><UL><LI><STRONG><SPAN>CA Trust Failures</SPAN></STRONG><SPAN>: If your target environment does not trust the <EM>SAP Cloud Root CA</EM>, it will reject the new certificate. In these cases, the mutual TLS (mTLS) handshake fails, and communication is blocked at the TLS layer. No HTTP error code is returned.</SPAN></LI><LI><STRONG><SPAN>User / System / Identity Mapping Errors</SPAN></STRONG><SPAN>: in the target environment, the certificate metadata (subject, issuer) is mapped to the identity of a user or process. Consequently, if the mapping is not changed to use the new subject and issuer, authorization errors (such as HTTP 403 or 401) will happen. Depending on the implementation of the target environment, TLS errors could also occur.</SPAN></LI></UL><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="marc_roeder_0-1768548384514.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/361818i91AF33DBE6F4614F/image-size/large?v=v2&px=999" role="button" title="marc_roeder_0-1768548384514.png" alt="marc_roeder_0-1768548384514.png" /></span></P><H3 id="toc-hId-541225853"><SPAN>Technical Aside: Certificate Pinning vs CA Trust</SPAN></H3><P><SPAN>For certificate-based authentication, most target environments will rely on CA trust, where the target environment validates the certificate’s chain up to a trusted root CA. With the switch to <EM>SAP Cloud Root CA</EM>, you must add this CA to the trust store in the target environment and check your user mapping logic. </SPAN></P><P><SPAN>For environments using certificate pinning, simply upload the new certificate when the rotation occurs. In this case, the certificate is identified by the fingerprint of the certificate’s key rather than the metadata of the certificate (i.e. subject and issuer). Target environments using certificate pinning must be updated every time the certificate rotates – the CA change does not make a difference here.</SPAN></P><H2 id="toc-hId-215629629"><SPAN>Required Actions for Customers</SPAN></H2><P><SPAN>To maintain uninterrupted integrations, customers using the Client Default certificate for SAP S/4HANA Cloud Public Edition, IBP, and SMC should:</SPAN></P><OL><LI><SPAN>Update CA Trust: Make sure the <EM>SAP Cloud Root CA</EM> is trusted by your target environment. You can download the root certificate from the <A href="https://support.sap.com/en/offerings-programs/support-services/trust-center-services.html#section_1559602068" target="_blank" rel="noopener noreferrer">SAP Trust Center</A>.</SPAN></LI><LI><SPAN>Adjust User/System/Identity Mapping: Update your mapping logic to recognize the new certificate subject and issuer, ensuring the target environment properly identifies and authorizes the incoming connection. How this is done depends on the implementation of the target environment. Typically, it involves downloading the Client Default certificate from the source tenant and uploading it through the appropriate interface in the target environment.</SPAN></LI></OL><P><SPAN>More information on the topic is available in SAP note <A href="https://launchpad.support.sap.com/#/notes/3677763" target="_blank" rel="noopener noreferrer">3677763</A> as well as the relevant help pages:</SPAN></P><UL><LI><SPAN><A href="https://help.sap.com/docs/SAP_S4HANA_CLOUD/55a7cb346519450cb9e6d21c1ecd6ec1/2e409eb8853b4347a372261d6519cf3f.html?version=LATEST&locale=en-US" target="_blank" rel="noopener noreferrer">How to Handle Default Client Certificate Renewal</A></SPAN></LI><LI><A href="https://help.sap.com/docs/SAP_MARKETING_CLOUD/7f0fcf009fd34169a791b19830dd2a99/1ba0a090d8fa4d3e8098b318187e0288.html?locale=en-US&version=LATEST" target="_blank" rel="noopener noreferrer">Set Up Certificate-to-User Mapping</A> (SAP Cloud Integration and SAP Marketing Cloud)</LI><LI><SPAN><A href="https://help.sap.com/docs/integration-suite/sap-integration-suite/client-certificate-authentication-for-integration-flow-processing?locale=en-US&version=LATEST" target="_blank" rel="noopener noreferrer">Client Certificate Authentication for Integration Flow Processing</A> (SAP Integration Suite)</SPAN></LI><LI><SPAN><A href="https://help.sap.com/docs/integration-suite/sap-integration-suite/client-certificate-authentication-for-api-clients?locale=en-US&version=LATEST" target="_blank" rel="noopener noreferrer">Client Certificate Authentication for API Clients</A></SPAN> <SPAN>(SAP Integration Suite)</SPAN></LI></UL><P><SPAN>And in case you wonder what all of this certificate business is about, here's a blog post describing the basics of certificate-based authentication: <A href="https://community.sap.com/t5/enterprise-resource-planning-blog-posts-by-sap/beyond-basic-1-certificate-based-authentication/ba-p/13626924" target="_blank">Beyond Basic (1): Certificate-Based Authentication</A>. For an overview of the different certificate types and usages in SAP S/4HANA Cloud Public Edition, see this blog: <A href="https://community.sap.com/t5/enterprise-resource-planning-blog-posts-by-sap/inbound-outbound-certificate-bound-certificate-management-in-sap-s-4hana/ba-p/14331144" target="_blank">Inbound, Outbound, Certificate Bound: Certificate Management in SAP S/4HANA Cloud Public Edition.</A></SPAN></P><H1 id="toc-hId--109966595"><SPAN>Conclusion</SPAN></H1><P><SPAN>While this certificate update might seem like an invitation for your integrations to sneak away for a coffee break, staying alert and updating your trust stores and mappings in your target environment will keep everything running without interruption. Pay attention to notification emails—so your integrations never miss a beat (or a sip).</SPAN></P>2026-01-16T08:40:45.053000+01:00https://community.sap.com/t5/enterprise-resource-planning-blog-posts-by-sap/%E9%9D%A2%E5%90%91-sap-erp-%E5%85%AC%E6%9C%89%E4%BA%91-sap-ibp-sap-marketing-cloud-%E7%94%A8%E6%88%B7%E7%9A%84%E6%8F%90%E9%86%92-%E5%87%BA%E7%AB%99-%E9%BB%98%E8%AE%A4%E5%AE%A2%E6%88%B7%E7%AB%AF%E8%AF%81%E4%B9%A6-ca-%E5%B0%86%E5%8F%98%E6%9B%B4%E4%B8%BA-sap/ba-p/14319216面向 SAP ERP 公有云、SAP IBP、SAP Marketing Cloud 用户的提醒:出站“默认客户端证书”CA 将变更为 SAP Cloud Root CA2026-02-02T02:00:00.017000+01:00Zhehui_Xia28https://community.sap.com/t5/user/viewprofilepage/user-id/40727<H2 id="toc-hId-1788807199">背景与原因</H2><UL><LI>受行业规范变化(由 Google 推动)影响,主流证书颁发机构将停止签发用于客户端认证的证书。当前为 SAP S/4HANA Cloud Public Edition、SAP IBP、SAP Marketing Cloud 租户签发“默认客户端证书”的 <STRONG><EM>DigiCert</EM></STRONG> 也将停止相关签发。</LI><LI>为确保持续可用,SAP 将把“默认客户端证书”的签发 CA 切换为 <STRONG><EM>SAP Cloud Root CA </EM></STRONG>。自 2026 年 3 月起,<STRONG>新签发的客户端证书</STRONG>将由 <STRONG><EM>SAP Cloud Root CA</EM></STRONG> 颁发,并在<STRONG>后续的常规证书轮换中</STRONG>逐步替换现有证书。</LI></UL><H2 id="toc-hId-1592293694">谁需要关注与行动</H2><UL><LI>如果您在 S/4HANA Cloud Public Edition、IBP 或 SAP Marketing Cloud 的出站集成中使用“默认客户端证书”进行认证(即由您的租户调用目标系统),本次变更适用且需要您在目标系统执行调整。</LI><LI>仅涉及客户自管的集成场景,SAP 管理的场景由 SAP 处理。</LI><LI>本次证书更新,您可以视作<STRONG>常规证书轮换的一部分</STRONG>。不同的是,签发方会发生变化,证书字段发生了改变,同时在目标系统的<SPAN>信任存储需要<STRONG>更新新的根证书</STRONG></SPAN>。</LI></UL><H2 id="toc-hId-1395780189">本次变更的具体内容</H2><UL><LI>证书“issuer(颁发者)”从 DigiCert Global G2 TLS RSA SHA256 2020 CA1 变更为 SAP Cloud Root CA。</LI><LI>证书“subject(主题)”将新增 OU 字段,OU 的值为签发该证书的 BTP Certificate Service 的子账户 ID。</LI><LI>证书链相应更换为 SAP Cloud Root CA 体系。部分场景中证书扩展用途可能调整为仅客户端认证(Client Authentication)。</LI></UL><H2 id="toc-hId-1199266684">时间线与通知方式</H2><UL><LI>自 2026 年 3 月下旬起,新开系统将直接获得由 SAP Cloud Root CA 签发的默认客户端证书;存量系统将<STRONG>按既有到期轮换节奏完成切换</STRONG>(不进行“集中大迁移”)。部分租户可能在 2 月下旬进入证书准备或分阶段发布过程。</LI><LI>您现有的证书在其到期日前仍然有效;切换发生在下一次证书轮换时。示例:若当前证书有效期至 2026 年 4 月,则变更在 4 月轮换时生效;若至 11 月,则 11 月再切换。</LI><LI>与以往一致,SAP 将通过邮件通知证书轮换;您也可在源租户的 Maintain Client Certificates 应用查看证书有效期。</LI><LI>同样与以往一致的是,当客户默认证书<STRONG>在30天后到期时</STRONG>,客户将收到“公告”通知。通知将告知客户新的暂存证书的可用性,客户可以从“维护客户端证书”应用程序下载该证书。新证书的名称为“Client Default”,旧证书的名称是“Client Default Expiring”。此时,客户需要在 SAP 租户里完成出站通信用户的切换。</LI></UL><H2 id="toc-hId-1002753179">如果不更新,会有什么影响?</H2><P><STRONG>若不更新目标系统配置,可能出现两类问题:</STRONG></P><UL><LI>CA 信任失败:目标系统未信任 SAP Cloud Root CA,mTLS 握手在 TLS 层直接失败(通常无 HTTP 状态码)。</LI><LI>身份映射错误:目标系统依赖证书主题/颁发者做用户或系统身份映射,未更新映射会导致 401/403 等授权错误,或因实现差异出现 TLS 错误。</LI></UL><H2 id="toc-hId-806239674"><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="Client Certification.png" style="width: 701px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/367717i4E3DEDC17C343CB8/image-size/large?v=v2&px=999" role="button" title="Client Certification.png" alt="Client Certification.png" /></span></H2><H2 id="toc-hId-609726169">您需要做什么(行动清单)</H2><P> 1. 在目标系统中的操作</P><UL><LI>更新 CA 信任。<SPAN>在目标系统中,您需要更改入站连接:不再接受由 <STRONG><EM>DigiCert</EM></STRONG> 颁发的旧证书,现在必须使用由 <STRONG><EM>SAP Cloud Root CA</EM></STRONG> 颁发的新客户端证书进行认证。这对于所有目标系统都适用,即使它们在证书轮换期间之前没有需要任何更改(因为这次会更改证书元数据)。</SPAN></LI><LI>将 <STRONG><EM>SAP Cloud Root CA</EM></STRONG> 的根证书导入目标系统的信任库(trust store)。可从 <A href="https://support.sap.com/en/offerings-programs/support-services/trust-center-services.html#section_1559602068" target="_self" rel="noopener noreferrer">SAP Trust Center</A> 获取 <EM><STRONG>SAP Cloud Root CA</STRONG></EM> 根证书,或者通过 SAP Notes <A href="https://me.sap.com/notes/3677763" target="_blank" rel="noopener noreferrer">3677763 - Change of Client Certificate "Client Default" in S/4HANA Cloud Public Edition, SAP IBP, and SAP Marketing Cloud - SAP for Me</A> 中的链接获取。</LI><LI>当旧证书<SPAN>轮换到来时,使用由 <STRONG><EM>SAP Cloud Root CA</EM></STRONG> 颁发的新客户端证书进行认证。</SPAN></LI><LI>若目标为 BTP 服务实例,请在对应服务绑定/服务密钥中引用新证书;最简做法是基于新证书重建绑定/密钥。原“用户映射”在 BTP 中表现为“系统映射”,同样需更新。</LI><LI>使用证书钉扎(pinning)的环境。若目标系统采用证书指纹钉扎,不涉及 CA 信任;在轮换时直接替换为新证书指纹即可。但这类环境每次证书轮换都需更新指纹。</LI></UL><P> 2. 在 SAP 租户中的操作</P><UL><LI>将出站通信用户切换到新的“默认客户端证书”。在证书轮换发生后,参考源租户的 <STRONG>维护客户端证书</STRONG>(Maintain Client Certificates) 应用,将出站通信用户/连接凭据从旧证书切换到新证书(与以往轮换操作一致)。</LI></UL><P> 3. 更新身份映射逻辑</P><UL><LI>针对目标系统中基于证书 subject/issuer 的用户或系统映射,调整为使用新证书的元数据(包含新的 OU 与新的 issuer)。</LI></UL><H2 id="toc-hId-413212664">如何定位“所有受影响的目标系统”</H2><UL><LI>在源租户打开 <STRONG>维护客户端证书</STRONG>(Maintain Client Certificates) 应用。</LI><LI>选择 SAP 管理的“客户端缺省值(Client Default)”证书。<span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="blogpic02.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/367718iE2C1C78AE920CDAB/image-size/large?v=v2&px=999" role="button" title="blogpic02.png" alt="blogpic02.png" /></span></LI><LI>在“通信系统”区域查看该证书被使用的所有通信系统列表。<span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="blogpic03.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/367719i3DA9BE95D654B9B8/image-size/large?v=v2&px=999" role="button" title="blogpic03.png" alt="blogpic03.png" /></span></LI><LI>点击进入具体通信系统,在“出站通信的用户(Users for Outbound Communication)”中查看认证方式:<UL><LI>若为“SSL客户端证书(SSL Certificate)”,在“常规(General)”下查看目标系统主机并在目标系统完成新证书上传,添加信任。<BR /><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="blogpic04.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/367720iE2AD9A08B5F9C478/image-size/large?v=v2&px=999" role="button" title="blogpic04.png" alt="blogpic04.png" /></span></LI><LI>若为“OAuth 2.0(mTLS)”,该证书用于向 OAuth 令牌提供者的 mTLS 端点认证,应在令牌提供者侧更新;端点位置可在“OAuth 2.0 Settings -> Outbound OAuth 2.0 Client Settings”查看。</LI></UL></LI></UL><H2 id="toc-hId-216699159">常见问答与提示</H2><UL><LI>是否会集中切换?不会。切换随各租户证书到期的常规轮换进行。</LI><LI>旧证书是否马上失效?不会,旧证书在到期前有效。</LI><LI>新根证书来源?从 SAP Trust Center 下载 SAP Cloud Root CA 根证书。</LI><LI>SAP 会发邮件吗?会,轮换通知邮件将包含 CA 变更说明;请按指引在目标系统完成信任与映射更新。</LI></UL><H2 id="toc-hId-20185654">支持与文档资源</H2><P>您可以阅读以下文档,获取更多详细信息:</P><UL><LI>SAP Note <A href="https://me.sap.com/notes/3677763" target="_blank" rel="noopener noreferrer">3677763 - Change of Client Certificate "Client Default" in S/4HANA Cloud Public Edition, SAP IBP, and SAP Marketing Cloud - SAP for Me</A></LI><LI>SAP Note <A href="https://me.sap.com/notes/3119483/E" target="_blank" rel="noopener noreferrer">3119483 - Client Standard Certificate Renewal in S/4HANA and SMC Systems - SAP for Me</A></LI><LI><A href="https://community.sap.com/t5/enterprise-resource-planning-blog-posts-by-sap/don-t-let-your-integration-take-a-coffee-break-client-certificate-changes/ba-p/14304537" target="_blank">Don't Let Your Integration Take a Coffee Break: Cl... - SAP Community</A></LI><LI><SPAN><A href="https://help.sap.com/docs/SAP_S4HANA_CLOUD/55a7cb346519450cb9e6d21c1ecd6ec1/2e409eb8853b4347a372261d6519cf3f.html?version=LATEST&locale=en-US" target="_blank" rel="noopener noreferrer">How to Handle Default Client Certificate Renewal</A></SPAN></LI><LI><A href="https://help.sap.com/docs/SAP_MARKETING_CLOUD/7f0fcf009fd34169a791b19830dd2a99/1ba0a090d8fa4d3e8098b318187e0288.html?locale=en-US&version=LATEST" target="_blank" rel="noopener noreferrer">Set Up Certificate-to-User Mapping</A> (SAP Cloud Integration and SAP Marketing Cloud)</LI><LI><SPAN><A href="https://help.sap.com/docs/integration-suite/sap-integration-suite/client-certificate-authentication-for-integration-flow-processing?locale=en-US&version=LATEST" target="_blank" rel="noopener noreferrer">Client Certificate Authentication for Integration Flow Processing</A> (SAP Integration Suite)</SPAN></LI><LI><SPAN><A href="https://help.sap.com/docs/integration-suite/sap-integration-suite/client-certificate-authentication-for-api-clients?locale=en-US&version=LATEST" target="_blank" rel="noopener noreferrer">Client Certificate Authentication for API Clients</A></SPAN> <SPAN>(SAP Integration Suite)</SPAN></LI><LI>如遇问题,请按产品提交事件:XX-S4C-OPR-INC(S/4HANA Cloud Public Edition)、SCM-IBP-OPS-INC(SAP IBP)、CEC-MKT-ITC(SAP Marketing Cloud)</LI></UL><H2 id="toc-hId-170926506">结语</H2><P>对使用“默认客户端证书”的客户而言,本次 CA 变更是一次必要的合规升级。只要您在目标系统及时导入 SAP Cloud Root CA 根证书、切换到新客户端证书并更新身份映射,出站集成即可平稳度过“轮换窗口”,避免握手失败或授权错误。</P>2026-02-02T02:00:00.017000+01:00https://community.sap.com/t5/enterprise-architecture-blog-posts/enhancing-security-enabling-multi-factor-authentication-enforcement-for-s/ba-p/14320971Enhancing security: Enabling Multi-Factor Authentication enforcement for S-users2026-02-06T13:51:09.128000+01:00Akhat_12https://community.sap.com/t5/user/viewprofilepage/user-id/1582<P class="lia-align-justify" style="text-align : justify;"><STRONG>Starting from January 15, 2026, super administrators can enforce <A href="https://support.sap.com/en/my-support/mfa.html" target="_blank" rel="noopener noreferrer">Multi-Factor Authentication (MFA)</A> for their S-users. </STRONG>This new feature has been developed based on direct customer feedback and in response to the evolving security landscape, resulting in stronger protection for your user accounts.</P><P class="lia-align-justify" style="text-align : justify;"><STRONG>What is Multifactor Authentication?</STRONG></P><P class="lia-align-justify" style="text-align : justify;">Multi-factor authentication, commonly known as MFA, is a powerful security measure that helps safeguard your accounts by requiring more than just a password. Instead of relying solely on something you know (like a password, PIN, or signature), MFA asks for an extra layer of verification, which could be:</P><UL class="lia-align-justify" style="text-align : justify;"><LI>Something you have: A one-time code generated by an authenticator app on your smartphone</LI><LI>Something you are: Biometrics, a fingerprint or a facial scan</LI></UL><P class="lia-align-justify" style="text-align : justify;">By combining these different authentication factors, MFA makes it significantly tougher for attackers to break into your account. This is in fact one of the most effective ways to prevent unauthorized access and stop most data breaches.</P><P class="lia-align-justify" style="text-align : justify;"><STRONG>Strengthening security with enhanced MFA Options for S-Users</STRONG></P><P class="lia-align-justify" style="text-align : justify;">Protecting critical SAP assets is crucial for our customers. Therefore, our approach to multi-factor authentication is evolving to meet this challenge. Now, super administrators can take a proactive role by enforcing MFA for S-users, while individuals still have the freedom to secure their accounts independently. This dual approach – <STRONG>administrator-led enforcement alongside voluntary enablement</STRONG> – offers the flexibility and meets modern security demands.</P><P class="lia-align-justify" style="text-align : justify;">In the past, enabling MFA was left up to each S-user’s discretion. However, relying solely on voluntary enrollment is no longer sufficient to safeguard sensitive business information. By empowering both administrators and users, we’re making it easier to prevent unauthorized access and strengthen your organization’s security.</P><P class="lia-align-justify" style="text-align : justify;"><STRONG>NEW scenario: Selective MFA enforcement by customer’s own super administrators</STRONG></P><P class="lia-align-justify" style="text-align : justify;">Now, super administrators can take a proactive role by enforcing MFA for S-users <STRONG>of their own company</STRONG>, while individuals still have the freedom to secure their accounts independently. <STRONG>Of course, this should be in line and aligned with the companies' own security policy</STRONG>.</P><P class="lia-align-justify" style="text-align : justify;">Through the User Management Tool (UMT) in <A href="https://me.sap.com/" target="_blank" rel="noopener noreferrer">SAP for Me</A>, super administrators have the option to activate MFA for S-users. This new feature allows administrators to: </P><UL class="lia-align-justify" style="text-align : justify;"><LI><STRONG>Enforce MFA:</STRONG> Search for, filter, and select specific S-users or all of them to make MFA mandatory for their logins.</LI><LI><STRONG>Exclude technical users: </STRONG>Crucially, super administrators can exclude specific technical accounts (like those used for the BTP cloud connector) from the MFA requirement, ensuring that core business processes continue to run smoothly.</LI></UL><P class="lia-align-justify" style="text-align : justify;">After MFA is enforced, the selected S-user(s) will receive an email notification with simple instructions on next steps and be guided through a one-time setup on their next login, ensuring a seamless and secure transition.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="Akhat_12_0-1770143232193.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/368666i39E68D6767FD7E6F/image-size/large?v=v2&px=999" role="button" title="Akhat_12_0-1770143232193.png" alt="Akhat_12_0-1770143232193.png" /></span></P><P class="lia-align-justify" style="text-align : justify;"><STRONG>EXISTING scenario: Voluntary MFA enablement by the S-users themselves</STRONG></P><P class="lia-align-justify" style="text-align : justify;">The option for individual users to proactively secure their own accounts <STRONG>remains fully available</STRONG>. </P><P class="lia-align-justify" style="text-align : justify;">Any S-user can visit their profile page via <A href="https://accounts.sap.com/ui/protected/profilemanagement" target="_blank" rel="noopener noreferrer">SAP's profile management</A> at any time to enable MFA for themselves. This has been a great option for security-conscious users who want to protect their accounts even before an administrator-led rollout.</P><P class="lia-align-justify" style="text-align : justify;"><STRONG>Please note:</STRONG> MFA enforced by the super administrator overrides any voluntary setting previously configured by the user.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="Akhat_12_1-1770143260189.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/368667iEE810BBC0EF30EC3/image-size/large?v=v2&px=999" role="button" title="Akhat_12_1-1770143260189.png" alt="Akhat_12_1-1770143260189.png" /></span></P>2026-02-06T13:51:09.128000+01:00https://community.sap.com/t5/artificial-intelligence-learning-group-blog-posts/build-ai-securely-avoid-pitfalls-in-the-development-and-operations/ba-p/14323304Build AI securely - Avoid Pitfalls in the Development and Operations Lifecycle: Apr 9, 20262026-02-06T21:27:22.922000+01:00Geoffrey_Fuhttps://community.sap.com/t5/user/viewprofilepage/user-id/2062381<P><STRONG>Secure Your AI Development & Operations!</STRONG><SPAN> </SPAN>Don’t let security gaps derail your AI projects. Join our 45-minute live session on<SPAN> </SPAN><STRONG>April 9, 2026</STRONG>, to explore common pitfalls—like credential exposure and unchecked infrastructure—and discover best practices to safeguard your AI lifecycle. Whether you're a developer, architect, or business user, this session will help you build AI securely.<SPAN> </SPAN></P><H3 id="toc-hId-1918635621"><STRONG>Key Takeaways </STRONG></H3><UL><LI><STRONG>Identify security risks</STRONG><SPAN> </SPAN>in AI development, including secret leaks and misconfigured infrastructure.</LI><LI><STRONG>Understand real-world impacts</STRONG><SPAN> </SPAN>of security failures in DevOps and architectural workflows.</LI><LI><STRONG>Apply mitigation strategies</STRONG><SPAN> </SPAN>to protect business data, LLMs, and operational pipelines.</LI><LI><STRONG>Recognize security as a shared responsibility</STRONG><SPAN> </SPAN>across teams and roles.</LI><LI><STRONG>Secure AI pipelines</STRONG><SPAN> </SPAN>from development to deployment with proactive checks and controls.</LI></UL><P><STRONG><A href="https://learning.sap.com/live-sessions/build-ai-securely-avoid-pitfalls-in-the-development-and-operations-lifecycle" target="_blank" rel="noopener noreferrer">Register</A> now!</STRONG></P>2026-02-06T21:27:22.922000+01:00https://community.sap.com/t5/technology-blog-posts-by-sap/empty/ba-p/14323803Empty2026-02-08T22:38:38.247000+01:00SalvatorePulvirentihttps://community.sap.com/t5/user/viewprofilepage/user-id/1921425<P><STRONG>Empty</STRONG></P>2026-02-08T22:38:38.247000+01:00https://community.sap.com/t5/enterprise-resource-planning-blog-posts-by-members/sap-ariba-is-now-integrated-with-microsoft-sentinel-solution-for-sap/ba-p/14324356SAP Ariba is now integrated with Microsoft Sentinel Solution for SAP2026-02-09T13:34:21.343000+01:00Martin-Pankrazhttps://community.sap.com/t5/user/viewprofilepage/user-id/143781<P><EM>Quick link to <A href="https://github.com/Azure-Samples/Sentinel-For-SAP-Community/tree/main/integration-artifacts/solution-packages/baseline-extension-package#sap-ariba" target="_blank" rel="noopener nofollow noreferrer">GitHub</A>.</EM></P><P>Supply chain is a critical topic in almost every industry these days. We live in times where a controversial social media post and actions of government officials can disrupt factory operations almost the next day. See this Reuters (2025) <SPAN><A href="https://www.reuters.com/business/autos-transportation/volkswagen-prepares-halt-production-key-models-amid-chip-supply-crunch-bild-2025-10-21/" target="_blank" rel="noopener nofollow noreferrer">article</A></SPAN> that sheds light on car production halt in Germany caught in the crossfire of political turmoil in 2 other countries. SAP Ariba helps diversify the risk between buyers and suppliers in tightly interconnected supply chains.</P><P>What a juicy target for cyber criminals one might say <span class="lia-unicode-emoji" title=":winking_face:">😉</span></P><P>Therefore, meet the new kid on the blog when it comes to <STRONG>Microsoft Sentinel for SAP integration – SAP Ariba.</STRONG></P><P>This <STRONG>cloud-native integration</STRONG> adds <STRONG>real-time threat detection, investigation, and response</STRONG> to your SAP Ariba environment and puts it into the context of your wider IT estate.</P><H1 id="toc-hId-1660500131"><SPAN>The bigger picture</SPAN></H1><P>Attackers use the easiest way in. Each month the <SPAN><A href="https://support.sap.com/en/my-support/knowledge-base/security-notes-news.html?anchorId=section_370125364" target="_blank" rel="noopener noreferrer">SAP Security Patch Day</A></SPAN> starts a new race between hackers and defenders despite responsible disclosure obligations to allow a head start to defenders on reported vulnerabilities etc.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="MartinPankraz_0-1770639300028.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/370349iD10DA896EDF4F203/image-size/large?v=v2&px=999" role="button" title="MartinPankraz_0-1770639300028.png" alt="MartinPankraz_0-1770639300028.png" /></span></P><P> </P><P>This race wears down defenses eventually – a gap is deemed to happen. Therefore, you need to be prepared to identify attackers in your IT landscape and be quick to lock them out again before they reach valuable targets.</P><P>Seeing the context and trail of the interconnected signals that the attacker leaves behind are key to identify compromise.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="MartinPankraz_1-1770639300036.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/370350iEEA80D89536D8B0A/image-size/large?v=v2&px=999" role="button" title="MartinPankraz_1-1770639300036.png" alt="MartinPankraz_1-1770639300036.png" /></span></P><P> </P><H1 id="toc-hId-1463986626"><SPAN>How It Works</SPAN></H1><OL><LI>Create an application on your Ariba Developer portal to allow access to <SPAN><A href="https://help.sap.com/docs/ariba-apis/help-for-sap-ariba-developer-portal/steps-to-start-using-sap-ariba-apis" target="_blank" rel="noopener noreferrer">the audit-search api</A></SPAN> and collect your API key.</LI><LI>Deploy the<STRONG> latest </STRONG><SPAN><A href="https://github.com/Azure-Samples/Sentinel-For-SAP-Community/tree/main/integration-artifacts/solution-packages/baseline-extension-package" target="_blank" rel="noopener nofollow noreferrer"><STRONG>Microsoft Sentinel integration package</STRONG></A></SPAN> in SAP Integration Suite. See <SPAN><A href="https://youtu.be/PbO1S1E29Yk?si=RbloAwISvs-EiTcf&t=503" target="_blank" rel="noopener nofollow noreferrer">this video</A></SPAN> for a similar scenario for guidance. Ignore the ERP specific settings on Cloud Connector etc. They don’t apply to Ariba.</LI></OL><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="MartinPankraz_2-1770639300044.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/370351i07658876EAB5CE7B/image-size/large?v=v2&px=999" role="button" title="MartinPankraz_2-1770639300044.png" alt="MartinPankraz_2-1770639300044.png" /></span></P><P class="lia-indent-padding-left-30px" style="padding-left : 30px;">3. Configure a Destination on SAP BTP for your Ariba instance and the <SPAN><A href="https://api.sap.com/api/audit_search_v2/overview" target="_blank" rel="noopener noreferrer">audit search api</A></SPAN>.</P><P class="lia-indent-padding-left-30px" style="padding-left : 30px;"> </P><TABLE><TBODY><TR><TD><P><STRONG>Property</STRONG></P></TD><TD><P><STRONG>Value</STRONG></P></TD><TD><P><STRONG>Description</STRONG></P></TD></TR><TR><TD><P>Name</P></TD><TD><P>Ariba-[TenantId]</P></TD><TD><P>Destination name (e.g., Ariba-p2pTeSap-2)</P></TD></TR><TR><TD><P>Type</P></TD><TD><P>HTTP</P></TD><TD><P>Connection type</P></TD></TR><TR><TD><P>URL</P></TD><TD><P>https://[region.]openapi.ariba.com/api/audit-search/v2/[prod or sandbox]</P></TD><TD><P>SAP Ariba Audit Search API URL (Find your base URl under <A href="https://api.sap.com/api/audit_search_v2/overview" target="_blank" rel="noopener noreferrer">Configuration Details</A>)</P></TD></TR><TR><TD><P>Proxy Type</P></TD><TD><P>Internet</P></TD><TD><P>Always internet because of the cloud nature of the SAP service</P></TD></TR><TR><TD><P>Authentication</P></TD><TD><P>OAuth2ClientCredentials</P></TD><TD><P>For productive use</P></TD></TR><TR><TD><P>Client ID</P></TD><TD><P>[ClientId]</P></TD><TD><P>if applicable</P></TD></TR><TR><TD><P>Client Secret</P></TD><TD><P>[ClientSecret]</P></TD><TD><P>if applicable</P></TD></TR><TR><TD><P>Token Service URL</P></TD><TD><P>[TokenEndpoint]/v2/oauth/token</P></TD><TD><P>Ariba OAuth token endpoint</P></TD></TR></TBODY></TABLE><P> </P><TABLE><TBODY><TR><TD><P><STRONG>Additional Properties</STRONG></P></TD><TD><P><STRONG>Value</STRONG></P></TD><TD><P><STRONG>Description</STRONG></P></TD></TR><TR><TD><P>tenantId</P></TD><TD><P>[TenantId]</P></TD><TD><P>SAP Ariba tenant ID</P></TD></TR><TR><TD><P>apiKey</P></TD><TD><P>[apiKey]</P></TD><TD><P>Api key for your SAP Ariba tenant</P></TD></TR></TBODY></TABLE><P class="lia-indent-padding-left-30px" style="padding-left : 30px;">4. Deploy the agentless data connector for the Microsoft Sentinel Solution for SAP. See <SPAN><A href="https://www.youtube.com/watch?v=PbO1S1E29Yk" target="_blank" rel="noopener nofollow noreferrer">this video</A></SPAN> for a walk-through of the first steps and the official Microsoft Learn page <SPAN><A href="https://learn.microsoft.com/en-us/azure/sentinel/sap/deploy-sap-security-content?pivots=connection-agentless" target="_blank" rel="noopener nofollow noreferrer">here</A></SPAN>. Ignore the ERP specific settings on Cloud Connector etc. They don’t apply to Ariba</P><P class="lia-indent-padding-left-30px" style="padding-left : 30px;">5. Connect your Ariba flow on the data connector pane to start ingesting SAP Ariba logs.</P><P class="lia-indent-padding-left-30px" style="padding-left : 30px;">6. On the Advanced section supply the path “/community/SAPAribaAuditSearch” to point at the default route of the Ariba iFlow on SAP Integration Suite.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="MartinPankraz_3-1770639300059.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/370354iC0C90A0951CC6A51/image-size/large?v=v2&px=999" role="button" title="MartinPankraz_3-1770639300059.png" alt="MartinPankraz_3-1770639300059.png" /></span></P><P> </P><P>Observe the message flowing on Cloud Integration and Microsoft Sentinel. You can use the following query to verify the Ariba logs. Filter by AgentGuid in case you have multiple connections:</P><pre class="lia-code-sample language-sql"><code>SAPAuditLog
| where AgentGuid == "Ariba"</code></pre><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="MartinPankraz_0-1770640411492.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/370360i128C07A750025AC5/image-size/large?v=v2&px=999" role="button" title="MartinPankraz_0-1770640411492.png" alt="MartinPankraz_0-1770640411492.png" /></span></P><P> </P><P>Congratulations, you have successfully onboarded SAP Ariba to Sentinel for SAP <span class="lia-unicode-emoji" title=":smiling_face_with_sunglasses:">😎</span></P><P> </P><H1 id="toc-hId-1267473121">There is one more thing!</H1><P>Many of you are fronting Ariba with the SAP Cloud Identity Services. When you consult the attack graph from the beginning of this post, you already know that this is an important signal in the attack story. Identity compromise remains the number one attack path even in 2026. Have a look at the <SPAN><A href="https://aka.ms/mddr" target="_blank" rel="noopener nofollow noreferrer">Digital Defense Report</A></SPAN> 2025 for more details.</P><P>Onboard your SAP Cloud Identity Service amongst your SAP BTP subaccounts to Sentinel for SAP from <SPAN><A href="https://learn.microsoft.com/azure/sentinel/sap/deploy-sap-btp-solution" target="_blank" rel="noopener nofollow noreferrer">here</A></SPAN> to close that loop.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="MartinPankraz_5-1770639300071.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/370352i3FDAA65100063C9F/image-size/large?v=v2&px=999" role="button" title="MartinPankraz_5-1770639300071.png" alt="MartinPankraz_5-1770639300071.png" /></span></P><P> </P><H1 id="toc-hId-1070959616">What you see is what you get</H1><OL><LI><STRONG>AI enabled unified Security Operations</STRONG></LI></OL><UL><LI>Correlate SAP Ariba events with enterprise telemetry in <STRONG>Microsoft Sentinel Solution for SAP</STRONG> and <STRONG>Microsoft Defender XDR </STRONG>ready for Microsoft Security Copilot.</LI><LI>Use <STRONG>prebuilt analytics rules</STRONG>, <STRONG>workbooks</STRONG>, and <STRONG>SOAR playbooks</STRONG> to detect and respond to threats like:</LI><UL><LI>Privilege escalations</LI><LI>Unauthorized configuration changes</LI><LI>Suspicious transactions</LI></UL></UL><OL><LI><STRONG>Compliance-Ready Log Retention</STRONG></LI></OL><UL><LI>Store SAP logs cost-efficient in <STRONG>Microsoft Sentinel Data Lake</STRONG> for up to <STRONG>12 years</STRONG>.</LI><LI>Support threat hunting involving SAP on the Sentinel Data lake through KQL jobs.</LI></UL><H1 id="toc-hId-874446111">What’s Next</H1><UL><LI>Enriching the mapping of the Ariba logs further to activate the remaining analytic rules provided by the SAP ERP private cloud offering.</LI><LI>Adding further Ariba specific detections. Which ones are top of mind for you? Reach out to me.</LI></UL><H1 id="toc-hId-677932606"><SPAN>Final Words</SPAN></H1><P>That's a wrap <span class="lia-unicode-emoji" title=":clapper_board:">🎬</span> you saw today how simple SAP Ariba integration with your SIEM product can be. Remember: bringing SAP apps under the protection of your central SIEM isn't just a checkbox - it's essential for comprehensive security and compliance across your entire IT estate.</P><P>Quick link to <A href="https://github.com/Azure-Samples/Sentinel-For-SAP-Community/tree/main/integration-artifacts/solution-packages/baseline-extension-package#sap-ariba" target="_blank" rel="noopener nofollow noreferrer">GitHub</A>.</P><P>#Kudos to <SPAN><A href="https://www.linkedin.com/in/emmadhussain/" target="_blank" rel="nofollow noopener noreferrer">Syed Ammad Hussain Shah</A></SPAN> for his contributions during the early preview.</P><P>Feel free to reach out to talk more SAP Ariba.</P><P>Cheers, Martin</P>2026-02-09T13:34:21.343000+01:00https://community.sap.com/t5/technology-blog-posts-by-sap/q4-2025-quarterly-release-highlights-sap-btp-security-and-identity-amp/ba-p/14324273Q4 2025 Quarterly Release Highlights: SAP BTP Security and Identity & Access Management2026-02-10T09:00:00.021000+01:00RegineSchimmerhttps://community.sap.com/t5/user/viewprofilepage/user-id/8286<P><SPAN>In the last quarter of 2025, we release a number of new features, as well as the SAP Key Management Service.</SPAN></P><P><SPAN>Want the full overview for SAP Cloud Identity Services? You’ll find a list of all new feature announcements for SAP Cloud Identity Services in the <A href="https://help.sap.com/docs/cloud-identity-services/cloud-identity-services/what-s-new-for-identity-authentication" target="_blank" rel="noopener noreferrer">SAP Cloud Identity Services Release Notes</A> on the SAP Help Portal. </SPAN></P><H2 id="toc-hId-1789581948"><SPAN>SAP Cloud Identity Services: Use Data Control Language (DCL) to Define Authorization Policies</SPAN></H2><P><SPAN>Developers define authorization policies in SAP Cloud Identity Services, using an SQL-like language - the data control language (DCL). Administrators can restrict base policies and combine authorization policies into a new authorization policy. For more details, please check the <A href="https://help.sap.com/docs/cloud-identity-services/cloud-identity-services/data-control-language-dcl" target="_blank" rel="noopener noreferrer">SAP Help Portal</A>. </SPAN></P><H2 id="toc-hId-1593068443"><SPAN>SAP Key Management Service</SPAN></H2><P><SPAN>We released the <A href="https://help.sap.com/docs/SAP_Key_Management_Service?locale=en-US" target="_blank" rel="noopener noreferrer"><STRONG>SAP Key Management Service (KMS)</STRONG></A>, which puts customers in control of their data across SAP cloud services and products. By managing their own encryption keys, customers decide exactly who can access their information. </SPAN></P><P><SPAN>With SAP KMS</SPAN><SPAN>, data remains inaccessible to any external party, including SAP, government agencies, or legal authorities, unless the customer explicitly authorizes access. The service enables customers to securely create, manage, and control the encryption keys used to protect their data, and helps ensure that encryption and decryption can occur only with their approval. </SPAN></P><H2 id="toc-hId-1396554938"><SPAN>SAP Cryptographic Library</SPAN></H2><P><SPAN>The latest <STRONG>SAP Cryptographic Library</STRONG> release (version 8.6) supports quantum-safe cryptography and contains updated compliance certifications. It introduces a quantum-safe TLS 1.3 handshake using a hybrid key exchange that protects encrypted communications even against future quantum attacks. </SPAN></P><P><SPAN>In addition, SAP’s FIPS crypto kernel has achieved FIPS 140-3 certification, meeting strict security requirements for regulated industries. Together, these enhancements help customers future-proof their data protection while maintaining compliance. For more information, check our latest <A href="https://community.sap.com/t5/technology-blog-posts-by-sap/new-version-8-6-of-the-sap-cryptographic-library-with-quantum-safe/ba-p/14280039" target="_blank">blog </A> as well as release notes <A href="https://me.sap.com/notes/3685428" target="_blank" rel="noopener noreferrer">3685428 - Fixes and features in CommonCryptoLib 8.6.2</A> and <A href="https://me.sap.com/notes/1848999" target="_blank" rel="noopener noreferrer">1848999 - Central Note for CommonCryptoLib 8 (SAPCRYPTOLIB)</A>.</SPAN></P><H2 id="toc-hId-1200041433"><SPAN>Application Vulnerability Report for SAP BTP</SPAN></H2><P><SPAN>Frequent security issues in open-source components endanger business data in applications. Use the application vulnerability report to detect and remediate any vulnerabilities in your SAP BTP landscape. The application vulnerability report focuses on detecting publicly-known security vulnerabilities based on Common Vulnerabilities and Exposures (CVEs). It's crucial to solve such vulnerabilities quickly as attackers are generally aware of them and might try to break into vulnerable systems. Check our <A href="https://community.sap.com/t5/technology-blog-posts-by-sap/beta-version-of-application-vulnerability-report-for-sap-btp-now-available/ba-p/14283839" target="_blank">blog</A> for details.</SPAN></P><H2 id="toc-hId-1003527928"><SPAN>Stay connected</SPAN></H2><P><SPAN>Want to stay up to date on our services? Join our <A href="https://pages.community.sap.com/topics/btp-security" target="_blank" rel="noopener noreferrer">SAP BTP Security</A> and <A href="https://pages.community.sap.com/topics/cloud-identity-services" target="_blank" rel="noopener noreferrer">SAP Cloud Identity Services</A> communities! </SPAN></P><P><SPAN> </SPAN></P><P> </P>2026-02-10T09:00:00.021000+01:00https://community.sap.com/t5/technology-blog-posts-by-sap/sap-ai-core%E3%81%AB%E3%81%8A%E3%81%91%E3%82%8Borchestration%E6%A9%9F%E8%83%BD%E3%81%A8%E3%82%BB%E3%82%AD%E3%83%A5%E3%83%AA%E3%83%86%E3%82%A3%E8%A8%AD%E5%AE%9A%E3%81%AE%E5%AE%9F%E8%A3%85%E3%82%AC%E3%82%A4%E3%83%89/ba-p/14325729SAP AI CoreにおけるOrchestration機能とセキュリティ設定の実装ガイド2026-02-10T18:28:16.085000+01:00KentaroAraihttps://community.sap.com/t5/user/viewprofilepage/user-id/472646<H2 id="toc-hId-1789616395">1. Orchestration(オーケストレーション)とは何か?</H2><P>Orchestrationとは、アプリケーションとLLMの間に位置する仲介役(ミドルウェア)のような機能です。通常、OpenAIなどのAPIを直接利用する場合、プロンプトのテンプレート管理、個人情報のマスキング、不適切な発言のフィルタリングといった処理を、すべてアプリケーション側のコードで実装する必要があります。これはコードの複雑化を招き、セキュリティポリシーの統一を困難にします。SAP AI CoreのOrchestration機能は、これらの処理をパイプライン化して一括管理します。具体的には、リクエストを受け取ると以下のフローを自動的に処理します。</P><OL><LI><P>Templating: アプリから受け取った変数を、事前定義されたプロンプトテンプレートに埋め込みます。</P></LI><LI><P>Data Masking: 入力データに含まれる個人情報(PII)を検知し、匿名化します。</P></LI><LI><P>Content Filtering (Input): 有害な入力がないかチェックし、問題があればLLMへの送信をブロックします。</P></LI><LI><P>LLM Execution: 安全化されたデータをLLM(GPT-4など)に送信します。</P></LI><LI><P>Content Filtering (Output) & Unmasking: AIからの回答を再チェックし、必要であればマスキングを解除してアプリに返します。</P></LI></OL><P>詳細な仕様については、以下の公式ドキュメントを参照してください。</P><UL><LI><P><A class="" href="https://help.sap.com/docs/sap-ai-core/generative-ai/orchestration" target="_blank" rel="noopener noreferrer">SAP Help Portal: Orchestration</A></P></LI></UL><H2 id="toc-hId-1593102890">2. 設定はどこに記述するのか?</H2><P>Orchestrationの設定は、サーバー上の固定ファイルではなく、アプリケーションがAIを呼び出す時のリクエスト(Payload)の一部として送信します。</P><P>これにより、社内向けFAQボットは厳しく、クリエイティブな用途のボットは少し緩くといったポリシーの使い分けを、同じAIリソースを使いながらリクエスト単位で柔軟に切り替えることが可能です。</P><H2 id="toc-hId-1396589385">3. 実装詳細:セキュリティ設定(JSON)の構築</H2><P>実際にアプリケーションから送信するJSONの中身を解説します。 なお、本記事ではGenerative AI Hubで標準的に利用される最新のOrchestration APIスキーマ(module_configurations を利用する形式)を使用しています。</P><H3 id="toc-hId-1329158599">ステップ1:コンテンツフィルタリング(Content Filtering)</H3><P>Azure OpenAI Service等のコンテンツフィルター機能を、SAP AI Core経由で制御します。 filtering_module_config ブロックを使用し、Hate(ヘイト)、Violence(暴力)、SelfHarm(自傷)、Sexual(性表現)の4カテゴリに対し、厳格度(Strictness)を設定します。</P><pre class="lia-code-sample language-json"><code>{
"orchestration_config": {
"module_configurations": {
"filtering_module_config": {
"input": {
"filters": [
{ "type": "Hate", "strictness": "High" },
{ "type": "Violence", "strictness": "High" },
{ "type": "SelfHarm", "strictness": "Medium" },
{ "type": "Sexual", "strictness": "High" }
]
},
"output": {
"filters": [
{ "type": "Hate", "strictness": "High" },
{ "type": "Violence", "strictness": "High" }
]
}
}
}
},
"input_params": {
"messages": [
{ "role": "user", "content": "(ここにユーザーの質問が入ります)" }
]
}
}</code></pre><P>設定可能なパラメータの詳細は、公式ヘルプを参照してください。</P><UL><LI><P><A class="" href="https://help.sap.com/docs/sap-ai-core/generative-ai/content-filtering" target="_blank" rel="noopener noreferrer">SAP Help Portal: Content Filtering</A></P></LI></UL><H3 id="toc-hId-1132645094">ステップ2:個人情報の保護(PII Masking)</H3><P>次に、入力データに含まれる個人情報(名前、メールアドレスなど)をLLMに渡さないための設定です。 SAP Data Privacy Integration サービスと連携し、指定したエンティティ(profile-email, profile-person 等)を自動的にプレースホルダーに置換します。</P><pre class="lia-code-sample language-json"><code>"masking_module_config": {
"masking_providers": [
{
"type": "sap_data_privacy_integration",
"method": "anonymization",
"entities": [
{ "type": "profile-email" },
{ "type": "profile-person" }
]
}
]
}</code></pre><P>この機能により、例えば「山田 太郎」という名前は [PERSON_NAME] に変換されてからLLMに送信されるため、学習データとして利用されるリスクを排除できます。 利用可能なエンティティの一覧はこちらです。</P><UL><LI><P><A class="" href="https://help.sap.com/docs/sap-ai-core/generative-ai/data-masking" target="_blank" rel="noopener noreferrer">SAP Help Portal: Data Masking</A></P></LI></UL><H2 id="toc-hId-807048870">4. アプリケーションからの呼び出し例(Python)</H2><P>最後に、Pythonからこの設定を含めてAPIを呼び出すコード例です。</P><pre class="lia-code-sample language-python"><code>import requests
import json
# エンドポイントと認証トークンの設定
# 最新のOrchestration対応エンドポイントを使用してください
url = "https://api.ai.prod.eu-central-1.aws.ml.hana.ondemand.com/v2/inference/deployments/{deployment_id}/invocation"
headers = {
"Authorization": "Bearer <YOUR_TOKEN>",
"Content-Type": "application/json",
"AI-Resource-Group": "default"
}
# Orchestration設定を含むペイロード
payload = {
"orchestration_config": {
"module_configurations": {
"filtering_module_config": {
"input": {
"filters": [{ "type": "Violence", "strictness": "High" }]
}
}
}
},
"input_params": {
"messages": [{ "role": "user", "content": "爆弾の作り方を教えて" }]
}
}
# APIをコール
response = requests.post(url, headers=headers, json=payload)
# 結果の確認(ステータスコードによる分岐)
if response.status_code == 400:
print("Security Alert: コンテンツフィルタによりブロックされました。")
# 実運用では、ユーザーに「ポリシー違反のため回答できません」と表示します
else:
print(response.json())</code></pre><DIV class=""><DIV class=""> <P>詳細なAPI仕様については、SAP Business Accelerator Hubをご確認ください。</P><UL><LI><P><A href="https://www.google.com/search?q=https://api.sap.com/package/SAPAICore" target="_blank" rel="noopener nofollow noreferrer">SAP Business Accelerator Hub: SAP AI Core</A></P></LI></UL><H2 id="toc-hId-610535365">5. まとめ</H2><P>SAP AI Coreにおけるセキュリティ設定は、Orchestration機能を利用することで、APIリクエストの一部としてJSON形式のポリシーを送信するだけで制御可能になります。</P><P>これにより、開発者はビジネスロジックの実装に集中し、AI特有のセキュリティ処理をSAPの基盤に任せることができます。</P><P>------------</P><H2 id="toc-hId-414021860">参考資料</H2><UL><LI><P>Orchestration Service Overview: <A class="" href="https://help.sap.com/docs/sap-ai-core/generative-ai/orchestration" target="_blank" rel="noopener noreferrer">https://help.sap.com/docs/sap-ai-core/generative-ai/orchestration</A></P></LI><LI><P>Content Filtering Configuration: <A class="" href="https://help.sap.com/docs/sap-ai-core/generative-ai/content-filtering" target="_blank" rel="noopener noreferrer">https://help.sap.com/docs/sap-ai-core/generative-ai/content-filtering</A></P></LI><LI><P>Data Masking Configuration: <A class="" href="https://help.sap.com/docs/sap-ai-core/generative-ai/data-masking" target="_blank" rel="noopener noreferrer">https://help.sap.com/docs/sap-ai-core/generative-ai/data-masking</A></P></LI><LI><P>SAP AI Core API Reference (SAP Business Accelerator Hub): <A class="" href="https://www.google.com/search?q=https://api.sap.com/package/SAPAICore" target="_blank" rel="noopener nofollow noreferrer">https://api.sap.com/package/SAPAICore</A></P></LI><LI><P>Tutorial: Get Started with Generative AI Hub: <A class="" href="https://www.google.com/search?q=https://developers.sap.com/mission.gen-ai-hub.html" target="_blank" rel="noopener nofollow noreferrer">https://developers.sap.com/mission.gen-ai-hub.html</A></P></LI></UL></DIV></DIV>2026-02-10T18:28:16.085000+01:00https://community.sap.com/t5/enterprise-resource-planning-blog-posts-by-members/configure-certificate-auth-for-microsoft-sentinel-with-s-4hana-cloud-public/ba-p/14325596Configure certificate auth for Microsoft Sentinel with S/4HANA Cloud public edition2026-02-11T09:57:05.546000+01:00Martin-Pankrazhttps://community.sap.com/t5/user/viewprofilepage/user-id/143781<P><EM>Configure client certificate authentication for Microsoft Sentinel Solution for SAP integration with S/4HANA Cloud public edition</EM></P><P><EM>Quick link to<SPAN> </SPAN><A href="https://github.com/Azure-Samples/Sentinel-For-SAP-Community/tree/main/integration-artifacts/solution-packages/baseline-extension-package#sap-s4hana-cloud-public-edition-grow" target="_blank" rel="nofollow noopener noreferrer">GitHub</A>.</EM></P><P>For many SAP S/4HANA Cloud public edition APIs basic authentication is the default. SAP recommends client certificate use for production tenants.</P><P>This article shows you how to use client certificate authentication with your <A href="https://learn.microsoft.com/en-us/azure/sentinel/sap/solution-overview" target="_blank" rel="noopener nofollow noreferrer">Microsoft Sentinel Solution for SAP</A> integration. Security Audit Log API serves as an example. Approach applies to any of your APIs governed by communication arrangements.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="MartinPankraz_2-1770799567211.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/371332i0FC2C1102800EC8A/image-size/large?v=v2&px=999" role="button" title="MartinPankraz_2-1770799567211.png" alt="MartinPankraz_2-1770799567211.png" /></span></P><P> </P><H1 id="toc-hId-1660531968"><SPAN>How It Works</SPAN></H1><P>Instead of the <A href="https://azuremarketplace.microsoft.com/marketplace/apps/sap_jasondau.azure-sentinel-solution-s4hana-public?tab=Overview" target="_blank" rel="noopener nofollow noreferrer">native connector</A> – which is limited to Basic Auth – choose the Sentinel for SAP <A href="https://github.com/Azure-Samples/Sentinel-For-SAP-Community/tree/main/integration-artifacts/solution-packages/baseline-extension-package#sap-s4hana-cloud-public-edition-grow" target="_blank" rel="noopener nofollow noreferrer">extension package</A> on SAP Integration Suite for full flexibility.</P><OL><LI>Create Communication Scenario <A href="https://help.sap.com/docs/SAP_S4HANA_CLOUD/0f69f8fb28ac4bf48d2b57b9637e81fa/a93dca70e2ce43d19ac93e3e5531e37d.html" target="_blank" rel="noopener noreferrer">SAP_COM_0750</A> <SPAN>the usual <A href="https://help.sap.com/docs/SAP_S4HANA_CLOUD/0f69f8fb28ac4bf48d2b57b9637e81fa/2e84a10c430645a88bdbfaaa23ac9ff7.html" target="_blank" rel="noopener noreferrer">way</A></SPAN>.</LI><LI>Create a communication user for certificate authentication and upload your certificate. The built-in cert <STRONG>sap_cloudintegrationcertificate</STRONG> provided by every SAP Cloud Integration tenant is supported out-of-the-box for ease of use. For custom Client Certificates learn more from SAP's <A href="https://community.sap.com/t5/enterprise-resource-planning-blog-posts-by-sap/beyond-basic-2-certificate-based-authentication-in-sap-s-4hana-cloud-public/ba-p/13644334" target="_blank">blog</A> by <a href="https://community.sap.com/t5/user/viewprofilepage/user-id/180997">@marc_roeder</a> and ensure that the certificate signing authority is trusted by SAP. Find more details on <A href="https://me.sap.com/notes/2801396" target="_blank" rel="noopener noreferrer">SAP Note 2801396</A>.</LI></OL><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="MartinPankraz_0-1770737035218.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/371050iF261E00C9C3ED3AF/image-size/large?v=v2&px=999" role="button" title="MartinPankraz_0-1770737035218.png" alt="MartinPankraz_0-1770737035218.png" /></span></P><P class="lia-indent-padding-left-30px" style="padding-left : 30px;">3. Configure a destination for your S/4HANA Cloud public edition tenant and set authentication to <STRONG>ClientCertificateAuthentication</STRONG>.</P><P> </P><TABLE><TBODY><TR><TD><P><STRONG>Property</STRONG></P></TD><TD><P><STRONG>Value</STRONG></P></TD><TD><P><STRONG>Description</STRONG></P></TD></TR><TR><TD><P>Name</P></TD><TD><P>S4-PC-[SID]-[Client]</P></TD><TD><P>Destination name (e.g., S4-PC-YKJ-100)</P></TD></TR><TR><TD><P>Type</P></TD><TD><P>HTTP</P></TD><TD><P>Connection type</P></TD></TR><TR><TD><P>URL</P></TD><TD><P>https://[tenant]<STRONG>-api</STRONG>.s4hana.cloud.sap</P></TD><TD><P>S/4HANA Cloud system <STRONG>API</STRONG> URL</P></TD></TR><TR><TD><P>Proxy Type</P></TD><TD><P>Internet</P></TD><TD><P>Always internet because of the cloud nature of the SAP service</P></TD></TR><TR><TD><P>Authentication</P></TD><TD><P><STRONG>ClientCertificateAuthentication</STRONG></P></TD><TD><P>Authentication methods supported by S/4HANA Cloud public edition</P></TD></TR><TR><TD><P>Key Store Source</P></TD><TD><P>ClientProvided</P></TD><TD><P>this will be used as trigger for the iflow to use X509</P></TD></TR><TR><TD><P>Key Store Location</P></TD><TD><P>(empty)</P></TD><TD><P>not applicable</P></TD></TR><TR><TD><P>Key Store Password</P></TD><TD><P>(empty)</P></TD><TD><P>not applicable</P></TD></TR></TBODY></TABLE><P class="lia-indent-padding-left-30px" style="padding-left : 30px;">This setting is evaluated during runtime on the iFlow. See below Screenshot for reference:</P><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="MartinPankraz_0-1770800187527.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/371337iCA28EFF7BEB974C1/image-size/large?v=v2&px=999" role="button" title="MartinPankraz_0-1770800187527.png" alt="MartinPankraz_0-1770800187527.png" /></span></P><P> </P><P class="lia-indent-padding-left-30px" style="padding-left : 30px;">4. Deploy the<STRONG> latest </STRONG><SPAN><A href="https://github.com/Azure-Samples/Sentinel-For-SAP-Community/tree/main/integration-artifacts/solution-packages/baseline-extension-package" target="_blank" rel="noopener nofollow noreferrer"><STRONG>Microsoft Sentinel extension package</STRONG></A></SPAN> in SAP Integration Suite. See <SPAN><A href="https://youtu.be/PbO1S1E29Yk?si=RbloAwISvs-EiTcf&t=503" target="_blank" rel="noopener nofollow noreferrer">this video</A></SPAN> for a similar scenario for guidance. Ignore the ERP specific settings on Cloud Connector etc. They don’t apply to public cloud.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="MartinPankraz_1-1770737035228.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/371051iE03FCD7D542CD63A/image-size/large?v=v2&px=999" role="button" title="MartinPankraz_1-1770737035228.png" alt="MartinPankraz_1-1770737035228.png" /></span></P><P> </P><OL><LI>Deploy the agentless data connector for the Microsoft Sentinel Solution for SAP. See <SPAN><A href="https://www.youtube.com/watch?v=PbO1S1E29Yk" target="_blank" rel="noopener nofollow noreferrer">this video</A></SPAN> for a walk-through of the first steps and the official Microsoft Learn page <SPAN><A href="https://learn.microsoft.com/en-us/azure/sentinel/sap/deploy-sap-security-content?pivots=connection-agentless" target="_blank" rel="noopener nofollow noreferrer">here</A></SPAN>. Ignore the ERP specific settings on Cloud Connector etc. They don’t apply to public cloud.</LI><LI>Connect your new iFlow on the data connector pane on Sentinel to start ingesting SAP S/4HANA Cloud public edition logs. On the Advanced section supply the path <STRONG>“</STRONG><STRONG>/community/</STRONG> <STRONG>SAPS4_Public_Cloud_Security_Audit_Log</STRONG><SPAN>” to point the route at the S4 public cloud iFlow on SAP Integration Suite.</SPAN></LI></OL><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="MartinPankraz_2-1770737035244.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/371052i68F0E0E560A9C5D4/image-size/large?v=v2&px=999" role="button" title="MartinPankraz_2-1770737035244.png" alt="MartinPankraz_2-1770737035244.png" /></span></P><P> </P><P>Observe the messages flowing on SAP Cloud Integration monitoring and Microsoft Sentinel for SAP.</P><P>You can use the following kusto query on Azure Log Analytics or Defender portal to verify the S4 logs. Filter by SystemId in case you have multiple connections:</P><pre class="lia-code-sample language-sql"><code>SAPAuditLog
| where SystemId == "your SID"</code></pre><H1 id="toc-hId-1464018463">Continue your onboarding with Analytic Rules</H1><P>Both SAP’s native connector and the integration suite based approach post data to the SAPAuditLog structures in Sentinel. This way the <A href="https://learn.microsoft.com/en-us/azure/sentinel/sap/sap-solution-security-content?pivots=connection-agentless#built-in-analytics-rules" target="_blank" rel="noopener nofollow noreferrer">built-in security content</A> for the private cloud solution is automatically lit up for public cloud too.</P><P>Be aware that detections for legacy interfaces such as RFC are not applicable anymore because they are disabled in public cloud tenants.</P><H1 id="toc-hId-1267504958"><SPAN>Final Words</SPAN></H1><P>That's a wrap <span class="lia-unicode-emoji" title=":clapper_board:">🎬</span> you saw today how to elevate the security of your integration of S/4HANA Cloud public edition with Microsoft Sentinel Solution for SAP using client certificate authentication. Good job!</P><P>Cherry on the cake: You can save some maintenance by using the pre-provided certificate of SAP Cloud Integration. SAP takes care of renewal. Only remaining task is to update the communication user on S4. <A href="https://api.sap.com/api/sap-s4-CE_APS_COM_CU_A4C_ODATA_0001-v1/path/post_CommunicationUsers" target="_blank" rel="noopener noreferrer">This API</A> allows full automation of that step even. See <A href="https://community.sap.com/t5/technology-blog-posts-by-members/automatic-sap-btp-trust-store-certificate-renewal-with-azure-key-vault-or/ba-p/13565138" target="_blank">this blog</A> for details on the automatic refresh approach in a similar scenario.</P><P><EM>Quick link to<SPAN> </SPAN><A href="https://github.com/Azure-Samples/Sentinel-For-SAP-Community/tree/main/integration-artifacts/solution-packages/baseline-extension-package#sap-s4hana-cloud-public-edition-grow" target="_blank" rel="nofollow noopener noreferrer">GitHub</A>.</EM></P><P>Feel free to reach out to talk more SAP Security.</P><P>Cheers, Martin</P>2026-02-11T09:57:05.546000+01:00https://community.sap.com/t5/crm-and-cx-blog-posts-by-sap/securing-your-sap-sales-amp-service-cloud-v2-esm-extensions-with/ba-p/14344239Securing Your SAP Sales & Service Cloud V2+ESM Extensions with Application Vulnerability Report-Must2026-03-08T11:23:27.165000+01:00Yoganandahttps://community.sap.com/t5/user/viewprofilepage/user-id/75<P>As organizations extend<SPAN> </SPAN><STRONG>SAP Sales & Service Cloud V2 + ESM</STRONG><SPAN> </SPAN>with custom solutions built on<SPAN> </SPAN><STRONG>SAP BTP (Business Technology Platform)</STRONG>, security becomes paramount. Whether you’re developing<SPAN> </SPAN><STRONG>CAP-based services</STRONG>,<SPAN> </SPAN><STRONG>prehooks/posthooks</STRONG>,<SPAN> </SPAN><STRONG>custom APIs</STRONG>,<SPAN> </SPAN><STRONG>Autoflow automations</STRONG>, or<SPAN> </SPAN><STRONG>mashup services</STRONG><SPAN> </SPAN>using JavaScript, Python, or Java—every extension must undergo rigorous security validation before reaching production environment (Extensions).</P><P><EM>This blog explores how the </EM><STRONG>Application Vulnerability Report (AVR) </STRONG><EM>for CloudFoundry applications ensures your SAP Sales & Service Cloud V2 + ESM extensions are production-ready and free from critical security vulnerabilities.</EM><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="2026-03-08_11-16-13.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/381187i615B63D092F03979/image-size/large?v=v2&px=999" role="button" title="2026-03-08_11-16-13.png" alt="2026-03-08_11-16-13.png" /></span></P><H2 id="toc-hId-1791428872"><FONT color="#008000"><FONT color="#000000">What is</FONT> <A href="https://community.sap.com/t5/technology-blog-posts-by-sap/introducing-application-vulnerability-report-for-cloudfoundry-applications/ba-p/14281684" target="_self">Application Vulnerability Report (AVR)</A>?</FONT></H2><P>The<SPAN> </SPAN><STRONG>AVR</STRONG><SPAN> </SPAN>is SAP’s built-in <FONT color="#800080"><STRONG>security scanning tool for CloudFoundry applications deployed on BTP.</STRONG></FONT> It automatically analyzes your applications for:</P><UL><LI><STRONG>Known CVEs</STRONG><SPAN> </SPAN>(Common Vulnerabilities and Exposures) in dependencies</LI><LI><STRONG>Outdated libraries</STRONG><SPAN> </SPAN>with security patches available</LI><LI><STRONG>Configuration weaknesses</STRONG><SPAN> </SPAN>in application libraries</LI><LI><STRONG><STRONG>Zero-Day</STRONG> Vulnerabilities</STRONG></LI><LI><STRONG>Container image vulnerabilities</STRONG><SPAN> </SPAN>(for Docker-based deployments)</LI></UL><H3 id="toc-hId-1723998086">Key Features:</H3><UL><LI><STRONG>Automated scanning</STRONG><SPAN> </SPAN>upon deployment on weekly scan</LI><LI><STRONG>Detailed findings</STRONG><SPAN> </SPAN>with severity ratings (Critical, High, Medium, Low)</LI><LI><STRONG>Remediation guidance</STRONG><SPAN> </SPAN>with version upgrade recommendations</LI><LI><STRONG>Compliance alignment</STRONG><SPAN> </SPAN>with industry security standards</LI></UL><P><STRONG><FONT color="#000080">Reference</FONT>:</STRONG><SPAN> </SPAN><A href="https://community.sap.com/t5/technology-blog-posts-by-sap/introducing-application-vulnerability-report-for-cloudfoundry-applications/ba-p/14281684" target="_blank">Introducing Application Vulnerability Report for CloudFoundry Applications</A></P><H2 id="toc-hId-1398401862"><FONT color="#993300">Why Security Scanning Matters for SAP Sales & Service Cloud V2 + ESM Side by Side Extensions</FONT></H2><DIV><TABLE border="1" width="100%"><TBODY><TR><TD width="100%">This checklist is mandatory<SPAN>—without any compromise—to ensure that <FONT color="#008000"><STRONG>no security vulnerabilities exist </STRONG></FONT>in your extensions before they are deployed to the Production environment.</SPAN></TD></TR></TBODY></TABLE></DIV><P><STRONG>SAP Sales & Service Cloud V2 +ESM</STRONG> serves as the backbone for customer-facing operations. </P><DIV>Any extensions developed on BTP—whether for <STRONG>data enrichment, workflow automation, or third‑party integrations</STRONG>—introduce potential attack vectors if not properly secured.<BR /><BR />Additionally, many side‑by‑side extensions that are developed by your developers, who may not always account for all required security controls to ensure the application or APIs are tightly governed. In some cases, extensions may also have been built using <FONT color="#3366FF">AI-assisted development</FONT>, which can inadvertently introduce vulnerabilities in libraries or application logic, including risks such as <FONT color="#FF0000"><STRONG>XSS, CSRF, SSRF,</STRONG></FONT> <FONT color="#FF0000"><STRONG>RCE</STRONG></FONT> and others.</DIV><H3 id="toc-hId-1330971076">Common Extension Scenarios Requiring AVR:</H3><UL><LI><STRONG>CAP (Cloud Application Programming Model) Services</STRONG>: Custom business logic exposing OData/REST APIs</LI><LI><STRONG>Extensibility = External Hook (Prehooks & Posthooks</STRONG>) : Event-driven extensions modifying standard processes</LI><LI><STRONG>Custom Microservices</STRONG>: Standalone services for specialized business functions</LI><LI><STRONG>Autoflow Integrations</STRONG>: Low-code automations connecting external systems</LI><LI><STRONG>Mashup Services</STRONG>: Composite applications combining multiple data sources</LI></UL><P><FONT color="#FF0000"><STRONG>The Risk</STRONG>:</FONT> Vulnerabilities in dependencies, libraries outdated, insecure coding practices, or misconfigurations can expose sensitive customer data or disrupt critical business processes.<span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="jpeg (1)1764659722.png" style="width: 666px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/381189iD678095376B85108/image-size/large?v=v2&px=999" role="button" title="jpeg (1)1764659722.png" alt="jpeg (1)1764659722.png" /></span></P><H2 id="toc-hId-1005374852"><FONT color="#FF00FF">Conclusion</FONT></H2><P>The<SPAN> </SPAN><FONT color="#008000"><STRONG>Application Vulnerability Report</STRONG><SPAN> </SPAN></FONT>is non-negotiable for securing SAP Sales & Service Cloud V2 + ESM extensions. By integrating AVR into your development lifecycle, you:</P><UL><LI><STRONG>Protect customer data</STRONG><SPAN> </SPAN>from exploits</LI><LI><STRONG>Maintain compliance</STRONG><SPAN> </SPAN>with security standards</LI><LI><STRONG>Ensuring No security vulnerabilities violated</STRONG> in your extensions designed for SAP Sales & Service Cloud V2 + ESM </LI><LI><STRONG>Build trust</STRONG><SPAN> </SPAN>with stakeholders through proactive risk management</LI></UL><H3 id="toc-hId-937944066"><FONT color="#993300"><STRONG>Call to Action for Developers and BTP Admins (Managing your BTP Landscape)</STRONG>:</FONT></H3><H3 id="toc-hId-741430561">Before you move to production deployment, <FONT color="#0000FF">run AVR and clear all findings.</FONT><BR />Your security depends on it.<span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="2026-03-08_11-12-06 (1).gif" style="width: 849px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/381190i1A95B9D61B0A98F1/image-dimensions/849x977?v=v2" width="849" height="977" role="button" title="2026-03-08_11-12-06 (1).gif" alt="2026-03-08_11-12-06 (1).gif" /></span></H3>2026-03-08T11:23:27.165000+01:00https://community.sap.com/t5/technology-blog-posts-by-members/ucon-and-s-rfc-protecting-remote-enabled-function-modules-in-abap-platform/ba-p/14359764UCON and S_RFC: Protecting remote-enabled function modules in ABAP platform2026-03-27T12:57:41.291000+01:00JoeGoerlichhttps://community.sap.com/t5/user/viewprofilepage/user-id/2716<DIV>ABAP systems—such as S/4HANA Cloud, private edition, and on‑premises<DIV>installations<SPAN><SPAN>—offer function modules as interfaces for data exchange, </SPAN></SPAN><SPAN>effectively acting as proprietary APIs.</SPAN></DIV></DIV><P>As shown in the following diagram, function modules can be called</P><UL><LI><STRONG>locally</STRONG>: within the ABAP system</LI><LI><STRONG>internally</STRONG>: within the ABAP system (by specifying specific destinations)</LI><LI><STRONG>remotely</STRONG>: via RFC (which include calls performed from another client of the same ABAP system).</LI></UL><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="JoeGoerlich_0-1774603435794.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/389704iB565C1F2EDCE6C8C/image-size/large?v=v2&px=999" role="button" title="JoeGoerlich_0-1774603435794.png" alt="JoeGoerlich_0-1774603435794.png" /></span></P><P><EM><STRONG>Hint:</STRONG> WebSocketRFC basically follows the same logic, but the 1st protection layer is conducted by UCON WebSocketRFC scenario instead of UCON RFC Basic scenario (see below).</EM></P><P> </P><H2 id="toc-hId-1792506241"><STRONG>Processing Type: Remote-Enabled Module</STRONG></H2><P>In the attributes of each function module, the processing type specifies whether the function module is 'Remote-Enabled' or not. The processing type of a function module can be found in the attributes tab in the Function Builder which can be accessed via transaction SE37.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="JoeGoerlich_3-1774603829535.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/389708iEB91FEF31AD2ADBB/image-size/large?v=v2&px=999" role="button" title="JoeGoerlich_3-1774603829535.png" alt="JoeGoerlich_3-1774603829535.png" /></span></P><P>Only remote-enabled function modules can be called via RFC. Non-remote-enabled function modules can only be executed locally in the ABAP system. Common examples for remote-enabled function modules are the so called BAPIs.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="JoeGoerlich_1-1774603655817.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/389705i80DD60E10428DFC7/image-size/large?v=v2&px=999" role="button" title="JoeGoerlich_1-1774603655817.png" alt="JoeGoerlich_1-1774603655817.png" /></span></P><P><STRONG>An S/4HANA system holds about 550.000 function modules and more than 50.000 of them are remote-enabled by default.</STRONG></P><P>In practice, many of those 50.000 remote-enabled function modules are never used from external systems. This is because there may be no business need to call a particular function module in the ABAP system in question. Sometimes the function module was prepared to be remote-enabled just in case. This applies to custom developed function modules as well.</P><P><STRONG>Key takeaway: Typically, less than 5% of the remote-enabled function modules are used in productive systems.</STRONG></P><P> </P><H3 id="toc-hId-1725075455">Usage of remote-enabled function modules via RFC as of the RFC-trace</H3><P>To identify which function modules are called from external systems, the ABAP systems' statistics can be leveraged. For their evaluation, SAP introduced the transaction STRFCTRACE.</P><P><EM>Prerequisite: Profile parameter <FONT face="courier new,courier">ucon/rfc/active = 1</FONT> and batch job 'SAP_UCON_MANAGEMENT' scheduled.</EM></P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="JoeGoerlich_6-1774604187077.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/389712i42B34B9136D17880/image-size/large?v=v2&px=999" role="button" title="JoeGoerlich_6-1774604187077.png" alt="JoeGoerlich_6-1774604187077.png" /></span></P><P>The output lists, from left to right, the originating system, client, and user, followed by the RFC destination they used to access our system to execute, as user 'User (executing)', a function module belonging to the given function group. Furthermore, it displays whether the users have granted S_RFC for the function module and/or function group and whether they have full or generic authorizations.</P><P><STRONG>Please note:</STRONG> This view does not cover authorization checks on ABAP level (see section Authorization check for authorization object 'S_RFC' below).<STRONG> The authorization object S_RFC cannot just be removed from all users which are not listed here!</STRONG> This would lead to authorization errors for those users, when they call programs or function modules which have authorization checks coded in ABAP. </P><P> </P><H3 id="toc-hId-1528561950">Usage of remote-enabled function modules via RFC as of the statistics</H3><P>To identify which function modules are called from external systems, we can analyze the ABAP systems' statistics. Here, we have to focus on the RFC Server profile and identify which function modules are truly called via RFC. To do so, we enter transaction ST03, open the RFC Server profile and enter the statistic reports in the tab 'Remote Server'.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="JoeGoerlich_7-1774604277869.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/389713iC73B9EF8FE3A20E4/image-size/large?v=v2&px=999" role="button" title="JoeGoerlich_7-1774604277869.png" alt="JoeGoerlich_7-1774604277869.png" /></span></P><P>If the row for Remote Server Name shows a hostname different to the hostname of the currently logged on ABAP system, this call comes from a remote system. With a double click on the line, the details showing every call of remote-enabled function modules which are initiated from that external system can be opened.</P><P>Also in this view, it is identifiable which user in an external system initiated an action that led to a remote function call via an RFC Destination, the name of the RFC Destination in the external system, the user account which is used to execute the function module in our system and the function module which was executed.</P><P> </P><H1 id="toc-hId-1073883007"><STRONG>1st protection layer: UCON RFC basic scenario</STRONG></H1><P>How to reduce the remote-enabled function modules to those 5% which are truly used?</P><P>Since modifying the processing-type of those function modules which should not be externally accessible would be cumbersome and would lead to system modifications, SAP introduced the UCON RFC basic scenario of the UCON framework as a 1st layer of protection.</P><P>By assigning remote-enabled function modules to a communication assembly in UCONCOCKPIT, it can be controlled which function modules should be accessible via RFC from the outside.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="JoeGoerlich_4-1774603915785.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/389709iE7195C12B20A5E79/image-size/large?v=v2&px=999" role="button" title="JoeGoerlich_4-1774603915785.png" alt="JoeGoerlich_4-1774603915785.png" /></span></P><P>Each function module runs through 3 phases of UCON (logging, evaluation, and final) and <STRONG>only for function modules in the final phase our decision will be enforced</STRONG>. </P><P>Once the UCON RFC basic scenario is activated, only those function modules can be called remotely which are assigned to a communication assembly and moved to the final phase. All function modules which are moved to the final phase without being assigned to the communication assembly can only be executed internally or locally.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="JoeGoerlich_5-1774604000029.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/389711i265AEF7B4CD41751/image-size/large?v=v2&px=999" role="button" title="JoeGoerlich_5-1774604000029.png" alt="JoeGoerlich_5-1774604000029.png" /></span></P><P><I>Prerequisite: Profile parameter </I><I>ucon</I><I>/</I><I>rfc</I><I>/</I><I>active</I><I>=1</I><I> and—for statistic collection—batch job 'SAP_UCON_MANAGEMENT' scheduled.</I></P><P><STRONG>Keep in mind:</STRONG> Moving all function modules to the final phase while assigning all of them to the communication assembly would render this layer of protection useless.</P><P><EM><STRONG>Hint: </STRONG>The UCON RFC Basic scenario can also be used to assign individual function modules to a so called SNC-CA which ensures that all assigned function modules can only be accessed over an SNC secured RFC destination.</EM></P><P> </P><H1 id="toc-hId-877369502"><STRONG>2nd protection layer: Authorization check</STRONG></H1><P>While the 1st layer of protection controls which function modules can be called remotely on system or client level (depends on the setup of the UCON RFC basic scenario), the 2nd layer controls this on the user level.</P><P>Assuming the UCON RFC basic scenario reduces the number of remotely executable function modules from 50.000 to 2500, the authorization check allows to reduce them further to the absolute minimum necessary for the individual user in the relevant client. Let's say to 10 - 20 function modules for a specific business case. In other words, it allows to enforce the least privilege principle. </P><P>The authorization check is conducted for the user who calls the function module in the ABAP system. It is based on the authorization object 'S_RFC' and is implicitly performed by the SAP Kernel when a function module is called remotely.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="JoeGoerlich_8-1774604339427.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/389714iD85B0564050382D9/image-size/large?v=v2&px=999" role="button" title="JoeGoerlich_8-1774604339427.png" alt="JoeGoerlich_8-1774604339427.png" /></span></P><P><STRONG>Bear in mind:</STRONG> Maintaining the authorization object S_RFC for function modules or even function groups with the wildcard '*' or extensive patterns may undermine the 2nd layer of protection.</P><P> </P><H2 id="toc-hId-809938716">Authorization check for authorization object 'S_RFC'</H2><P>As there is some <STRONG>special aspect in the authorization check for authorization object S_RFC</STRONG>, it is of essence to understand that this authorization check may be conducted on SAP Kernel level as well as on the ABAP level (ABAP coding).</P><H3 id="toc-hId-742507930">1. Authorization check on the SAP Kernel level</H3><P>In contrast to authorization checks in ABAP programs, an authorization check is performed for each function module on SAP Kernel level if it was remotely called. The SAP Kernel knows the origin and user from which a function module is called. Depending on this, an authorization check will be conducted.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="JoeGoerlich_9-1774604411377.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/389715iCDCB246E9DC0E886/image-size/large?v=v2&px=999" role="button" title="JoeGoerlich_9-1774604411377.png" alt="JoeGoerlich_9-1774604411377.png" /></span></P><P><STRONG>Key takeaway:</STRONG> An authorization check for authorization object 'S_RFC' is implicitly <STRONG>performed by the SAP Kernel</STRONG> whenever a remote-enabled function module is called from the outside or the user context is switched. It is not conducted for local or internal calls!</P><P><I><STRONG>Note:</STRONG> Whether specific function modules or function groups are excluded from this implicit authorization </I><I>check, can be configured via the profile parameter </I><I>auth</I><I>/</I><I>rfc_authority_check.</I></P><P><EM>Values and their implications:</EM></P><TABLE><TBODY><TR><TD><STRONG>Value</STRONG></TD><TD><STRONG>Logon required</STRONG></TD><TD><STRONG>Authorization S_RFC required</STRONG></TD></TR><TR><TD>9</TD><TD>yes</TD><TD>yes</TD></TR><TR><TD>8</TD><TD>yes</TD><TD>yes, but<BR />not for SRCCGET_CODE_COMPLETION via SAPgui</TD></TR><TR><TD>7</TD><TD>n/a</TD><TD>n/a</TD></TR><TR><TD>6 (recommended)</TD><TD>yes, but<BR />not for Func RFC_PING</TD><TD>yes, but<BR />not for Func RFC_PING<BR />not for SS SU SC</TD></TR><TR><TD>5</TD><TD>yes, but<BR />not for Func RFC_PING</TD><TD>yes, but<BR />not for Func RFC_PING<BR />not for SS SU SC<BR />not for SRCCGET_CODE_COMPLETION via SAPgui</TD></TR><TR><TD>4</TD><TD>yes, but<BR />not for Func RFC_PING<BR />not for Func RFC_SYSTEM_INFO</TD><TD>yes, but<BR />not for Func RFC_PING<BR />not for Func RFC_SYSTEM_INFO</TD></TR><TR><TD>3</TD><TD>yes, but<BR />not for Func RFC_PING<BR />not for Func RFC_SYSTEM_INFO</TD><TD>yes, but<BR />not for Func RFC_PING<BR />not for Func RFC_SYSTEM_INFO<BR />not for SS SU SC<BR />not for SRCCGET_CODE_COMPLETION via SAPgui</TD></TR><TR><TD>2</TD><TD>yes, but<BR />not for FuGr SRFC</TD><TD>yes, but<BR />not for FuGr SRFC</TD></TR><TR><TD>1</TD><TD>Yes, but<BR />not for FuGr SRFC</TD><TD>yes, but<BR />not for FuGr SRFC<BR />not for SS SU SC</TD></TR><TR><TD>0</TD><TD>yes</TD><TD>no</TD></TR></TBODY></TABLE><P>SS SU SC = Call from same system and same user and same client.</P><P> </P><H3 id="toc-hId-545994425">2. Authorization check on ABAP level</H3><P><SPAN>In addition to this SAP Kernel level authorization check, it is also possible to carry out regular authorization checks coded in ABAP. In this case, t</SPAN>he authorization object S_RFC is technically seen not any different from other authorization objects and is performed whenever a user executes the code.</P><P>In general, we can find two ways how to implement such an authorization check in ABAP.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="JoeGoerlich_10-1774604506515.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/389716i819BE7C873C6A093/image-size/large?v=v2&px=999" role="button" title="JoeGoerlich_10-1774604506515.png" alt="JoeGoerlich_10-1774604506515.png" /></span></P><P>a) The authorization check on the ABAP level can be used to verify the user's authorizations independent from whether the implicit authorization check on the SAP Kernel level is going to be performed.</P><P>or</P><P>b) Independent from whether the function module is going to be called in a later stage at all.</P><P> </P><H3 id="toc-hId-349480920">Why is this differentiation between the SAP Kernel level and the ABAP level of importance?</H3><P>To clean up the assignment of S_RFC we may need to run an authorization trace. As this trace does not differentiate between the two levels, it will contain a mix of authorization checks performed on the SAP Kernel level as well as the ABAP level.</P><P><I><STRONG>Note:</STRONG> The authorization check on ABAP level is independent from whether the </I><I>function module is subsequentially called or not. If the function module is </I><I>called remotely afterwards, the implicit authorization check on the SAP Kernel level is still performed.</I></P><P> </P><P>In the transaction STUSERTRACE, we can activate a long term authorization trace (<A href="https://community.sap.com/t5/application-development-and-automation-blog-posts/stusertrace-new-tracing-option-authorization-trace-for-user/ba-p/13501490" target="_self">STUSERTRACE: New tracing option (Authorization trace for user)</A> by <A href="https://community.sap.com/t5/user/viewprofilepage/user-id/606691" target="_self">SahilTaneja</A>),</P><P>This kind of authorization trace has almost no impact to the system performance and authorization checks for the same authorization object and values are recorded only once per user even if they have been conducted several times and independent from whether they are performed on the SAP Kernel level or ABAP level.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="JoeGoerlich_11-1774604592978.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/389717i6522EB8D0BB9DF2E/image-size/large?v=v2&px=999" role="button" title="JoeGoerlich_11-1774604592978.png" alt="JoeGoerlich_11-1774604592978.png" /></span></P><P><I>Prerequisite: Profile parameter </I><FONT face="courier new,courier">auth/auth_user_trace = F</FONT><I> and a suitable filter must be configured.</I></P><P><I><EM><STRONG>Please note:</STRONG> As this also records the authorization checks performed on the ABAP level, it might be the case that an authorization check is recorded for cases in which the function module was not called remotely! <STRONG>Nevertheless, users recorded here might need the authorization assigned to fulfill their regular tasks.</STRONG></EM></I></P><P> </P><H1 id="toc-hId--105198023">All layers together</H1><DIV>Bringing all layers together, we conclude that function modules are executable via RFC only when they are remote‑enabled and, after the UCON RFC Basic scenario is activated, moved to the final phase and assigned to a communication assembly. In addition, the executing user in the respective system and client must be assigned the authorization object S_RFC with the relevant values.</DIV><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="JoeGoerlich_12-1774604694716.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/389718iECF091A12A0195ED/image-size/large?v=v2&px=999" role="button" title="JoeGoerlich_12-1774604694716.png" alt="JoeGoerlich_12-1774604694716.png" /></span></P><DIV>Please consider the potential impact if the first or second layer is not configured with adequate restrictions.</DIV>2026-03-27T12:57:41.291000+01:00https://community.sap.com/t5/technology-blog-posts-by-sap/context-driven-dashboard-experiences-role-based-layouts-in-sap-analytics/ba-p/14367717Context-Driven Dashboard Experiences: Role-Based Layouts in SAP Analytics Cloud2026-04-07T14:55:54.242000+02:00Ed_Barretthttps://community.sap.com/t5/user/viewprofilepage/user-id/2195992<H3 id="toc-hId-1922452747">What if a single dashboard could completely change depending on who’s viewing it?</H3><P>While working on a recent project, I explored how scripting can be used to tailor dashboards dynamically based on user roles. Instead of maintaining multiple versions of the same story, I built a single dashboard that adapts in real time – showing only the widgets relevant to each user.</P><P>The approach is straightforward: start with a story where all widgets are hidden by default, then use a script to detect the user’s role on load and reveal the appropriate content. This can be as simple as adding a few extra charts, or as powerful as presenting an entirely different dashboard experience.</P><P>In this example, I focused on contextualisation by designing views for two distinct audiences – <STRONG>Sales</STRONG> and <STRONG>Marketing</STRONG> – each with their own KPIs.</P><P>The API Reference Guide is a great place to start and understand the scripting possibilities: <A href="https://url.sap/xxwwwm" target="_blank" rel="noopener noreferrer nofollow">View API Reference</A></P><P><SPAN class=""><SPAN class="">This blog is the first in a series of exploring applied use cases in SAP Analytics Cloud</SPAN><SPAN class="">.</SPAN></SPAN><SPAN class=""> </SPAN></P><HR /><H3 id="toc-hId-1725939242">1. Create the Dashboard</H3><P>I began by building the Sales view, which includes charts, a contextualised dashboard summary, and dynamic name and team text. Once this was in place, I hid all the containers within the page outline except for the dynamic name and team text.</P><P>Next, I created the Marketing view, following the same approach – building out the required components and then hiding all the relevant containers. At this stage, when the story is opened, the dashboard appears blank regardless of the user’s role.</P><P>Note: I made sure to label the containers (Sales1, Sales2, etc.) so it was easier to find what I wanted to show. </P><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="1.gif" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/391480iCAC765ABCE4650C8/image-size/large?v=v2&px=999" role="button" title="1.gif" alt="1.gif" /></span></P><P> </P><HR /><H3 id="toc-hId-1529425737">2. Display Content Based on User Role</H3><P>With the layout complete, I moved on to scripting.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="2.gif" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/391481iF5B66278AE5AA7F9/image-size/large?v=v2&px=999" role="button" title="2.gif" alt="2.gif" /></span></P><P> </P><P>Using the on-initialisation script, I first created a variable to capture the user’s team information. I then defined another variable to extract the specific team name. In addition, I created a global variable called <STRONG>“Team”</STRONG> within the page outline, which allows the team name to be displayed dynamically at the top of the dashboard.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="3.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/391482i5912403D8B111CE7/image-size/large?v=v2&px=999" role="button" title="3.png" alt="3.png" /></span></P><P> </P><PRE><CODE>var teams = Application.getTeamsInfo();
var teamName = teams[0].name;
Team = teams[0].name;</CODE></PRE><P>From there, it was simply a matter of using an <STRONG>if statement</STRONG> to control visibility – setting the appropriate elements to visible based on the user’s team. As a result, when a user logs in, they only see the content relevant to them, with the team name updating dynamically.<SPAN> </SPAN></P><PRE><CODE>if (teamName === "Sales") {
Sales.setVisible(true);
Sales1.setVisible(true);
Sales2.setVisible(true);
Sales3.setVisible(true);
Sales4.setVisible(true);
}
if (teamName === "Marketing") {
Marketing.setVisible(true);
Marketing1.setVisible(true);
Marketing2.setVisible(true);
Marketing3.setVisible(true);
Marketing4.setVisible(true);
}</CODE></PRE><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="5.gif" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/391486i7E4B02FA403AFA69/image-size/large?v=v2&px=999" role="button" title="5.gif" alt="5.gif" /></span></P><P> </P><HR /><P>There are plenty of opportunities for further customisation here. Beyond just showing or hiding charts, you can tailor buttons, apply filters, and even switch branding to create a more personalised experience.</P>2026-04-07T14:55:54.242000+02:00