https://raw.githubusercontent.com/ajmaradiaga/feeds/main/scmt/topics/Security-blog-posts.xml SAP Community - Security 2024-05-10T14:01:56.669581+00:00 python-feedgen Security blog posts in SAP Community https://community.sap.com/t5/technology-blogs-by-sap/sap-cloud-integration-understanding-the-xml-encryption-standard/ba-p/13630124 SAP Cloud Integration: Understanding the XML Encryption Standard 2024-03-07T15:16:11.555000+01:00 CarlosRoggan https://community.sap.com/t5/user/viewprofilepage/user-id/5495 <P><STRONG>SAP Cloud Integration</STRONG> doesn’t offer an encryptor step for encrypting XML content according to the "XML Encryption" standard.&nbsp;That standard provides some benefits and flexibility specifically for xml content.<BR />This article is intended to introduce into the "XML Encryption" standard, as preparation for future hands-on.<BR />I'm trying to explain everything simple, with my simple understanding and my simple words - this is not a professional article.<BR />In this blog post, I will try to answer many questions and show examples.<BR />The <A href="https://community.sap.com/t5/technology-blogs-by-sap/cloud-integration-manually-encrypt-decrypt-xml-payload-based-on-xml-enc/ba-p/13632096" target="_blank">next blog post</A> shows how we can encrypt / decrypt XML payloads, according to the XML-Enc spec, manually in a Groovy script.&nbsp;</P><H2 id="toc-hId-988768962">Overview</H2><OL><LI>Historical Intro</LI><LI>Theoretical Intro</LI><LI>XML Sample Intro</LI><LI>Optional Outro</LI></OL><H2 id="toc-hId-792255457">History</H2><P><SPAN>How I imagine that it started:</SPAN><BR /><SPAN>Timmy from Texas wanted to share some secret info with his friend Taku in Tokyo.<BR /></SPAN><SPAN>So he encrypted a message and sent it to Taku.</SPAN><BR /><SPAN>Taku was unable to decrypt and read the message.</SPAN><BR /><SPAN>So Timmy travelled to Tokyo to enjoy some food and to explain the way how he encrypts and packages his messages.</SPAN><BR /><SPAN>Afterwards, Taku in Tokyo was able to decrypt and read all messages (even before breakfast).</SPAN><BR /><SPAN>Some time later, same situation happened with his friend Toto in Togo.</SPAN><BR /><SPAN>Although the food is said to be great, Timmy decided not to travel, but to invite his friends for a conference at home.<BR /></SPAN><SPAN>They had international food, late-night discussions and at the end, they agreed on a common way of sending secure messages.</SPAN><BR /><SPAN>As a consequence, everybody in the world can send secure messages and the recipients can understand the message, as long as they follow that agreement.</SPAN><BR /><BR /><FONT color="#999999"><SPAN>Does that make sense?</SPAN></FONT><BR /><SPAN>Really makes sense, especially the section about the international food (which didn’t make it into the specification).</SPAN><BR /><BR /><FONT color="#999999"><SPAN>What do we learn from this story?</SPAN></FONT><BR /><SPAN>People communicating with each other need to agree on some basic principles:</SPAN><BR /><SPAN>- how encryption is done, which steps in which order<BR /></SPAN>- what exactly is encrypted<BR /><SPAN>- which algorithms are used</SPAN><BR /><SPAN>- certificate information&nbsp;</SPAN><BR /><SPAN>- where is that information stored</SPAN></P><P><SPAN><FONT size="1 2 3 4 5 6 7">This intro was copied from my <A href="https://community.sap.com/t5/technology-blogs-by-sap/sap-cloud-integration-understanding-pkcs-7-cms-standard/ba-p/13560268" target="_blank">cms-post</A>.</FONT>&nbsp; &nbsp; &nbsp;</SPAN></P><H2 id="toc-hId-595741952"><STRONG>Introduction</STRONG></H2><P>We’re talking about sending data from somewhere to anywhere over the internet.<BR />Instead of writing a letter, we use XML to structure the data which we send.<BR />As we know that the internet is dangerous, we want to encrypt the data.</P><P><FONT color="#999999">There are blogs out there?</FONT><BR />Sure, we already have so fantastic blog posts like <A href="http://%20https://community.sap.com/t5/technology-blogs-by-sap/sap-cloud-integration-understanding-pkcs-7-cms-encryptor/ba-p/13552901" target="_blank" rel="noopener nofollow noreferrer">this one</A>&nbsp;together with the <A href="https://community.sap.com/t5/technology-blogs-by-sap/sap-cloud-integration-understanding-pkcs-7-cms-standard/ba-p/13560268" target="_blank">intro blog</A>.<BR />It explains how to use the CMS standard for encrypting a message.</P><P><FONT color="#999999">So why do we need this blog?</FONT><BR />Actually, the CMS standard is not specific to any kind of payload, so it could be used for XML as well, why not.<BR /><FONT color="#999999">But...</FONT><BR />But we need this blog post because it is specific to XML payload.<BR />As the message is written in XML, we can take advantage of the fact that the content is structured already.<BR />This is a benefit.<BR />So we have an extra standard.</P><P><FONT color="#999999">OK. What is the benefit?</FONT><BR />As we’re dealing with xml, which is a structured content, we have the advantage of choosing which content or part of content we want to encrypt.</P><P><FONT color="#999999">Cool. Which content can we choose?</FONT><BR />There are 3 possibilities:</P><OL><LI>Encrypt the whole document, i.e. the whole file or the entire message</LI><LI>Encrypt part of the document: choose one node of the XML document.<BR />In this case, the node itself is not encrypted, but only the content below the node.<BR />Means, the text content of the node is sensitive, but the node name is left as plain text<BR />The content can be a subtree of child nodes as well.</LI><LI>Encrypt part of the document: again, choose one node of the XML document.<BR />But in this case, the node itself is encrypted as well, along with all of it content.</LI></OL><P><FONT color="#999999">Variant 1…?</FONT><BR />Ummmmm - yes, it is similar as CMS....<BR />AHA<BR />Ehm, yes, here the benefit is less obvious, but nevertheless, the result is an XML with a specific structure, which can be understood by XML-Enc-aware tools.</P><P><FONT color="#999999">Don’t understand.</FONT><BR />Remember the funny history story?<BR />At the end, a standard is an “agreement” between sender and receiver.<BR />If they both adhere to the agreement, they can send and receive, encrypt and decrypt without trouble.<BR />So even in case of variant 1, the receiver can find the info about how to decrypt, by reading XML.</P><P><FONT color="#999999">What is the XML-agreement?</FONT><BR />Basically, in case of "XML Encryption" agreement, the receiver knows where to find the information that he needs for decrypting:</P><UL><LI>The incoming XML contains a node <FONT face="courier new,courier">&lt;EncryptedData&gt;</FONT> which contains everything: the encrypted content and metadata.</LI><LI>There’s the info about which variant (see above) was used</LI><LI>The subtree of this node contains info about the algorithm used to encrypt the content</LI><LI>The subtree contains info about the key that was used to encrypt the content</LI><LI>The encrypted key itself</LI><LI>The encrypted content itself</LI><LI>. . .</LI></UL><P>Note that the standard is flexible and there are multiple ways to apply it.<BR />In this blog post we’re sticking to one variant which is common and safe and makes sense.</P><P><FONT color="#999999">How is encryption done?</FONT><BR />During encryption, the sensitive content is replaced by an <FONT face="courier new,courier" color="#339966">&lt;EncryptedData&gt; </FONT>node.<BR />The subtree of <FONT face="courier new,courier" color="#339966">&lt;EncryptedData&gt; </FONT>contains the sensitive content that has to be secured, in non-understandable way, i.e. encrypted.<BR />After encryption, the result is encoded with Base 64, (this is common practice when sending data over the internet).</P><P><FONT color="#999999">How is it encrypted?</FONT><BR />We have to understand the 2 basic ways of encrypting:<BR />Symmetric and asymmetric encryption</P><P><FONT color="#999999">What is symmetric encryption?</FONT><BR />Sounds normal: some content is encrypted with a key.<BR />For decryption, the SAME key is used.<BR />Means, the key must be handed over to the recipient in a safe way.<BR />This is a disadvantage.<BR />The advantage: fast and can handle big-sized content.</P><P><FONT color="#999999">And asymmetric?</FONT><BR />To avoid the problem of having to transmit the secret key:<BR />Here we have 2 keys, which belong together: private and public keys.<BR />This is called a key pair.<BR />The public key is not secret, it can be sent to the encryptor.<BR />The content is encrypted with the public key.<BR />ONLY the private key can then decrypt the content.<BR />Advantage: more secure.<BR />Disadvantage: not applicable to big payloads and slow.</P><P><FONT color="#999999">So both are unusable?</FONT><BR />There's a solution: use both in a hybrid mode.<BR />Use symmetric key to encrypt the (big) content.<BR />Use asymmetric key to encrypt the (small) symmetric key.<BR />That’s it.<BR />The symmetric key can be safely sent together with the encrypted content.<BR />Because the symmetric key is securely encrypted.<BR />The receiver can decrypt the symmetric key, (because he has the private asymmetric key).<BR />Then use the symmetric key to decrypt the content.</P><P><FONT color="#999999">Confusing...</FONT><BR />Let’s repeat:<BR />We want to encrypt sensitive content<BR />&nbsp; &nbsp;-&gt; we use a “Content Encryption Key” == CEK<BR />&nbsp; &nbsp;-&gt; also called “Data Encryption KEY” == DEK<BR />This key has to be encrypted with another key.<BR />&nbsp; &nbsp;-&gt; We use a “Key Encryption Key” == KEK</P><P><FONT color="#999999">Why can't we just use the KEK to encrypt the message?</FONT><BR />As mentioned, because KEK is asymmetric and thus not suitable for big content.</P><P><FONT color="#999999">Ah, already forgot</FONT><BR />No prob.</P><P><FONT color="#999999">What is a key?</FONT><BR />What we want to achieve is to hide secret content from someone but reveal it to us.<BR />We want to make it look random, but be able&nbsp; to revert.<BR />Thus we need to use a key, so we are able to revert.&nbsp;<BR />Note:<BR />A key can be just a sequence of bits, but longer key length ( key size) is more safe.</P><P><FONT color="#999999">What is a DEK or CEK?</FONT><BR /><EM>Data Encryption Key</EM> or <EM>Content Encryption Key</EM>.<BR />This is a symmetric key for encrypting the payload content.</P><P><FONT color="#999999">What is a KEK?</FONT><BR /><EM>Key Encryption Key</EM>, this is usually an asymmetric key.<BR />Also referred to as “Key Transport”.</P><P><FONT color="#999999">How is encryption done?</FONT><BR />Think about a rule, e.g. replace every ‘a’ with a ‘b’<BR />Such rule is called “algorithm” or “cipher”.<BR /><FONT face="inherit">To make the process </FONT>reversible<FONT face="inherit">, a key is applied.<BR /></FONT>This makes it reversible only for the key owner.</P><P><FONT color="#999999">Examples for symmetric algorithms?</FONT><BR />AES, DES (not safe!), TDES (== Triple DES == 3DES == DESede), RC4 (etc, not safe)</P><P><FONT color="#999999">Examples for asymmetric algorithms?</FONT><BR />RSA, DSA, ECC</P><P><FONT color="#999999">What is AES?</FONT><BR />It stands for <EM>Advanced Encryption Standard</EM>.<BR />It is a symmetric-key algorithm.<BR />It works on blocks with size 128 bits.<BR />It supports keys with sizes 128, 192 and 256 bits.</P><P><FONT color="#999999">What is a Block Cipher?</FONT><BR />In symmetric cryptography, 2 ways are used: block and stream ciphers.<BR />In case of stream, the input is encrypted byte by byte.<BR />In case of block, the content is cut into blocks, which are then encrypted.</P><P><FONT color="#999999">What is block size?</FONT><BR />The size of such blocks.<BR />AES always operates on blocks of 128 bits.</P><P><FONT color="#999999">What is padding?</FONT><BR />Assume we have some content which has to be encrypted with AES.<BR />Obviously, it is larger than 128 bits, or a multiple.<BR />Which is the size of a block.<BR />After cutting the content into blocks of 128 bits, there will be a remaining rest.<BR />The rest has to be filled up until 128 is reached.<BR />That’s what we call <EM>padding</EM>.</P><P><FONT color="#999999">What is operation mode?</FONT><BR />Assuming again, the content which has to be encrypted is larger than 128 bits.<BR />So it is cut into multiple blocks.<BR />Encryption will be applied to many blocks individually.<BR />The way how this is done, will help to make the encryption more safe.<BR />At the end we want a result that looks completely crazy (= random bytes).<BR />Therefore, we can choose an encryption mode (= operation mode).<BR />Examples:<BR />ECB, Electronic Code Block, unsafe.<BR />Note that ECB is often used as default, if no operation mode is specified.<BR />So the recommendation is to always specify a secure operation mode.<BR />CBC, Cipher Block Chaining, not recommended.<BR />CTR, Counter&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;<BR />GCM, Galois Counter Mode, recommended.</P><P><FONT color="#999999">Can we find an end?</FONT><BR />We’ve talked about the XML structure and the encryption process.<BR />Now we’ve found the end:<BR />-&gt;here</P><P><FONT color="#999999">Can we look at an example?</FONT><BR />The next chapter is full of xml.</P><H2 id="toc-hId-399228447">Sample XML&nbsp;</H2><P>Let’s view a simplified example.<BR />We have a <FONT color="#3366FF"><STRONG>Sales Service</STRONG></FONT> that sends info about an order:</P><P style=" padding-left : 30px; ">Order number<BR />Product Identifier<BR />Customer info<BR />Payment: credit card number<BR />. . .</P><P>The service sends the payload in XML format.<BR />XML is tedious to read, so trying to simplify:</P><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="xml0.jpg" style="width: 391px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/77108iAABC742BE26DFAB7/image-size/medium?v=v2&amp;px=400" role="button" title="xml0.jpg" alt="xml0.jpg" /></span></P><P>&nbsp;We can quickly identify a security risk:<BR />Sending credit card number via the internet is not acceptable.</P><P><SPAN><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="xml1.jpg" style="width: 400px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/76626iDDCB21ED02E74902/image-size/medium?v=v2&amp;px=400" role="button" title="xml1.jpg" alt="xml1.jpg" /></span></SPAN></P><P>So we could encrypt the number and send the XML as below:</P><P><SPAN><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="xml2.jpg" style="width: 400px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/76624iC68C26972597C55F/image-size/medium?v=v2&amp;px=400" role="button" title="xml2.jpg" alt="xml2.jpg" /></span></SPAN></P><P>However, it is better to stick to the XML Encryption standard:</P><P><SPAN><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="xml3.jpg" style="width: 400px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/76653iEDFCE3FE89A43C49/image-size/medium?v=v2&amp;px=400" role="button" title="xml3.jpg" alt="xml3.jpg" /></span></SPAN></P><P>The next screenshot below shows that the <STRONG>content</STRONG> of a node has been replaced with the <FONT face="courier new,courier" color="#339966">&lt;EncryptedData&gt;</FONT> subtree (simplified).<BR />Remember the 3 variants above? So this is the second:<BR />only the content is encrypted, not the whole element + content.<BR />With other words: the credit card number is unreadable, but the <FONT face="courier new,courier" color="#339966">&lt;CreditCard&gt; </FONT>node is still readable.<BR /><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="xml4.jpg" style="width: 400px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/76651i061A4CF56EC9D72E/image-size/medium?v=v2&amp;px=400" role="button" title="xml4.jpg" alt="xml4.jpg" /></span></P><P>Next screenshot shows the final result XML structure:</P><P><SPAN><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="xml5.jpg" style="width: 400px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/76652i46AAF090D8424815/image-size/medium?v=v2&amp;px=400" role="button" title="xml5.jpg" alt="xml5.jpg" /></span></SPAN></P><P>The last screenshot shows the final result:</P><P><SPAN><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="xml6.jpg" style="width: 400px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/76654i2F82378A1997C5F1/image-size/medium?v=v2&amp;px=400" role="button" title="xml6.jpg" alt="xml6.jpg" /></span></SPAN></P><P>What we can see:</P><P>The top level&nbsp;<FONT face="courier new,courier" color="#339966">&lt;EncryptedData&gt;</FONT> node has 3 children<BR /><FONT face="courier new,courier">- EncryptedData</FONT><BR /><FONT face="courier new,courier">--- EncryptionMethod</FONT><BR /><FONT face="courier new,courier">--- KeyInfo</FONT><BR /><FONT face="courier new,courier">--- CipherData</FONT></P><P><FONT size="5">Explanation</FONT></P><P><span class="lia-unicode-emoji" title=":small_orange_diamond:">🔸</span><SPAN><FONT face="courier new,courier">EncryptionMethod</FONT><BR /></SPAN>This is the information about how the content was encrypted.<BR />In our example, the symmetric cipher AES was used with a key size of 256 bits and operation mode GCM.</P><P><span class="lia-unicode-emoji" title=":small_orange_diamond:">🔸</span><SPAN><FONT face="courier new,courier">CipherData</FONT><BR /></SPAN>The result of encrypting plain text is called “ciphertext” and it is stored below this node.<BR />Note that the cipher text is base64-encoded.</P><P><span class="lia-unicode-emoji" title=":small_orange_diamond:">🔸</span><SPAN><FONT face="courier new,courier">KeyInfo</FONT><BR /></SPAN>In our example, we chose to encrypt the symmetric key.<BR />The <FONT face="courier new,courier">&lt;KeyInfo&gt;</FONT> node carries the information about this symmetric key<BR />(Remember, this is the key that was used to encrypt the content).<BR />The&nbsp;<FONT face="courier new,courier">&lt;KeyInfo&gt;</FONT> has the following children:<BR /><FONT face="courier new,courier">- KeyInfo</FONT><BR /><FONT face="courier new,courier">---- EncryptedKey</FONT><BR /><FONT face="courier new,courier">------- EncryptionMethod</FONT><BR /><FONT face="courier new,courier">------- CipherData</FONT></P><P>In our case, it contains the encrypted key itself and the method that was used for encryption.<BR />Example:&nbsp;We use an RSA public key for encrypting the DEK, so the <FONT face="courier new,courier">&lt;EncryptionMethod&gt;</FONT> node will contain something with “…rsa…”</P><P>Note:<BR />The algorithms are specified via URI, e.g.</P><P style=" text-align : left; "><FONT face="courier new,courier"><FONT color="#339966">&lt;xenc:EncryptionMethod</FONT> <FONT color="#993366">Algorithm</FONT>=<EM><FONT color="#0000FF">http://www.w3.org/2001/04/xmlenc#rsa-oaep-mgf1p</FONT>&nbsp;</EM> <FONT color="#339966">/&gt;</FONT></FONT></P><P>We can see the nice little namespace xenc<BR />I like this one <span class="lia-unicode-emoji" title=":beaming_face_with_smiling_eyes:">😁</span><BR />It is specified at top level node:</P><P style=" text-align : left; "><FONT face="courier new,courier"><FONT color="#339966">&lt;xenc:EncryptedData</FONT> <FONT color="#993366">xmlns:xenc</FONT>=<EM><FONT color="#0000FF">http://www.w3.org/2001/04/xmlenc#</FONT>&nbsp;</EM></FONT></P><P>OK.<BR />Let’s add one more last screenshot, where we can compare the XML payload before and after encryption:</P><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="xml8.jpg" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/76658i38051B3681A0E880/image-size/large?v=v2&amp;px=999" role="button" title="xml8.jpg" alt="xml8.jpg" /></span></P><P>Note:<BR />The receiver has to know which variant was used:<BR />If the only the content was encrypted, or the whole element.<BR />This is specified in the “Type” attribute of the top-level element:</P><P data-unlink="true"><FONT face="courier new,courier"><FONT color="#339966">&lt;xenc:EncryptedData&nbsp;</FONT> <FONT color="#993366">Type</FONT>=</FONT><EM><FONT face="courier new,courier"><FONT color="#0000FF">http://www.w3.org/2001/04/xmlenc#Content</FONT>&nbsp;</FONT><BR /></EM>or<BR /><FONT face="courier new,courier"><FONT color="#339966">&lt;xenc:EncryptedData</FONT>&nbsp; <FONT color="#993366">Type</FONT>=<EM><FONT color="#0000FF">http://www.w3.org/2001/04/xmlenc#Element</FONT>&nbsp;</EM></FONT></P><P>And here comes one last (really last) screenshot, showing the result of encrypting with the variant 3, which is of Type <FONT color="#0000FF">...xmlenc#Element</FONT>:</P><P><SPAN><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="xml7.jpg" style="width: 400px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/76655i2DDF8A39587A5485/image-size/medium?v=v2&amp;px=400" role="button" title="xml7.jpg" alt="xml7.jpg" /></span></SPAN></P><P>In above screenshot we can see that the <FONT face="courier new,courier" color="#FF0000">&lt;CreditCard&gt; </FONT>node has disappeared.<BR />The node itself has been replaced with the <FONT face="courier new,courier" color="#339966">&lt;EncryptedData&gt; </FONT>node.<BR />In the groovy script below, we’ll see the flag that decides upon the type.</P><H2 id="toc-hId-202714942">Optional Info</H2><P>The “XML Encryption” is also called “XML-Enc”.<BR />It is a standard that is specified as a <EM>W3C Recommendation</EM>.<BR />It is owned by the <EM>World Wide Web Consortium</EM>&nbsp;aka <EM>W3C</EM>.<BR />The <EM>W3C</EM> owns most standards related to the World Wide Web.<BR />The current version 1.1 of the specification for <EM>XML Encryption Syntax and Processing</EM> is from 2013.<BR />It can be found here: <A href="https://www.w3.org/TR/xmlenc-core1/" target="_blank" rel="noopener nofollow noreferrer">https://www.w3.org/TR/xmlenc-core1/</A></P><P>Implementations of the standard are available for C, <A href="http://santuario.apache.org/" target="_blank" rel="noopener nofollow noreferrer">C++ and Java</A>.<BR />The Java implementation is used in our next blog post.</P><H2 id="toc-hId-6201437">Summary</H2><P>The XML Enc specification describes how to flexibly encrypt parts of an XML document.<BR />(Or the whole).<BR />The sensitive xml-section is replaced by a new &lt;EncryptedData&gt; section.<BR />This xml-tree contains the encrypted content and metadata (method, key, etc)<BR />The spec is flexible and open, but the common process of encryption would be:<BR />&nbsp; &nbsp;<span class="lia-unicode-emoji" title=":play_button:">▶️</span>&nbsp;Generate a symmetric key on the fly.<BR />&nbsp; &nbsp; &nbsp;<span class="lia-unicode-emoji" title=":play_button:">▶️</span>&nbsp;Encrypt the content with it.<BR />&nbsp; &nbsp; &nbsp; &nbsp;<span class="lia-unicode-emoji" title=":play_button:">▶️</span>&nbsp;Encrypt the symmetric key with an asymmetric key.</P><H2 id="toc-hId--190312068">Next Steps</H2><P>Go through the tutorial in the <A href="https://community.sap.com/t5/technology-blogs-by-sap/cloud-integration-manually-encrypt-decrypt-xml-payload-based-on-xml-enc/ba-p/13632096" target="_blank">next blog post</A> to gain hands-on experience.</P><H2 id="toc-hId--386825573"><SPAN>Links</SPAN></H2><P>W3C recommendation <A href="https://www.w3.org/TR/xmlenc-core1" target="_blank" rel="noopener nofollow noreferrer">XML Encryption Syntax and Processing V 1.1</A><BR />Apache <A href="https://santuario.apache.org/index.html" target="_blank" rel="noopener nofollow noreferrer">Santuario</A><BR /><SPAN><A href="https://community.sap.com/t5/technology-blogs-by-sap/sap-cloud-integration-understanding-pkcs-7-cms-standard/ba-p/13560268" target="_blank">Understanding</A> CMS (PKCS 7) standard.<BR /></SPAN><A href="https://blogs.sap.com/2022/11/04/sap-btp-security-glossary/" target="_blank" rel="noopener noreferrer">Security Glossary</A><SPAN>&nbsp;</SPAN><SPAN>Blog</SPAN></P><P style=" text-align: center; "><SPAN><span class="lia-unicode-emoji" title=":cactus:">🌵</span></SPAN></P> 2024-03-07T15:16:11.555000+01:00 https://community.sap.com/t5/technology-blogs-by-members/oil-amp-gas-ultimate-data-security-blockchain-data-backbone-from-ot-to-sap/ba-p/13640699 Oil & Gas - Ultimate Data Security - Blockchain Data Backbone from OT to SAP IT🚀 2024-03-18T08:58:40.889000+01:00 AndySilvey https://community.sap.com/t5/user/viewprofilepage/user-id/1397601 <P><STRONG>The Problem</STRONG></P><P>One of the Oil &amp; Gas Industry's biggest challenges is protecting the data which is flowing from UpStream OT Operational Technology to SAP IT Information Technology.</P><P>Due to the very nature of Oil &amp; Gas operations, more often than not, the OT Operational Technology is&nbsp; located in geographically remote places, and a long way from the SAP Information Technology and DataCenter.</P><P>The OT Data is the most vulnerable, the most exposed to threats when it is flowing from the UpStream Sectore, the "E &amp; P" Exploration and Production, to the SAP IT systems in the DataCenter:</P><P style=" padding-left : 30px; "><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="SAP Oil Gas Operations Technology Data Risk Integration to S4HANA Industry Cloud atkrypto.io" style="width: 744px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/81923iB708F76750A180FC/image-size/large?v=v2&amp;px=999" role="button" title="SAP Oil Gas Operations Technology Data Risk Integration to S4HANA Industry Cloud atkrypto.io .png" alt="SAP Oil Gas Operations Technology Data Risk Integration to S4HANA Industry Cloud atkrypto.io" /><span class="lia-inline-image-caption" onclick="event.preventDefault();">SAP Oil Gas Operations Technology Data Risk Integration to S4HANA Industry Cloud atkrypto.io</span></span></P><P>&nbsp;</P><P><STRONG>The Threat</STRONG>:</P><P>The biggest threat to getting data from the Oil &amp; Gas Operational Technology to the SAP Information Technology, is the threat of Cyber Attacks. The attack vector at most risk is the movement of the data, or the data on the move, the integration between the OT and the SAP IT.</P><P>In their March 2023 Report, "<SPAN>How to enhance the cybersecurity of operational technology environments",&nbsp;</SPAN><A href="https://www.mckinsey.com/capabilities/risk-and-resilience/our-insights/cybersecurity/how-to-enhance-the-cybersecurity-of-operational-technology-environments" target="_self" rel="nofollow noopener noreferrer">McKinsey and Company</A>&nbsp;highlight the need for "strengthening technological foundations", and in particular, highlighting that,</P><P style=" padding-left : 30px; "><EM><STRONG>"integration between OT systems and ERP systems increase the need for secure convergence between the IT and OT environments"</STRONG></EM></P><P><SPAN>&nbsp;Courtney Schneider, in the report,&nbsp;"OT security incidents in 2021: Trends &amp; Analysis," Waterfall Security Solutions, May 17, 2022, noted that,</SPAN></P><P style=" padding-left : 30px; "><STRONG><EM>"OT cyberattacks tend to have higher, more negative effects than those in IT do, as they can have physical consequences (for example, shutdowns, outages, leakages, and explosions). Of 64 OT cyberattacks publicly reported in 2021 (an increase of 140 percent over the number reported in 2020), approximately 35 percent had physical consequences, and the estimated damages were <U>$140 million per incident</U>."</EM></STRONG></P><P style=" padding-left : 30px; ">&nbsp;</P><P><STRONG>Today's Legacy Approach to Integration Security</STRONG></P><P>Data Security has evolved slowly during that last 30 years:</P><P style=" padding-left : 30px; "><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Evolution of Data Security atkrypto.io" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/81930iD8EE1C964ECE3F73/image-size/large?v=v2&amp;px=999" role="button" title="Evolution of Data Security atkrypto.io.png" alt="Evolution of Data Security atkrypto.io" /><span class="lia-inline-image-caption" onclick="event.preventDefault();">Evolution of Data Security atkrypto.io</span></span></P><P>Data Encryption is not enough</P><P style=" padding-left : 30px; "><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Encryption is not enough atkrypto.io" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/81933iA23FB16151DD4A84/image-size/large?v=v2&amp;px=999" role="button" title="Encryption is not enough atkrypto.io.png" alt="Encryption is not enough atkrypto.io" /><span class="lia-inline-image-caption" onclick="event.preventDefault();">Encryption is not enough atkrypto.io</span></span></P><P>&nbsp;</P><P><STRONG>The Business Demand</STRONG></P><P>The Oil &amp; Gas industry is demanding more, the Business is demanding better security of integration between OT and SAP IT.</P><P>&nbsp;</P><P><STRONG>The Digital Transformation of Information Security is Enterprise Blockchain, The Next Generation Data Integrity, Originality, Confidentiality Protection</STRONG></P><P>Enterprise Blockchain, Enterprise Distributed Ledger Technology is re-imagining information security.</P><P>Enterprise Blockchain Platforms bring, out of the box, natively, a level of security which is not possible out of the box, natively, with any other commercial database product.</P><P>What is so special about the Enterprise Blockchain, (and discussed in the previous blogs, <A href="https://community.sap.com/t5/technology-blogs-by-members/why-i-love-sap-and-blockchain-databases-and-why-you-should-too/ba-p/13625869" target="_self">here</A>, <A href="https://community.sap.com/t5/technology-blogs-by-members/sap-enterprise-architecture-positioning-blockchain-database-as-an/ba-p/13629842" target="_self">here</A>, and <A href="https://community.sap.com/t5/technology-blogs-by-members/sap-enterprise-architecture-let-the-use-case-find-the-blockchain/ba-p/13632458" target="_self">here</A>) is that&nbsp;<SPAN>Blockchain Distributed Ledger Technology has four special characteristics which make it information security re-imagined, and the next generation of information security, these special characteristics are:&nbsp;</SPAN></P><P style=" padding-left : 30px; "><SPAN><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="atkrypto.io what is a blockchain SAP Oil Gas OT IT" style="width: 930px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/81935iBDA1218F1E76520F/image-size/large?v=v2&amp;px=999" role="button" title="atkrypto.io what is a blockchain.jpg" alt="atkrypto.io what is a blockchain SAP Oil Gas OT IT" /><span class="lia-inline-image-caption" onclick="event.preventDefault();">atkrypto.io what is a blockchain SAP Oil Gas OT IT</span></span></SPAN></P><P><SPAN>McKinsey &amp; Company, in their&nbsp;</SPAN><A href="https://www.mckinsey.com/featured-insights/mckinsey-explainers/what-is-blockchain" target="_self" rel="nofollow noopener noreferrer">December 2023 Featured Insights Publication</A><SPAN>, gave a beautiful description of what is unique and special about Blockchain, "</SPAN><EM>Blockchain is a secure database shared across a network of participants, where up-to-date information is available to all participants at the same time</EM><SPAN>". If we just pause for a moment and let that sink in, and think about what that means, to Business Processes, to Collaboration, to System Resilience, we start to see what is so special about Blockchain Databases and Distributed Ledger Technology.</SPAN></P><P><SPAN>This means, we can have the an Enterprise Blockchain Database Tenant running at the Oil &amp; Gas E&amp;P OT sector and an Enterprise Blockchain Database Tenant running at the SAP DataCenter location, and the same data available in both places and protected to the highest level by the Blockchain's Hash Mechanism, Consensus Mechanism, Immutable status, and Distributed resilience.</SPAN></P><P><SPAN>We can now run Enterprise Blockchain Database from the Exploration and Production sector to the SAP system in the DataCenter, protecting the OT Data as it flows to the SAP IT, to a level of security protection that was not possible with the previous generation of technology:</SPAN></P><P style=" padding-left : 30px; "><SPAN><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Blockchain Next Generation Data Protection SAP Oil Gas OT IT atkrypto.io" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/81937iA0B7C6D6E1D73F55/image-size/large?v=v2&amp;px=999" role="button" title="Blockchain Next Generation Data Protection SAP Oil Gas OT IT atkrypto.io.png" alt="Blockchain Next Generation Data Protection SAP Oil Gas OT IT atkrypto.io" /><span class="lia-inline-image-caption" onclick="event.preventDefault();">Blockchain Next Generation Data Protection SAP Oil Gas OT IT atkrypto.io</span></span></SPAN></P><P>&nbsp;</P><P><STRONG>Wrapping Up and Reference Architecture</STRONG></P><P>To wrap up, a simple reminder,&nbsp;</P><P style=" padding-left : 30px; "><EM><STRONG>The Digital Transformation of Information Security is Enterprise Blockchain</STRONG></EM></P><P style=" padding-left : 30px; "><EM><STRONG>Enterprise Blockchain is the Next Generation Data Integrity, Originality, Confidentiality Protection</STRONG></EM></P><P>Enterprise Blockchain, Enterprise Distributed Ledger Technology is re-imagining information security.</P><P>SAP have got everything in place for you to do this today, a<SPAN>nd here's the thing, and now, within the&nbsp;</SPAN><A href="https://www.sap.com/norway/partners/partner-program/build.html" target="_self" rel="noopener noreferrer">SAP Partner Edge Open EcoSystem</A><SPAN>&nbsp;there are enabling technology Blockchain Products designed and built by SAP Experts specifically for the needs of SAP Customers to make doing Blockchain and SAP easy, and so today, you can do SAP and Blockchain, it's no longer hype, today it's real and there's nothing stopping you.</SPAN></P><P>&nbsp;</P><P><STRONG>Reference Architecture Event Driven Blockchain with SAP</STRONG></P><P>Here is an example of how Enterprise Blockchain can be implemented to bring next generation data integrity protection to the Oil and Gas OT to IT integrations.</P><P>The Enterprise Blockchain Database Tenant is running at the E&amp;P Sector and at the same time, the Enterprise Blockchain Database Tenant is running at the SAP Business Technology Platform. The OT Data is written to the Enterprise Blockchain Database and the SAP S/4HANA and or SAP Industry Cloud read the data from the same Enterprise Blockchain Database.&nbsp;</P><P style=" padding-left : 30px; "><SPAN><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="SAP Oil and Gas OT to IT Integration Blockchain Security atkrypto.io" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/81939i1FEFF53A1F4EC220/image-size/large?v=v2&amp;px=999" role="button" title="SAP Oil and Gas OT to IT Integration Blockchain Security atkrypto.io.png" alt="SAP Oil and Gas OT to IT Integration Blockchain Security atkrypto.io" /><span class="lia-inline-image-caption" onclick="event.preventDefault();">SAP Oil and Gas OT to IT Integration Blockchain Security atkrypto.io</span></span></SPAN></P><P><SPAN>As McKinsey &amp; Company, in their&nbsp;<A href="https://www.mckinsey.com/featured-insights/mckinsey-explainers/what-is-blockchain" target="_self" rel="nofollow noopener noreferrer">December 2023 Featured Insights Publication</A>, gave a beautiful description of what is unique and special about Blockchain, "<STRONG><EM>Blockchain is a secure database shared across a network of participants, where up-to-date information is available to all participants at the same time</EM></STRONG>".</SPAN></P><P>The good news is, as we discussed in the previous blog, this is no longer hype, we can do all of this today,<SPAN>&nbsp;</SPAN><SPAN>and now, within the&nbsp;</SPAN><A href="https://www.sap.com/norway/partners/partner-program/build.html" target="_self" rel="noopener noreferrer">SAP Partner Edge Open EcoSystem</A><SPAN>&nbsp;there are enabling technology Blockchain Products designed and built by SAP Experts specifically for the needs of SAP Customers to make doing Blockchain and SAP easy, and so you can do SAP and Blockchain, today it's real and there's nothing stopping you.</SPAN></P><P>So what are we waiting for ? Oh yeah, more use cases, ok, that will continue in&nbsp; the next blog</P><DIV><P><SPAN>What do you think, are the words Blockchain, Web3, Distributed Ledger Technology, starting to appear in your Company's visions and technology visions ? What use cases are you looking at ? Let's chat about it in the comments.</SPAN></P><P>For now, over and out.</P><P>Andy Silvey.</P><P>Independent SAP Technical Architect and CEO of atkrypto.io</P><P>Author Bio:</P><P>Andy Silvey is a 25 years SAP Technology veteran&nbsp;[<EM>15 years SAP Basis and 10 years SAP Tech Arch including Tech, Integration, Security, Data from 3.1H to S/4HANA PCE on RISE and the BTP and everything in between, and<SPAN>&nbsp;</SPAN><A href="https://community.sap.com/t5/welcome-corner-blog-posts/andy-silvey-scn-moderator-spotlight/ba-p/13054438" target="_self">former SCN Moderator and Mentor alumni</A>].</EM></P><P>Andy is also co-Founder of atkrypto inc, an startup whose ambition is to make Blockchain easy for Enterprise.</P><P>atkrypto.io's flagship product is the atkrypto Enterprise Blockchain Platform for SAP,&nbsp; and atkrypto.io is a SAP Partner Edge Open EcoSystem Partner.&nbsp;</P><P>The&nbsp;atkrypto Enterprise Blockchain Platform for SAP has been designed by SAP Independent Experts for the needs of SAP Customers and to be deployed on the SAP BTP Kyma Runtime Service and leverage native integration to SAP Products.</P><P>atkrypto&nbsp;Enterprise Blockchain Platform for SAP has a number of unique qualities, including being the only Blockchain software in the world which has a DataCenter version and a light mobile version which can run on Edge/IoT/Mobile devices and enables data to be written to the Blockchain at the Edge where that same Blockchain is running on a Server in the DataCenter, protecting the integrity and originality of data from the Edge to Insights. Taking Blockchain to the Data at the Edge instead of taking the Data to the Blockchain.</P></DIV><P>&nbsp;</P> 2024-03-18T08:58:40.889000+01:00 https://community.sap.com/t5/crm-and-cx-blogs-by-sap/a-robust-security-package-for-the-sap-customer-data-cloud-ciam/ba-p/13641863 A Robust Security Package for the SAP Customer Data Cloud (CIAM) 2024-03-18T17:41:26.395000+01:00 monica_domingo https://community.sap.com/t5/user/viewprofilepage/user-id/309247 <P>In today’s fast-paced digital sphere, managing customer identities and data has become a significant task for businesses. It has become crucial to have a functional system that can robustly handle user identities, access management, and data privacy.&nbsp;</P><P>The SAP Customer Data Cloud (CIAM) – Security Package securely regulates user access and provides a secure environment for customer data.</P><OL><LI>CIAM comprises an identity management solution that simplifies customer data management. It offers Single Sign-On (SSO), robust registration, and social login options to streamline user experience and boost customer engagement. The data is stored securely, given the strict compliance standards that the software adheres to.</LI></OL><OL><LI>Security Package offers multi-factor authentication, risk-based authentication, and advanced security reporting to safeguard against data fraud. It not only protects sensitive data from potential breaches but also maintains regular auditing to ensure persistent monitoring and control of data access.</LI></OL><OL><LI>Privacy and Consent Management. Compliance is a significant aspect that businesses need to employ diligently. It provides comprehensive regulatory functionality that helps businesses stay compliant with various data protection regulations across the globe. It allows users to conveniently manage their consent preferences, making the business more trustworthy.</LI></OL><P data-unlink="true">To understand the SAP Customer Data Cloud (CIAM) features and functions more deeply, check &nbsp;<A title="the blog" href="https://community.sap.com/t5/customer-relationship-management-blogs-by-sap/sap-customer-data-cloud-ciam-security-package/ba-p/13529215" target="_blank">the blog</A>.&nbsp;It provides a broad perspective on the CIAM security package, how it works, its benefits, and other relevant information.</P><P>Overall, the CIAM Security Package provides a reliable security infrastructure that businesses can leverage to secure customer data and enhance customer experience. It’s a well-rounded solution that addresses the critical aspects of identity management, security, and compliance. Security Package offers a significant solution for comprehensive customer identity management - a secure, reliable, and future-proof answer to all identity management needs.</P><P>Find out more detail in the CX Value map.&nbsp;Sign up for&nbsp;<A href="http://support.sap.com/valuemaps" target="_blank" rel="noopener noreferrer">the SAP Enterprise Support value maps</A>&nbsp;by requesting access to&nbsp;<A href="https://support.sap.com/en/offerings-programs/enterprise-support/enterprise-support-academy/learn.html" target="_blank" rel="noopener noreferrer">SAP Learning Hub</A>&nbsp;or join the&nbsp;<A href="https://enrollment-ac82d52a4.dispatcher.hana.ondemand.com/index.html?itemID=LR_ValueMaps_EN" target="_blank" rel="nofollow noopener noreferrer">SAP Enterprise Support Value Maps Learning Room</A>&nbsp;if you already have access.</P><P><SPAN>Any questions? Please, contact the&nbsp; <A title="Value map team!" href="mailto:SAPESValueMaps@sap.com" target="_blank" rel="noopener nofollow noreferrer">Value map team!</A></SPAN></P><P>&nbsp;</P><P><SPAN>Mónica Domingo</SPAN></P><P>Global Topic Owner - SAP Customer Experience Solutions</P> 2024-03-18T17:41:26.395000+01:00 https://community.sap.com/t5/technology-blogs-by-members/the-what-is-the-why-to-the-how-to-of-esg-amp-sap-amp-enterprise-blockchain/ba-p/13642365 The What Is... The Why To... The How To... of: ESG & SAP & Enterprise Blockchain 🚀 2024-03-21T15:21:10.356000+01:00 AndySilvey https://community.sap.com/t5/user/viewprofilepage/user-id/1397601 <P><STRONG>What is ESG ?</STRONG></P><P>ESG is "Environmental, Social, and corporate Governance" and revolves around how well an Organisation is performing across these three pillars. The stronger an Organisation is across these pillars, the higher the Organisation's ESG score or rating will be.</P><P>What is an ESG score/rating ? For me it's like <EM>when I go on Booking.com or AirBnB to find an apartment or hotel for a family holiday</EM>, I am looking for the properties which have the highest rating. This is how it is with ESG, the ESG score shows the Organisation's rating across these dimensions,&nbsp;"Environmental, Social, and corporate Governance", where we would expect, the higher the score, the more we can trust the Organisation.</P><P>And ESG is more than that, as&nbsp;<a href="https://community.sap.com/t5/user/viewprofilepage/user-id/171355">@James_Marland</a>&nbsp;describes in the blog&nbsp;<A class="" href="https://community.sap.com/t5/spend-management-blogs-by-sap/your-ledger-is-about-to-go-green/ba-p/13576804" target="_blank">Your Ledger is about to go Green</A>&nbsp;the European Union is on a journey bringing legislation and "<SPAN><EM>are going to ask companies to maintain a second set of books, that run in parallel to the traditional ledgers, and that’s a set of books called the Green Ledger</EM>".</SPAN></P><P>ESG scoring takes a holistic view of the Organisation:</P><P style=" padding-left : 30px; "><A href="https://community.sap.com/t5/technology-blogs-by-sap/getting-esg-reporting-and-performance-management-under-control-with-the-sap/ba-p/13530998" target="_self"><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Holistic View on Sustainability Performance – Example WEF SCM Framework" style="width: 949px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/82919i63CEA4D9973973BF/image-size/large?v=v2&amp;px=999" role="button" title="SAP Holistic View on Sustainability Performance – Example WEF SCM Framework - atkrypto.io .png" alt="Holistic View on Sustainability Performance – Example WEF SCM Framework" /><span class="lia-inline-image-caption" onclick="event.preventDefault();">Holistic View on Sustainability Performance – Example WEF SCM Framework</span></span></A></P><P style=" padding-left : 30px; ">[thanks to&nbsp;<a href="https://community.sap.com/t5/user/viewprofilepage/user-id/370878">@gunther_rothermel</a>&nbsp;and his <A href="https://community.sap.com/t5/technology-blogs-by-sap/getting-esg-reporting-and-performance-management-under-control-with-the-sap/ba-p/13530998" target="_self">ESG Performance Management blog</A>]</P><P style=" padding-left : 30px; ">&nbsp;</P><P>For me,</P><P style=" padding-left : 30px; "><STRONG><EM>ESG is about Data.</EM></STRONG></P><P>&nbsp;</P><P><STRONG>Why to do ESG ?</STRONG></P><P>There are hard reasons and softer reasons, the softer reasons are elaborated in more detail below, but the hard reason for doing ESG, the reason we cannot be avoided, is European legislation, and to repeat, so that we don't miss it,&nbsp;as&nbsp;<a href="https://community.sap.com/t5/user/viewprofilepage/user-id/171355">@James_Marland</a>&nbsp;describes in the blog&nbsp;<A class="" href="https://community.sap.com/t5/spend-management-blogs-by-sap/your-ledger-is-about-to-go-green/ba-p/13576804" target="_blank">Your Ledger is about to go Green</A>&nbsp;the European Union is on a journey bringing legislation and "<SPAN><EM>are going to ask companies to maintain a second set of books, that run in parallel to the traditional ledgers, and that’s a set of books called the Green Ledger</EM>".</SPAN></P><P>ESG (“Environmental, Social, and corporate Governance”) concerns are playing a greater role in investment decisions and hence corporate decision making.&nbsp;</P><P>Part of the ESG framework is <EM>scoring</EM>&nbsp;Organisations to measure how they are performing against ESG standards.</P><P>ESG scoring helps to provide a standardized way to quantify an Organisation’s ESG impact, and is consumed by:</P><P>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Consumers of ESG Ratings - atkrypto.io" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/83006i5FA6AF4CD78B64BA/image-size/large?v=v2&amp;px=999" role="button" title="Consumers of ESG Ratings - atkrypto.io .png" alt="Consumers of ESG Ratings - atkrypto.io" /><span class="lia-inline-image-caption" onclick="event.preventDefault();">Consumers of ESG Ratings - atkrypto.io</span></span></P><P>In <A href="https://community.sap.com/t5/customer-relationship-management-blogs-by-sap/sap-premium-engagement-session-sustainability-within-sap-premium/ba-p/13534374" target="_self">her blog,</A>&nbsp;<a href="https://community.sap.com/t5/user/viewprofilepage/user-id/695927">@annchristinschechter</a>&nbsp;, the <A href="https://d.dam.sap.com/a/FMVAww4/Wittwer_Reichel_Knoedler_Sustainability%20within%20SAP%20Premium%20Engagements.pdf?rc=10" target="_self" rel="noopener noreferrer">report describes it like this</A>:</P><P style=" padding-left : 30px; "><STRONG><EM>The Situation: Sustainable Business is the 3rd Wave of Global Economic Transformation</EM></STRONG></P><P style=" padding-left : 30px; "><STRONG><EM>Investors, shareholders, regulators, and consumers all demand responsibly derived products </EM></STRONG><BR /><STRONG><EM>and services with a smaller environmental footprint. Reducing global emissions, </EM></STRONG><BR /><STRONG><EM>waste, and social injustice requires a full-lifecycle approach with enterprises at the forefront.</EM></STRONG></P><P style=" padding-left : 30px; "><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Wittwer Reichel Knoedler - Sustainability within SAP Premium Engagements" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/83022i59549BD92204A336/image-size/large?v=v2&amp;px=999" role="button" title="Wittwer Reichel Knoedler - Sustainability within SAP Premium Engagements .png" alt="Wittwer Reichel Knoedler - Sustainability within SAP Premium Engagements" /><span class="lia-inline-image-caption" onclick="event.preventDefault();">Wittwer Reichel Knoedler - Sustainability within SAP Premium Engagements</span></span></P><P>Going back to the, <EM>Booking.com or AirBnB to find an apartment or hotel for a family holiday analogy</EM>, in the same way as a properties with lower ratings attract less interest, the time will soon be upon us when Organisations with lower ESG scores will be at a disadvantage compared to those with higher scores.</P><P>That and social responsibility is Why To Do ESG.</P><P>For me, again,</P><P style=" padding-left : 30px; "><STRONG><EM>ESG is about the Data, and if the Data is so important, then we need to be able to Trust the Data.</EM></STRONG></P><P>&nbsp;</P><P><STRONG>How to do SAP, ESG, and Enterprise Blockchain</STRONG></P><P>The ESG score is an example of the circular economy. The key to the score is the Data, the Data coming from in most cases the Edge, from Sensors and Things. As shown in the picture below, the Data from the Edge needs to be stored safely and securely so that it can be processed by the <A href="https://www.sap.com/products/scm/sustainability-control-tower.html" target="_self" rel="noopener noreferrer">SAP Sustainability Control Tower</A>:</P><P style=" padding-left : 30px; "><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="SAP - ESG - IoT - Enterprise Blockchain - atkrypto.io" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/83101iD356BEFCA74F9F5F/image-size/large?v=v2&amp;px=999" role="button" title="SAP - ESG - IoT - Enterprise Blockchain - atkrypto.io .png" alt="SAP - ESG - IoT - Enterprise Blockchain - atkrypto.io" /><span class="lia-inline-image-caption" onclick="event.preventDefault();">SAP - ESG - IoT - Enterprise Blockchain - atkrypto.io</span></span></P><P>SAP by the way, have a portfolio of Products to enable Enterprises to do ESG, and these include:</P><P style=" padding-left : 30px; ">. <A href="https://www.sap.com/uk/products/scm/sustainability-footprint-management.html" target="_self" rel="noopener noreferrer">SAP Sustainability Footprint Management</A></P><P style=" padding-left : 30px; ">. <A href="https://www.sap.com/products/business-network/sustainability-data-exchange.html" target="_self" rel="noopener noreferrer">SAP Sustainability Data Exchange</A></P><P style=" padding-left : 30px; ">. <A href="https://www.sap.com/uk/products/scm/sustainability-control-tower.html" target="_self" rel="noopener noreferrer">SAP Sustainability Control Tower</A></P><P>In this blog we are focusing on protecting the integrity and originality and confidentiality of Data which is used to do ESG scoring and rating, Data which would then be consumed by for example the <A href="https://www.sap.com/uk/products/scm/sustainability-control-tower.html" target="_self" rel="noopener noreferrer">SAP Sustainability Control Tower</A>.</P><P>There are two related challenges to overcome when collecting data for ESG scoring.&nbsp; The first comes in two parts: simply collecting the data in the first place, since there may be large numbers of sensors and systems (consider carbon emissions across a supply chain, and the myriad vehicles, vessels, machines and people involved); and moving that data fast enough that decisions can be made using it (which we’ll use as the definition of “real-time” in the rest of this blog)</P><P>The second challenge is that with any measurement system, the measurement is only as reliable as the data collected.&nbsp; This opens a “trust gap:” organisations have incentives to increase their ESG score: how can we be sure of the validity of the data they’ve collected?&nbsp; Similarly, how can <EM>they</EM> be sure of the data their subcontractors have collected?</P><P>Investors are increasingly demanding ESG Audits of target Organisations, and it’s likely the requirements of ESG scoring become stricter.&nbsp; Being able to demonstrate that an Organisation’s ESG data collection methods are beyond reproach is likely to represent a significant business advantage, along with benefits of reacting to this data in real time.</P><P><STRONG>ESG Data Sources</STRONG></P><P>ESG measurement data can contain Personal Sensitive and Business Critical information across the Corporate domains of:</P><P style=" padding-left : 30px; "><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ESG Data Sensitivity atkrypto.io" style="width: 522px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/83220iDE3A62730AF49F45/image-size/large?v=v2&amp;px=999" role="button" title="ESG Data Sensitivity atkrypto.io .png" alt="ESG Data Sensitivity atkrypto.io" /><span class="lia-inline-image-caption" onclick="event.preventDefault();">ESG Data Sensitivity atkrypto.io</span></span></P><P>Data sources for this data come from all over the organisation: Enterprise Applications and Things (sensors, monitors and connected applications at the edge), including ERP systems, HR systems, Sensors measuring CO2 levels and Water Quality.</P><P>In this blog we’ll take as an example data from Waste Trucks proving responsible disposal of Corporate waste, to see just how many sources of data there are and how to address the challenges this creates.</P><P style=" padding-left : 30px; "><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ESG Example Sources of Data - atkrypto.io" style="width: 968px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/83226iBAEF2F36FE88B1E6/image-size/large?v=v2&amp;px=999" role="button" title="ESG Example Sources of Data - atkrypto.io .png" alt="ESG Example Sources of Data - atkrypto.io" /><span class="lia-inline-image-caption" onclick="event.preventDefault();">ESG Example Sources of Data - atkrypto.io</span></span></P><P>&nbsp;</P><P><STRONG>ESG Data Security </STRONG></P><P>In terms of the <SPAN><A href="https://www.nccoe.nist.gov/publication/1800-26/VolA/index.html#:~:text=The%20CIA%20triad%20represents%20the,%2C%20and%20availability%2C%20as%20follows." target="_blank" rel="noopener nofollow noreferrer">NIST CIA Triad</A></SPAN> for Data Security, Criticality, Integrity, Availability, ESG measurement data comes in Very High across all three classifications.</P><P style=" padding-left : 30px; "><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="NIST Triad Data Security Sensitivity Confidentiality Integrity Availability - atkrypto.io" style="width: 598px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/83232i60101C852E923398/image-dimensions/598x418?v=v2" width="598" height="418" role="button" title="NIST Triad Data Security Sensitivity Confidentiality Integrity Availability - atkrypto.io .png" alt="NIST Triad Data Security Sensitivity Confidentiality Integrity Availability - atkrypto.io" /><span class="lia-inline-image-caption" onclick="event.preventDefault();">NIST Triad Data Security Sensitivity Confidentiality Integrity Availability - atkrypto.io</span></span></P><P>As the ESG performance rating is so critical, data measurements which are used need to be auditable and the integrity of the data completely trustworthy, so the highest level of data security and integrity protection is required.</P><P>To address the “trust-gap”, it is essential that it can be proven that the ESG measurement data cannot be interfered with and can be trusted.&nbsp; At the same time, the ESG measurement data needs to be available to a number of Enterprise Applications for it to make any actionable change.</P><P><STRONG>Enterprise Architecture saves the day...</STRONG></P><P>So, this is where Enterprise IT comes in to save the day and solve the problem.</P><P>The business requirement is for:</P><P style=" padding-left : 30px; ">. Data from any source needs to be Stored as close to the source of the Data as possible</P><P style=" padding-left : 30px; ">. The source of the Data can be Edge / IoT / Mobile Things, and can also be ERP and Enterprise Software Applications</P><P style=" padding-left : 30px; ">. The Data needs to be stored with the highest level of integrity and originality and confidentiality and sensitivity protection</P><P style=" padding-left : 30px; ">. The Data store solution should be available out of the box in a commercial off the shelf product</P><P style=" padding-left : 30px; ">. The Data must be stored Immutably</P><P>As discussed in the previous blog, [<A class="" href="https://community.sap.com/t5/technology-blogs-by-members/sap-enterprise-architecture-positioning-blockchain-database-as-an/ba-p/13629842" target="_self">SAP Enterprise Architecture: Positioning Blockchain Database as an Enterprise Technology Standard <span class="lia-unicode-emoji" title=":rocket:">🚀</span></A>] when we look in to our Enterprise Architecture Technology Standards we see there is only 1 Technology Standard in the Enterprise which is positioned with the capabilities to fulfill all of those requirements out of the box, and that is the, <STRONG>Enterprise Blockchain Platform and Enterprise Blockchain Databases.</STRONG></P><P style=" padding-left : 30px; "><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Comparison Enterprise Blockchain Database and Traditional Legacy Database - atkrypto.io" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/83290i1873940C8D67F1DA/image-size/large?v=v2&amp;px=999" role="button" title="Comparison Enterprise Blockchain Database and Traditional Legacy Database - atkrypto.io .png" alt="Comparison Enterprise Blockchain Database and Traditional Legacy Database - atkrypto.io" /><span class="lia-inline-image-caption" onclick="event.preventDefault();">Comparison Enterprise Blockchain Database and Traditional Legacy Database - atkrypto.io</span></span></P><P><STRONG>Why Enterprise Blockchain Database for securely storing ESG measurement data ?</STRONG></P><P>As we described in the first blog in this series, [<A class="" href="https://community.sap.com/t5/technology-blogs-by-members/why-i-love-sap-and-blockchain-databases-and-why-you-should-too/ba-p/13625869" target="_self">Why I love SAP and Blockchain Databases and why you should too <span class="lia-unicode-emoji" title=":rocket:">🚀</span></A>], there are four characteristics which make Blockchain natively the most secure data storage.</P><P>These are:</P><P>&nbsp;&nbsp;<span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="atkrypto.io what is a blockchain" style="width: 930px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/83264i665C3F358CCF7FBA/image-size/large?v=v2&amp;px=999" role="button" title="atkrypto.io what is a blockchain.jpg" alt="atkrypto.io what is a blockchain" /><span class="lia-inline-image-caption" onclick="event.preventDefault();">atkrypto.io what is a blockchain</span></span></P><P>A Blockchain can only be called a Blockchain if it has these characteristics, the point being that once data is entered in a blockchain it cannot be altered or deleted.&nbsp; This provides <EM>trust</EM> in the data, so that, for instance, ESG auditors know that if a measurement is calculated from data held in a Blockchain, they can trust that the data hasn’t been adulterated while being stored.</P><P>In the following Enterprise Blockchain Platform for ESG deployment example scenarios we have data coming from multiple data sources, some of which are at the Edge/IoT and some are Enterprise Applications in the DataCenter or Cloud.&nbsp; At the same time data which is being written to the Enterprise Blockchain Database can originate from multiple Organisations which are sharing the same Enterprise Blockchain Platform and Database as a <EM><STRONG>common shared single source of truth</STRONG></EM>.</P><P style=" padding-left : 30px; "><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ESG Comparison Enterprise Blockchain Database and Traditional Legacy Database - atkrypto.io" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/83365iD48FA1154231F499/image-size/large?v=v2&amp;px=999" role="button" title="ESG Comparison Enterprise Blockchain Database and Traditional Legacy Database - atkrypto.io .png" alt="ESG Comparison Enterprise Blockchain Database and Traditional Legacy Database - atkrypto.io" /><span class="lia-inline-image-caption" onclick="event.preventDefault();">ESG Comparison Enterprise Blockchain Database and Traditional Legacy Database - atkrypto.io</span></span></P><P>The immutability of blockchain data is what enables <EM>trust</EM> between what otherwise might be competing organisations.</P><P>&nbsp;</P><P><STRONG>Example 1, Single Enterprise Blockchain Database within your Organisation for ESG Data</STRONG></P><P>In this example, an Enterprise is storing ESG data to its Enterprise Blockchain Platform.</P><P>ESG data is originating from multiple sources as shown in the diagram:</P><P style=" padding-left : 30px; "><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ESG Example Sources of Data - atkrypto.io" style="width: 968px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/83293i14D1CB38276D6A43/image-size/large?v=v2&amp;px=999" role="button" title="ESG Example Sources of Data - atkrypto.io .png" alt="ESG Example Sources of Data - atkrypto.io" /><span class="lia-inline-image-caption" onclick="event.preventDefault();">ESG Example Sources of Data - atkrypto.io</span></span></P><P>&nbsp;</P><P>Imagine an Enterprise subcontracting the disposal of its electronic waste.&nbsp; For ESG compliance the Enterprise needs to make sure that its waste carrying vehicles aren’t tempted to take short cuts in personnel management or the disposal, but must also verify the subcontractor is upholding their standards, too.</P><P>Data can be used from the Waste Truck’s GPS and onboard cameras to prove both where the waste was disposed of geographically through the GPS data and physically through the photographic evidence from the Truck’s on board cameras.&nbsp; Think about how delivery drivers photograph where they’ve left a parcel.</P><P>The collection of this data is enabled either by SAP Advanced Event Mesh, which spans geographies and environments such as On-Premise, Cloud and all the way to the Edge, connecting the Waste Truck to Enterprise Applications such as Route Planning, HR management, Scheduling and other operational systems as well as the Enterprise Blockchain Database Edge Tenants and the Enterprise Blockchain Database Server Tenants.&nbsp;</P><P>All this data, including the photographs, are stored on the Enterprise Blockchain Platform Database, the photographs will be stored as Enterprise NFT’s in the Enterprise Blockchain Wallet.</P><P style=" padding-left : 30px; "><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Next generation data integrity protection is Enterprise Blockchain Platform on SAP BTP Kyma - the secure data backbone - atkrypto.io" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/83361i835B13EC67E6C8E1/image-size/large?v=v2&amp;px=999" role="button" title="Next generation data integrity protection is Enterprise Blockchain Platform on SAP BTP Kyma - the secure data backbone - atkrypto.io.png" alt="Next generation data integrity protection is Enterprise Blockchain Platform on SAP BTP Kyma - the secure data backbone - atkrypto.io" /><span class="lia-inline-image-caption" onclick="event.preventDefault();">Next generation data integrity protection is Enterprise Blockchain Platform on SAP BTP Kyma - the secure data backbone - atkrypto.io</span></span></P><P>&nbsp;</P><P><STRONG>Example 2, Single Blockchain shared across Organisations for ESG Data</STRONG></P><P>This example is where the real beauty of the Distributed Ledger Technology is brought in to focus.</P><P>Enterprise Blockchain Platform Database&nbsp; as a shared single source of truth across Organisations.</P><P>In this example the Enterprise Blockchain Platform is running Blockchain Database Tenants in your Organisation and also in your Partner Organisations. This enables the Enterprise Blockchain Database to provide an irrefutable shared single source of truth for data across Organisations, who normally would not openly trust each other with data.</P><P style=" padding-left : 30px; "><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ESG Data from 3rd Party Organisations Enterprise Blockchain Shared Common Single Source of Truth - atkrypto.io" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/83355i07FE0E9661E68BED/image-size/large?v=v2&amp;px=999" role="button" title="ESG Data from 3rd Party Organisations Enterprise Blockchain Shared Common Single Source of Truth - atkrypto.io.png" alt="ESG Data from 3rd Party Organisations Enterprise Blockchain Shared Common Single Source of Truth - atkrypto.io" /><span class="lia-inline-image-caption" onclick="event.preventDefault();">ESG Data from 3rd Party Organisations Enterprise Blockchain Shared Common Single Source of Truth - atkrypto.io</span></span></P><P>Your Organisation outsources industrial waste collection and responsible disposal to a 3rd party Organisation.</P><P>Your ERP system orders the 3rd Party Waste Processor to collect and dispose of industrial waste.</P><P>For your Organisation’s ESG data, you depend upon evidence that the 3rd Party Organisation is responsibly disposing of the waste.</P><P>The Enterprise Blockchain Platform Database enables a shared single source of truth to be created across the Organisations by running inter-connected Blockchain Server Nodes in both Organisations.</P><P style=" padding-left : 30px; "><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="SAP ESG Blockchain Shared Single Source of Truth across 3rd Party Organisations - atkrypto.io" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/83357i27205CD7C27537DE/image-size/large?v=v2&amp;px=999" role="button" title="SAP ESG Blockchain Shared Single Source of Truth across 3rd Party Organisations - atkrypto.io.png" alt="SAP ESG Blockchain Shared Single Source of Truth across 3rd Party Organisations - atkrypto.io" /><span class="lia-inline-image-caption" onclick="event.preventDefault();">SAP ESG Blockchain Shared Single Source of Truth across 3rd Party Organisations - atkrypto.io</span></span></P><P>In the above example, the Enterprise&nbsp; Blockchain Platform Database is running across Organisations.</P><P>Your Organisation is writing data to the same Enterprise Blockchain Database as your 3rd Party partner Organisation.</P><P>The Enterprise Blockchain Database contains evidence from your S/4HANA ERP system that the 3rd Party Waste Processor was ordered to process your industrial waste.</P><P>In the same Enterprise Blockchain Database the 3rd Party Waste Disposal Organisation is storing evidence from the Waste Trucks that the waste was collected from your premises and disposed of responsibly at the authorised waste treatment center.</P><P>This scenario opens a new world of opportunities for multiple Enterprises to share data, multi-Enterprise collaboration, with the Enterprise Blockchain as the irrefutable common shared single source of truth across Organisations.</P><P>The most beautiful thing about the picture above is that we have an Enterprise Blockchain Database shared across 3rd party Organisations, this achieves a few things:</P><P style=" padding-left : 30px; ">. Saves a huge amount of effort to integrate the IT systems of the two 3rd party Organisations</P><P style=" padding-left : 30px; ">. Enables both Organisations to write Data to the same Enterprise Blockchain Database</P><P style=" padding-left : 30px; ">. Enables both the ESG Customer Organisation to read the Data from the Enterprise Blockchain Database into their SAP Sustainability Control Tower to enable ESG Reporting</P><P style=" padding-left : 30px; ">. Enables both Organisations to be able to trust the Data in the Enterprise Blockchain Database</P><P style=" padding-left : 30px; ">. Enables both Organisations to know that neither Organisation can modify the Data in the Enterprise Blockchain Database</P><P style=" padding-left : 30px; ">. Enables both Organisations to know that their shared Data is being protected to the highest level natively out of the box of any Database Product</P><P style=" padding-left : 30px; ">&nbsp;</P><P><STRONG>Wrapping Up&nbsp;</STRONG></P><P><STRONG>To wrap up, a simple reminder,&nbsp;</STRONG></P><P style=" padding-left : 30px; "><EM><STRONG>The Digital Transformation of Information Security is Enterprise Blockchain</STRONG></EM></P><P style=" padding-left : 30px; "><EM><STRONG>Enterprise Blockchain is the Next Generation Data Integrity, Originality, Confidentiality Protection</STRONG></EM></P><P style=" padding-left : 30px; "><STRONG>Enterprise Blockchain, Enterprise Distributed Ledger Technology is re-imagining information security</STRONG></P><P><STRONG>With regards to ESG,&nbsp;</STRONG></P><P style=" padding-left : 30px; "><EM><STRONG>ESG is about Data</STRONG></EM></P><P style=" padding-left : 30px; "><EM><STRONG>ESG is about the Data, and if the Data is so important, then we need to be able to Trust the Data</STRONG></EM></P><P style=" padding-left : 30px; "><STRONG><EM>If we need to be able to Trust the Data, then we need to put it on to the Enterprise Blockchain as the irrefutable common shared single source of truth across our Organisation and other Organisations</EM></STRONG></P><P>&nbsp;</P><P><STRONG>Enterprise Blockchain is both a Secure Store and a Secure Communication Channel.</STRONG></P><P>&nbsp;</P><P>This blog is the fifth in the series, the previous blogs are&nbsp;<SPAN>&nbsp;</SPAN><A href="https://community.sap.com/t5/technology-blogs-by-members/why-i-love-sap-and-blockchain-databases-and-why-you-should-too/ba-p/13625869" target="_self">here</A><SPAN>,&nbsp;</SPAN><A href="https://community.sap.com/t5/technology-blogs-by-members/sap-enterprise-architecture-positioning-blockchain-database-as-an/ba-p/13629842" target="_self">here</A><SPAN>, </SPAN><A href="https://community.sap.com/t5/technology-blogs-by-members/sap-enterprise-architecture-let-the-use-case-find-the-blockchain/ba-p/13632458" target="_self">here</A>&nbsp;and <A href="https://community.sap.com/t5/technology-blogs-by-members/oil-amp-gas-ultimate-data-security-blockchain-data-backbone-from-ot-to-sap/ba-p/13640699" target="_self">here.</A></P><P>We will be describing more use cases for this scenario in future blogs, including for example the Insurance use case, where the Carrier, the Broker, and the Customer are on the same Enterprise Blockchain.</P><P><SPAN>As McKinsey &amp; Company, in their&nbsp;<A href="https://www.mckinsey.com/featured-insights/mckinsey-explainers/what-is-blockchain" target="_self" rel="nofollow noopener noreferrer">December 2023 Featured Insights Publication</A>, gave a beautiful description of what is unique and special about Blockchain, "<STRONG><EM>Blockchain is a secure database shared across a network of participants, where up-to-date information is available to all participants at the same time</EM></STRONG>".</SPAN></P><P>The good news is, as we discussed in the previous blog, this is no longer hype, we can do all of this today,<SPAN>&nbsp;</SPAN><SPAN>and now, within the&nbsp;</SPAN><A href="https://www.sap.com/norway/partners/partner-program/build.html" target="_self" rel="noopener noreferrer">SAP Partner Edge Open EcoSystem</A><SPAN>&nbsp;there are enabling technology Blockchain Products designed and built by SAP Experts specifically for the needs of SAP Customers to make doing Blockchain and SAP easy, and so you can do SAP and Blockchain, today it's real and there's nothing stopping you.</SPAN></P><P>So what are we waiting for ? Oh yeah, more use cases, ok, that will continue in&nbsp; the next blog</P><DIV><P><SPAN>What do you think, are the words Blockchain, Web3, Distributed Ledger Technology, starting to appear in your Company's visions and technology visions ? What use cases are you looking at ? Let's chat about it in the comments.</SPAN></P><P><SPAN><STRONG>Credits</STRONG>: <STRONG>Tom Fairbairn <EM>Distinguished Engineer at Solace</EM></STRONG> contributed to this blog. We will be following this blog up with a deeper Technical Architecture dive into getting the Data and how <EM><A href="https://discovery-center.cloud.sap/serviceCatalog/advanced-event-mesh?region=all" target="_self" rel="nofollow noopener noreferrer">SAP Advanced Event Mesh</A></EM> is positioned in the Solution Architecture for publishing the real time ESG Data and Enterprise Blockchain is positioned for Protecting the ESG Data, Event Driven Blockchain, Publish &amp; Protect.</SPAN></P><P>For now, over and out.&nbsp;<span class="lia-unicode-emoji" title=":rocket:">🚀</span></P><P>Andy Silvey.</P><P>Independent SAP Technical Architect and CEO of atkrypto.io</P><P>Author Bio:</P><P>Andy Silvey is a 25 years SAP Technology veteran&nbsp;[<EM>15 years SAP Basis and 10 years SAP Tech Arch including Tech, Integration, Security, Data from 3.1H to S/4HANA PCE on RISE and the BTP and everything in between, and<SPAN>&nbsp;</SPAN><A href="https://community.sap.com/t5/welcome-corner-blog-posts/andy-silvey-scn-moderator-spotlight/ba-p/13054438" target="_self">former SCN Moderator and Mentor alumni</A>].</EM></P><P>Andy is also co-Founder of atkrypto inc, an startup whose ambition is to make Blockchain easy for Enterprise.</P><P>atkrypto.io's flagship product is the atkrypto Enterprise Blockchain Platform for SAP,&nbsp; and atkrypto.io is a SAP Partner Edge Open EcoSystem Partner.&nbsp;</P><P>The&nbsp;atkrypto Enterprise Blockchain Platform for SAP has been designed by SAP Independent Experts for the needs of SAP Customers and to be deployed on the SAP BTP Kyma Runtime Service and leverage native integration to SAP Products.</P><P>atkrypto&nbsp;Enterprise Blockchain Platform for SAP has a number of unique qualities, including being the only Blockchain software in the world which has a DataCenter version and a light mobile version which can run on Edge/IoT/Mobile devices and enables data to be written to the Blockchain at the Edge where that same Blockchain is running on a Server in the DataCenter, protecting the integrity and originality of data from the Edge to Insights. Taking Blockchain to the Data at the Edge instead of taking the Data to the Blockchain.</P></DIV> 2024-03-21T15:21:10.356000+01:00 https://community.sap.com/t5/technology-blogs-by-sap/sap-mobile-start-v1-11-release-update/ba-p/13643859 SAP Mobile Start V1.11 - Release Update 2024-03-25T09:47:10.630000+01:00 ThiloBerndt https://community.sap.com/t5/user/viewprofilepage/user-id/165819 <P>With the latest release of&nbsp;<STRONG>SAP Mobile Start</STRONG>, you get some nice features for end users, and also for administrators. Further more, we support a new language: Turkish.&nbsp;</P><P>Before we go into the new app features, I want to mention a new content type that we support with SAP Mobile Start:&nbsp;<STRONG>SAP Analytics Cloud KPIs</STRONG>&nbsp;as monitoring tiles and widgets.&nbsp;Now, you can see your SAP Analytics Cloud business KPIs in SAP Mobile Start as well.&nbsp;The KPIs are shown on the respective tile or widget, and you can easily navigate to the details (analytical story) by tapping on them. Based on the configuration, analytical stories can be opened within the native SAP Analytics Cloud app or within the embedded web view of SAP Mobile Start.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="Screenshot 2024-03-21 at 17.46.36.png" style="width: 365px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/84625iB59631EA7A56DBD7/image-size/medium?v=v2&amp;px=400" role="button" title="Screenshot 2024-03-21 at 17.46.36.png" alt="Screenshot 2024-03-21 at 17.46.36.png" /></span></P><P>&nbsp;</P><P style=" text-align: center; ">&nbsp;SAP Mobile Start – SAP Analytics Cloud KPIs</P><P>Please check my latest blog&nbsp;<SPAN><A href="https://community.sap.com/t5/technology-blogs-by-sap/content-is-key-sap-mobile-start-now-supports-sap-analytics-cloud-kpis-on/ba-p/13631195" target="_blank">Content is Key – SAP Mobile Start now supports SAP Analytics Cloud KPIs on Tiles &amp; Widgets.</A></SPAN></P><P>Now, let´s have a look at the new features. With the latest release, you&nbsp;can now&nbsp;search/ filter the list of your to-dos for faster access to the respective tasks or SAP S/4HANA situations.&nbsp;</P><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="Screenshot 2024-03-20 at 08.58.39.png" style="width: 400px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/83549i15DE19E202A66BCF/image-size/medium?v=v2&amp;px=400" role="button" title="Screenshot 2024-03-20 at 08.58.39.png" alt="Screenshot 2024-03-20 at 08.58.39.png" /></span></P><P style=" text-align: center; ">Search and Filter for To-Dos</P><P>You also can share your to-dos with your colleagues now, for instance a SAP S/4HANA situation. Just tab on the action menu of a to-do and select share. Then you can chose from the standard device sharing options how to share it.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="Screenshot 2024-03-20 at 09.01.39.png" style="width: 400px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/83552iA9C42355696C27C2/image-size/medium?v=v2&amp;px=400" role="button" title="Screenshot 2024-03-20 at 09.01.39.png" alt="Screenshot 2024-03-20 at 09.01.39.png" /></span></P><P style=" text-align: center; ">&nbsp;Sharing of To-Dos for easy collaboration</P><P>With the new release, system administrators can apply additional settings in the&nbsp;Mobile Settings Exchange menu of&nbsp;SAP Mobile Services:</P><UL><LI>Require to passcode-protect the watch before being able to use SAP Mobile Start on it</LI><LI>Disable the download or upload of files (like attachments) from the app, via the embedded web-view&nbsp;</LI></UL><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="ms1.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/83553i2B2A84DB07ED1B3E/image-size/large?v=v2&amp;px=999" role="button" title="ms1.png" alt="ms1.png" /></span></P><P style=" text-align: center; ">SAP Mobile Services - New features</P><P>I hope you like this new feature within SAP Mobile Start, we will certainly continue to add more attractive content types. &nbsp;&nbsp;</P><P>For further information on the new topics, please check our SAP Mobile Start&nbsp;<SPAN><A href="https://help.sap.com/docs/mobile-start?locale=en-US" target="_blank" rel="noopener noreferrer">documentation</A></SPAN>.</P><P>SAP Mobile Experience offers intelligent native mobile solutions that help businesses build more efficient, resilient and sustainable end-to-end processes, improving people’s work life wherever they are.</P><P>Visit&nbsp;<SPAN><A href="https://community.sap.com/topics/mobile-experience" target="_blank">SAP Mobile Experience Community Page</A></SPAN>&nbsp;and click “follow” to get the&nbsp;latest&nbsp;development and innovation of our solutions.&nbsp;We look forward to hearing about your experience with setting up the solution in your landscape; please do share your thoughts and comments below.&nbsp;<SPAN><A href="https://answers.sap.com/questions/ask.html?primaryTagId=73554900100800003452&amp;additionalTagId=246015353107843540080736084568477" target="_blank" rel="noopener noreferrer">Enter here&nbsp;</A></SPAN>for additional questions regarding SAP Mobile Experience Applications.</P><P>Want to be notified? Check your&nbsp;<SPAN><A href="https://people.sap.com/#communications" target="_blank" rel="noopener noreferrer">profile settings&nbsp;</A></SPAN>to ensure you have your settings activated.</P><P>&nbsp;</P> 2024-03-25T09:47:10.630000+01:00 https://community.sap.com/t5/technology-blogs-by-members/sap-idm-migration-guidelines-to-help-you-on-your-upcoming-iam-journey/ba-p/13648467 SAP IdM migration guidelines to help you on your upcoming IAM journey 2024-03-25T14:21:37.058000+01:00 todor_petrov https://community.sap.com/t5/user/viewprofilepage/user-id/742 <P>Let me introduce to you the ROIABLE SAP IdM Migration Guidelines. Your one-stop information guide on important features, concepts and technicalities around an SAP IdM migration. With 94 topics covered, the guide encapsulates 15 years’ experience of SAP IdM implementations, operations, and enterprise support.</P><P style=" text-align: center; "><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="todor_petrov_0-1711371457816.png" style="width: 400px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/85953i24B85293CC9B048A/image-size/medium?v=v2&amp;px=400" role="button" title="todor_petrov_0-1711371457816.png" alt="todor_petrov_0-1711371457816.png" /></span></P><P>The content is future product agnostic, meaning you should be able to apply the explained concepts to any selected IAM of choice. Surely some will have advantages over others in certain areas, but using the above comprehensive guide, you will, at least, be able to ask all the right questions, when it comes to selecting the successor of SAP IdM.</P><P>Each topic is structured similarly, color-coded based on the category which it fits. The top left part is reserved for its number, name, and abbreviation. On the left, you can find a summary of its usage within the scope of SAP IdM, while on the right is a recommendation of how this particular topic should be migrated or not onto your future IAM platform. At the bottom you can find related topics to continue browsing the document or respectively return to the overview slide using the home button.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="todor_petrov_1-1711371545352.png" style="width: 400px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/85954iB1B0DA15C9943573/image-size/medium?v=v2&amp;px=400" role="button" title="todor_petrov_1-1711371545352.png" alt="todor_petrov_1-1711371545352.png" /></span></P><P>The various topics covered spread over 10 categories, which only shows the wide diversity to be considered when taking care of your SAP IdM migration. The document is still work in progress, but there are already released topics, which you can find <A title="SAP IdM migration guidelines playlist" href="https://www.youtube.com/playlist?list=PLfMX1cn_REHgf6aUsU6eRDNSGwcnwop6d" target="_blank" rel="noopener nofollow noreferrer">here</A>.</P><P>Stay tuned for the full release and its respective announcement. Till then, make sure to check the link above regularly for newly uploaded content.</P><P>Retain investment, stay compliant and embrace the cloud!</P> 2024-03-25T14:21:37.058000+01:00 https://community.sap.com/t5/technology-blogs-by-sap/security-in-sap-analytics-cloud-free-learning-journey/ba-p/13648822 Security in SAP Analytics Cloud, free learning journey 2024-03-25T17:37:27.137000+01:00 Johann https://community.sap.com/t5/user/viewprofilepage/user-id/137238 <P><SPAN>For those who still haven't put the topic of security on their company's daily agenda, I recommend to have a look at <A href="https://www.deloitte.com/content/dam/assets-shared/legacy/docs/gx-deloitte_future_of_cyber_2023.pdf" target="_self" rel="nofollow noopener noreferrer">Deloitte`s Global Future of Cyber Survey report</A>.&nbsp;</SPAN></P><P><SPAN>Interesting (but not surprising) fact is that&nbsp;executives see cyber playing a crucial role for all digital transformation priorities, especially when it comes to cloud and data analytics. Data analytics in the cloud, in SAP`s terminology this means the SAP Analytics Cloud.&nbsp;</SPAN></P><P><SPAN><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2024-03-25 171741.png" style="width: 550px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/86104i091E1A7B587B61C0/image-dimensions/550x319?v=v2" width="550" height="319" role="button" title="Screenshot 2024-03-25 171741.png" alt="Screenshot 2024-03-25 171741.png" /></span></SPAN></P><P><SPAN>What is security in SAP Analytics Cloud? In detail, it`s about the understanding of the&nbsp;concepts of SAP Analytics Cloud content security, Creating and Managing users and roles, Securing data, content and objects and Configuring authentication options.</SPAN></P><P><SPAN>Join our new free&nbsp;<A href="https://learning.sap.com/learning-journeys/managing-security-and-administration-in-sap-analytics-cloud" target="_self" rel="noopener noreferrer">Managing Security and Administration in SAP Analytics Cloud</A>&nbsp;learning journey and&nbsp;get&nbsp; basic knowledge and skills required to be able to successfully secure content and data in SAP Analytics Cloud.</SPAN></P><P><SPAN>SAP Product Learning Coe Analytics Team&nbsp;</SPAN></P><P><SPAN>&nbsp;&nbsp;</SPAN></P><H1 id="toc-hId-860854817">&nbsp;</H1><P>&nbsp;</P> 2024-03-25T17:37:27.137000+01:00 https://community.sap.com/t5/technology-blogs-by-sap/sap-integration-suite-access-policies-for-integration-packages/ba-p/13648901 SAP Integration Suite – Access Policies for Integration Packages 2024-03-25T18:55:44.335000+01:00 PeterGutsche https://community.sap.com/t5/user/viewprofilepage/user-id/198344 <P>As of increment 2401 of SAP Integration Suite, you can define access policies for integration packages.&nbsp;This extension makes the lives of tenant administrators easier who need to manage large numbers of integration packages and selectively restrict access to integration content for &nbsp;different user groups.</P><TABLE border="1" width="100%"><TBODY><TR><TD width="100%"><P><STRONG>Short reminder of what Access Policies are:</STRONG></P><P>With an access policy, you can protect groups of integration artifacts against undesired access. You define access policies as described in SAP Help Portal under <A href="https://help.sap.com/docs/integration-suite/sap-integration-suite/managing-access-policies" target="_blank" rel="noopener noreferrer">Managing Access Policies | SAP Help Portal</A>.</P><P>For example, you can define an access policy for all integration flows that fulfil the condition: name contains the string ‘Read’. As consequence, all integration flows that meet this condition are protected against unauthorized access.</P><P>Protection against unauthorized access covers:</P><UL><LI>All operations on the design time artifacts (such like editing, saving, or deploying an artifact, for example)</LI><LI>All operations on the deployed runtime artifacts (like restarting an artifact, for example)</LI><LI>Data that is processed or stored by the artifacts (like business data stored for monitoring purposes or stored by integration flows in local data stores or variables)</LI></UL><P>To enable dedicated users to access these protected artifacts, a role needs to be defined in SAP Business Technology Platform (SAP BTP) cockpit that is associated with the access policy (for more information, see the online documentation).</P><P>Access policies can be defined for all available integration artifact types such like integration flows, value mappings, and so forth.</P></TD></TR></TBODY></TABLE><P>Back to the new feature introduced with increment 2401.</P><P>When you open the access policy screen in the <STRONG>Monitor</STRONG> &gt; <STRONG>Integrations and APIs</STRONG> section of SAP Integration Suite (<STRONG>Access Policies</STRONG> tile), you now notice that you can also select <STRONG>Integration Package</STRONG> as <STRONG>Type</STRONG>:</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="AccessPoliciesIntegrationPackage.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/86122iC508CD1D52E4525E/image-size/large?v=v2&amp;px=999" role="button" title="AccessPoliciesIntegrationPackage.png" alt="AccessPoliciesIntegrationPackage.png" /></span></P><P>Using this new option, you only need to specify <STRONG>one single</STRONG> artifact reference to protect <STRONG>all</STRONG> artifacts of an integration package. In the example above, an artifact reference for the integration package with the name <STRONG>My First Integration Package</STRONG> is defined.</P><P>You now also understand to what extent the extension makes the life of the tenant administrator easier, whom we talked about earlier:</P><P>If you like to protect all artifacts in a dedicated integration package, you can now define an access policy with <EM>one</EM> <EM>single</EM> artifact reference. Before this enhancement, you needed to create an individual artifact references for each integration artifact type separately.</P><H2 id="toc-hId-989938434">Use Cases</H2><P>You may be wondering in which cases it makes sense to define access policies for integration packages. Let me point out the following rule of thumb:</P><TABLE border="1" width="100%"><TBODY><TR><TD width="50%"><STRONG>Option</STRONG></TD><TD width="50%"><STRONG>Use Case</STRONG></TD></TR><TR><TD width="50%">Define access policy for an integration package …</TD><TD width="50%">If you like to protect all the artifacts of an integration package (including artifacts of all types).</TD></TR><TR><TD width="50%">Define access policy for individual artifact types (for example, integration flows and value mappings) …</TD><TD width="50%">If you like to protect only few, but not all artifacts of the integration package.</TD></TR></TBODY></TABLE><H2 id="toc-hId-793424929">Compatibility with Access Policies for Specific Artifact Types</H2><P>As said, an access policy for an integration package affects the access to <EM>all artifact types</EM> contained in the package. However, you can still define access policies for individual artifact types. Now the following can happen: you may want to define an access policy for a specific integration package that contains artifacts for which other, artifact type-specific access policies exist already. What happens in such a case? The message at the top of the dialog provides a clue: for compatibility reasons, existing access policies for individual artifact types will remain intact when you define an access policy for an integration package. Access policies for dedicated artifact types co-exist with access policies on integration package level. Or, phrased differently: When you define an access policy for an integration package that contains artifacts that are also protected by another access policy (for example, by an access policy for a specific group of integration flows), the latter remain valid as well. The message prompts you to check if access policies have already been defined for specific artifacts in your package that you want to protect as a whole.</P><P>Let's see how the co-existence of access policies on integration package and on artifact level affects things in a specific example.</P><P>Let’s assume that an integration package is protected by one access policy. Furthermore, this integration package contains an integration flow that is protected by another access policy.</P><P>To walk you through the example step-by-step, the following two access policies are defined:</P><TABLE border="1" width="100%"><TBODY><TR><TD width="50%"><STRONG>Access Policy Name</STRONG></TD><TD width="50%"><STRONG>Protects</STRONG></TD></TR><TR><TD width="50%">PackageAccess</TD><TD width="50%">Artifacts contained in the integration package with the name <STRONG>My First Integration Package</STRONG></TD></TR><TR><TD width="50%">FlowAccess</TD><TD width="50%">Integration flows (across all integration packages) with a name that starts with the word <STRONG>Read </STRONG>(matches regular expression <STRONG>^Read.*</STRONG>)</TD></TR></TBODY></TABLE><P>The tenant has two integration packages with the names <STRONG>My First Integration Package</STRONG> and <STRONG>My Second Integration Package</STRONG>. Both packages contain also integration flows protected by the artifact-related access policy (integration flows with a naming starting with <STRONG>Read</STRONG>).</P><P>As a result of this setup, the artifacts are now protected as shown in the following figure:</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="BLOG_AccessPolicie.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/86123i4739266C6403B086/image-size/large?v=v2&amp;px=999" role="button" title="BLOG_AccessPolicie.png" alt="BLOG_AccessPolicie.png" /></span></P><P>As we said that access policies protect the specified artifacts – unless a user has a role assigned that is associated with the access policy – we can do the combinatorics with 4 fictitious users with different role assignments:</P><TABLE border="1" width="100%"><TBODY><TR><TD width="25%"><STRONG>User</STRONG></TD><TD width="25%"><STRONG>Assigned role</STRONG></TD><TD width="25%"><STRONG>Role associated with access policy*</STRONG></TD><TD width="25%"><STRONG>Can access</STRONG></TD></TR><TR><TD width="25%">User1</TD><TD width="25%"><P>Role1</P>Role2</TD><TD width="25%"><P>PackageAccess</P>FlowAccess</TD><TD width="25%">All artifacts in all shown integration packages</TD></TR><TR><TD width="25%">User2</TD><TD width="25%">Role1</TD><TD width="25%">PackageAccess</TD><TD width="25%"><UL><LI>In the package <STRONG>My First Integration Package </STRONG>protected by the package-level access policy: All artifacts</LI><LI>In the non-protected package&nbsp;<STRONG>My Second Integration Package</STRONG><SPAN>: all artifacts, unless they are protected by access policy </SPAN><STRONG>FlowAccess</STRONG><SPAN> (for which this user has </SPAN><STRONG>no</STRONG><SPAN> corresponding role assignment)</SPAN></LI></UL></TD></TR><TR><TD width="25%">User3</TD><TD width="25%">Role2</TD><TD width="25%">FlowAccess</TD><TD width="25%"><UL><LI>In the package <STRONG>My First Integration Package </STRONG>protected by the package-level access policy: integration flows that are protected by the access policy <STRONG>FlowAccess</STRONG>. All other artifacts are protected from this user through the package-level access policy <STRONG>PackageAccess</STRONG><SPAN>.</SPAN></LI></UL><UL><LI>In the non-protected package <STRONG>My Second Integration Package</STRONG><SPAN>: All artifacts (because here, this user also can access the artifacts protected by the integration flow-related access policy </SPAN><STRONG>FlowAccess</STRONG><SPAN>)</SPAN></LI></UL></TD></TR><TR><TD width="25%">User4</TD><TD width="25%">(No role assigned)</TD><TD width="25%">n.a.</TD><TD width="25%"><P>Because this user does not have either of the roles, they are subject to the access restrictions defined by both access policies.</P>As a result, the only artifact they can access is the artifact that is covered by none of the access policies (the non-protected integration flow in the non-protected integration package).</TD></TR></TBODY></TABLE><P>*To be more precise: Role associated with an access policy means: For the <STRONG>Values</STRONG> attribute of the role a string is specified that matches the name of the access policy. For more information on this, check out the online documentation in SAP Help Portal under <A href="https://help.sap.com/docs/integration-suite/sap-integration-suite/security-managing-access-policies" target="_self" rel="noopener noreferrer">Creating Custom Roles for Access Policies | SAP Help Portal</A>.</P> 2024-03-25T18:55:44.335000+01:00 https://community.sap.com/t5/enterprise-resource-planning-blogs-by-sap/sap-enterprise-support-highlights-resources-to-achieve-a-clean-core/ba-p/13651582 SAP Enterprise Support Highlights Resources to Achieve a Clean Core 2024-03-27T17:51:06.351000+01:00 elizabeth_cusack https://community.sap.com/t5/user/viewprofilepage/user-id/254387 <H5 id="toc-hId-1377897980">“Clean core. . . to sum it up is the one key puzzle piece . . . to be an agile intelligent enterprise.”<BR /><BR />&nbsp;- Markus Albrecht, Adoption Services Center General Manager for SAP BTP</H5><P>Changing business processes over several months isn’t good enough anymore. There’s now heightened focus on the concept of 'clean core ERP,' signaling the demand for software that’s both robust and agile enough to quickly adapt to evolving needs. However, in today's fast-evolving business landscape, organizations struggle to maintain agility and innovation speed for system upgrades. How can you overcome this significant challenge?<STRONG> How can you benefit from the latest innovations with minimal effort?</STRONG>&nbsp;The answer is by implementing a more standardized, process oriented approach for system updates and this is where a clean core strategy becomes vital.</P><P><STRONG>In SAP Enterprise Support, we provide expert guidance to implement a clean core strategy, helping you become agile, future-proof, and competitive.</STRONG> We've compiled resources to assist you. But before diving into those, let's briefly recap what clean core entails.</P><H3 id="toc-hId-923219037"><FONT color="#0000FF">Clean Core Explained</FONT></H3><P>According to Markus Albrecht, Adoption Services Center General Manager for SAP BTP, SAP customers across various industries, whether in retail or high-tech, must have the ability to adjust, react, and swiftly switch business models. A clean core offers two primary benefits in this context: it enables faster innovation within an SAP-centric landscape. Once you've adopted a clean core mindset, this approach can also be extended to non-SAP-centric landscape components as well (see LinkedIn post).&nbsp;</P><P>So, call it an initiative, a concept, a strategy or an approach, clean core focuses on keeping an organization’s core ERP systems transparent, flexible, consistent, efficient, and cloud-compliant, so they can <STRONG>easily transition to the cloud</STRONG>. The core describes the main aspects of an ERP system, including extensibility, processes, data integration, and operation.</P><P><STRONG>A clean core describes</STRONG> <STRONG>an up-to-date IT system</STRONG> with the latest releases, cloud-compliant extensions and integrations, with optimal primary data quality and process design.</P><P><STRONG>Following a clean core strategy</STRONG> means reducing process inconsistencies, establishing governance structures, maximizing standard functionality, building cloud-compliant extensions which are integrated through stable interfaces, and minimizing complex customization.</P><P><STRONG>A clean core approach</STRONG> makes it easy for organizations to upgrade more cost-effectively and with lower potential risk.</P><H3 id="toc-hId-726705532"><FONT color="#0000FF"><STRONG>SAP Enterprise Support Value Maps Can Help Get You There</STRONG></FONT></H3><P>Every SAP cloud subscription includes SAP Enterprise Support - a comprehensive digital support experience - and SAP Enterprise Support value maps is your gateway to guided enablement.</P><H6 id="toc-hId-917440184"><STRONG>With you in mind, value maps provide structured self-paced learnings to advance your digital skills; access to collaborative forums and SAP experts for personalized guidance; and continuous quality checks to mitigate implementation risks or identify optimization potential. </STRONG></H6><P><STRONG>Our new clean core page within SAP Enterprise Support value maps</STRONG> highlights specific offerings designed to support your clean core strategy across the main elements of an ERP system, including business processes, extensibility, data integration, and operations. For instance, take a look at the resources available* for SAP Business Technology Platform:</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="BTP Image.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/87616i2BCCDBB769337EB8/image-size/large?v=v2&amp;px=999" role="button" title="BTP Image.png" alt="BTP Image.png" /></span></P><P>*This represents the current situation, with new resources continuously added.</P><P>In addition to SAP Business Technology Platform, we have also gathered the relevant SAP Enterprise Support offerings to achieve a cleaner core in:</P><UL class="lia-list-style-type-disc"><LI>SAP S/4HANA</LI><LI>SAP S/4HANA Cloud Private Edition</LI><LI>Data Volume Management</LI><LI>SAP Signavio | Business Process Transformation</LI><LI>Business Process Improvement</LI><LI>Security</LI></UL><H3 id="toc-hId-333678522"><FONT color="#0000FF"><STRONG>Where to Access</STRONG></FONT></H3><P><STRONG>3 Easy Steps:&nbsp;&nbsp;</STRONG>&nbsp;</P><OL><LI><STRONG>One-time</STRONG>&nbsp;<A href="https://support.sap.com/en/offerings-programs/enterprise-support/enterprise-support-academy/learn.html" target="_blank" rel="noopener noreferrer"><STRONG>sign-up</STRONG></A><STRONG>&nbsp;for SAP Learning Hub, edition for SAP Enterprise Support, is required&nbsp;&nbsp;</STRONG>&nbsp;</LI><LI><A href="https://enrollment-ac82d52a4.dispatcher.hana.ondemand.com/index.html?itemID=LR_ValueMaps_EN" target="_blank" rel="noopener nofollow noreferrer"><STRONG>Access</STRONG></A>&nbsp;<STRONG>value maps</STRONG>&nbsp;</LI><LI>Navigate to the <A href="https://jam2.sapjam.com/groups/TM2cI3y9X1nyVgzAjJWg5j/overview_page/v6qvJhuymP4lGajrt4B6lt" target="_blank" rel="noopener nofollow noreferrer">clean core</A> page within value maps learning room&nbsp;</LI></OL><P><SPAN>When you're in the value map, feel free to join our forums, ask questions, or <STRONG>"Request a Call"</STRONG> to speak with one of our experts for more assistance. Value maps are easy to use, but a call with us helps us customize the conversation to your needs and point out relevant content.&nbsp;</SPAN><BR /><BR /><STRONG>Explore how implementing a clean core strategy can elevate your business process applications across your organization,</STRONG> and maximize the efficiency of your current software. Visit value maps today to learn more.<BR /><BR />Got a question about the value maps, or our content?<BR />Leverage the “ask questions” feature in the value map or contact us:<BR /><A href="http://mailto:sapesvaluemaps@sap.com/" target="_blank" rel="noopener nofollow noreferrer"><STRONG>sapesvaluemaps@sap.com</STRONG></A></P><H3 id="toc-hId-137165017"><FONT color="#0000FF">References</FONT></H3><P><SPAN><A href="https://www.linkedin.com/posts/augusta-spinelli_cleancore-btp-sap-activity-7158022646679416833-QKB0?utm_source=share&amp;utm_medium=member_desktop" target="_blank" rel="noopener nofollow noreferrer">Conversation with Markus Albrecht, Adoption Services Center General Manager for SAP BTP</A> &nbsp;</SPAN>(LinkedIn post)</P><P><A href="https://www.linkedin.com/posts/augusta-spinelli_the-value-of-clean-core-activity-7171096190686597120-8XDU?utm_source=share&amp;utm_medium=member_desktop" target="_blank" rel="noopener nofollow noreferrer">The Value of Clean Core</A> (LinkedIn post)</P><H3 id="toc-hId--59348488"><FONT color="#0000FF"><STRONG>Further Information</STRONG></FONT></H3><P><A href="https://sap-clean-core-5179.brandcast.io/sap-clean-core/" target="_blank" rel="noopener nofollow noreferrer">Clean core</A> (SAP website)</P><P>&nbsp;</P> 2024-03-27T17:51:06.351000+01:00 https://community.sap.com/t5/enterprise-resource-planning-blogs-by-sap/beyond-basic-1-certificate-based-authentication/ba-p/13626924 Beyond Basic (1): Certificate-Based Authentication 2024-04-05T17:53:02.875000+02:00 marc_roeder https://community.sap.com/t5/user/viewprofilepage/user-id/180997 <P>The topic of certificates is a confusing one. This text is the attempt to explain the why and how of certificate-based authentication and the difference between client certificates and server certificates. While Bob and Alice make an appearance in disguise, we try to keep the technical parts simple and only assume that the reader knows the general mechanism of asymmetric cryptography (using a key <EM>pair</EM> such that text encrypted with the one key can only be decrypted with the other).<BR />This blog post tries to provide some background for a <A href="https://community.sap.com/t5/enterprise-resource-planning-blogs-by-sap/beyond-basic-2-certificate-based-authentication-in-sap-s-4hana-cloud-public/ba-p/13644334" target="_blank"><EM>second text</EM></A> that talks about the specifics of connecting to SAP S/4HANA Cloud Public Edition using authentication with client certificates.</P><H1 id="toc-hId-858949156">Why Certificate-Based Authentication?</H1><P>With traditional <EM>basic</EM> <EM>authentication</EM>, credentials (username and password) must be known to both the client and the server for authentication. This means that the secret password must be securely distributed to the client and server in some way.</P><P>With <EM>certificate-based authentication</EM> (also called <EM>X.509</EM> after a format for certificate files, or <EM>mTLS</EM> after a protocol implementing certificate-based authentication), the client only presents a certificate that is then verified by the server. In this asymmetric authentication, only the client keeps a secret, the server only uses public information to verify that the client is in possession of the secret. This means that no exchange of secrets is required beforehand and fewer parties need to keep secrets.</P><P>And this is just one of multiple advantages of certificates over passwords. Certificate-based authentication is a de-facto standard for system-to-system communication in security-aware organizations and a general best practice.</P><H1 id="toc-hId-662435651">What is a Client Certificate?</H1><P>In essence, a client certificate is a public key (in the sense of asymmetric cryptography) that is signed by a trusted certificate authority (CA) and for which the client holds the corresponding private key.<BR />"Trusted" in this context means that the system we want to connect to believes that the signing CA has sufficiently verified our identity before signing the key.</P><P>As an example, the CAs that SAP S/4HANA Cloud Public Edition trusts are listed in SAP Note <SPAN><A href="https://me.sap.com/notes/2801396" target="_blank" rel="noopener noreferrer">2801396</A></SPAN>. Only client certificates with signatures by one of these CAs will be accepted by the system for authentication. In particular, self-signed certificates or certificates signed by company-internal CAs are not accepted.</P><H2 id="toc-hId-595004865">And What is a Signature?</H2><P>Cryptographic signatures are not restricted to certificates. They are a means for verifying the integrity and authenticity of messages in general.<BR />In very broad terms, this is how a signature works: a message is sent through a hash algorithm to produce a unique (ok, "reasonably unique" for mathematicians) fixed-length string. That hash value is then encrypted with the <EM>private key</EM> of an asymmetric key pair. The resulting ciphertext is the signature of the original message.</P><P>And how does the signature guarantee the integrity of the message? The signature is sent together with the message, so the receiver of the message can decrypt the signature using the public key of the asymmetric key pair and compare it to the hash of the message (the hash function is public knowledge). If hash value and decrypted signature are the same, the message is intact. If they don't agree, either the message or the signature was changed. In either case, the message can't be trusted to come from the owner of the public/private key pair. And because only the holder of the private key can create the signature, a valid signature also guarantees authenticity of the message.</P><P>In the certificate case, our public key is the message: The CA takes our public key, appends some metadata (the subject, expiry date, issuer identification...) and hashes it. Then the hash is encrypted with the CA's private key. The result is our certificate: a public key plus metadata plus signature by the CA. By slight abuse of notation, we say that the CA certificate signs our certificate, while it's really the private key belonging to the CA certificate that does the signing.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Creation of a certificate from public key and metadata by a CA" style="width: 940px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/87586iF44A276F0B9D6310/image-size/large?v=v2&amp;px=999" role="button" title="marc_roeder_0-1711553495836.png" alt="Creation of a certificate from public key and metadata by a CA" /><span class="lia-inline-image-caption" onclick="event.preventDefault();">Creation of a certificate from public key and metadata by a CA</span></span></P><P>Validating the signature means that the receiver of our certificate calculates the hash of the public key (including metadata) and decrypts the signature using the public key of the CA (the CA's certificate). If the decrypted signature and the hash are the same, our certificate is valid and has not been tampered with.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Validation of certificate integrity" style="width: 940px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/87587iACA4B5206E97190D/image-size/large?v=v2&amp;px=999" role="button" title="marc_roeder_1-1711553534329.png" alt="Validation of certificate integrity" /><span class="lia-inline-image-caption" onclick="event.preventDefault();">Validation of certificate integrity</span></span></P><H1 id="toc-hId-269408641">How Does That Authenticate a Client?</H1><P>To the server, authenticating clients are just users. When a client authenticates, that means that the corresponding user logs on to the system.<BR />To be able to identify and authenticate a user, the user is assigned a unique certificate – just as the user would have a unique name/password pair for basic authentication. The certificate is not a secret, though, it's just a <EM>public</EM> key. We can interpret this mapping as "anybody who has the private key for this public key will be treated as this user" (just as anybody knowing the right name/password combination would in basic authentication).</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Server trusting CA and verifying client certificate" style="width: 400px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/87588iD52869EF9A8E1621/image-size/medium?v=v2&amp;px=400" role="button" title="marc_roeder_2-1711553581325.png" alt="Server trusting CA and verifying client certificate" /><span class="lia-inline-image-caption" onclick="event.preventDefault();">Server trusting CA and verifying client certificate</span></span></P><P>The certificate-based authentication flow can be thought of like this:</P><OL><LI>the client hands over its client certificate (which contains the client's public key) to the server</LI><LI>the server verifies that the certificate is signed by a trusted CA (i.e., the CA certificate is in the server's list of trusted certificates)</LI><LI>the server encrypts a random message with the public key from the client certificate and sends it back to the client</LI><LI>the client decrypts the encrypted message (using the private key) and sends the plaintext back. Now the server knows that the client has the private key of the certificate</LI><LI>the server looks up which user has the certificate assigned – that user is successfully authenticated</LI></OL><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Challenge-response protocol for authentication based on client certificate" style="width: 940px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/87589iDCA9EEDFBD1F375A/image-size/large?v=v2&amp;px=999" role="button" title="marc_roeder_3-1711553629803.png" alt="Challenge-response protocol for authentication based on client certificate" /><span class="lia-inline-image-caption" onclick="event.preventDefault();">Challenge-response protocol for authentication based on client certificate</span></span></P><P>While that's not exactly what happens, it hopefully conveys the general idea.</P><P>A few side remarks:</P><UL><LI>In the authentication flow outlined above, no secrets are exchanged. This is a major security benefit. The idea of the challenge-response protocol is that the server presents the client with a task that can only be solved if the client has the private key. If the client solves the task, the server is confident that the client must have the key – without being shown the key itself (this is sometimes called a zero-knowledge proof).<SPAN><BR /></SPAN>It might sound like magic, but it's really just very clever mathematics.</LI><LI>The statement "the user is assigned a unique <EM>certificate</EM>" is not completely correct. In fact, only the issuer and subject of the certificate are mapped to the user, not the entire public key.<BR />This is made possible by the trust relationship between server and CA: &nbsp;The server trusts that the CA checked that the owner of the private key is sufficiently identified in the certificate's metadata already. So, the server trusts the metadata in the certificate rather than demanding an exact public key match.<BR />This has a big advantage: when the client certificate expires, we can exchange it for a new one with the same subject and issuer without having to re-upload it to the system.</LI><LI>As already mentioned in the introduction, this setup does not involve exchange of secrets. No password has to be given to the server administrator to configure the connection. And certificate rotation is a one-sided process that does not require simultaneous changes on client and server side (as password rotation does).</LI><LI>If the server is hacked, no secret credentials can be stolen. This means that the "no password reuse!" imperative does not apply to certificates. We can use our client certificate to authenticate to multiple systems (and we actually do in SSO setups).</LI></UL><H1 id="toc-hId-72895136">Client Certificate, Server Certificate – What's the Difference?</H1><P>Technically, client certificates and server certificates are the same thing. The difference is in the <EM>usage</EM> of the certificate. Let's have a look at what happens when a client calls a server (in the TLS handshake that also happens when a browser calls a website):</P><OL><LI>the client asks the server to establish a connection</LI><LI>the server hands over its public key (the server certificate) to the client</LI><LI>the client verifies that the certificate is signed by a CA it trusts</LI><LI>the client verifies that the server is in possession of the private key of the certificate</LI><LI>the connection is established</LI></OL><P>Again, that's not exactly how the TLS handshake works, but it's close enough as a mental model.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Client trusting CA and verifying server certificate" style="width: 400px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/87590iB871AF80DA7180B1/image-size/medium?v=v2&amp;px=400" role="button" title="marc_roeder_4-1711553706617.png" alt="Client trusting CA and verifying server certificate" /><span class="lia-inline-image-caption" onclick="event.preventDefault();">Client trusting CA and verifying server certificate</span></span></P><P>And yes, that's the same thing that happens as above (section "How Does That Authenticate a Client"), with the roles of client and server interchanged. In the TLS handshake, the server authenticates against the client. Note that at the end of this flow, the client has assurance as to the identity of the server, but the server knows nothing about the client's identity.</P><P>But where does the trust in the CA come from? Clients maintain a list of trusted CAs. And often client software is shipped with a pre-configured list. Operating systems also maintain a list of trusted certificates that is pre-populated by the vendor.</P><P>And where's the user-certificate mapping? It's implicit: the server's "username" is the host name. The server certificate's subject attribute says "this certificate is issued for <EM>example.com</EM>". So, if the client calls the server <EM>example.com</EM> and is shown a valid certificate issued for <EM>example.com </EM>by a trustworthy CA (and the server proved that it has the private key), the client can be sure it's really talking to the right server and not some man-in-the-middle. In browsers, successful verification is shown by a padlock icon next to the URL.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Browser showing message about successful validation of server certificate" style="width: 400px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/87591iAF026D21BA6D4C5D/image-size/medium?v=v2&amp;px=400" role="button" title="marc_roeder_5-1711553743426.png" alt="Browser showing message about successful validation of server certificate" /><span class="lia-inline-image-caption" onclick="event.preventDefault();">Browser showing message about successful validation of server certificate</span></span></P><H2 id="toc-hId-5464350">How do the Two Come Together?</H2><P>When we log on to the system, the client first authenticates the server to establish a connection: The client verifies that it's talking to the real server by checking the server certificate (server's name is in the "Common Name" or "Subject Alternative Names" of the certificate, the signing CA is trusted, certificate has not expired, and the server has the certificate's private key).</P><P>In a second step, the server might (or might not as in the case of public websites) authenticate the client/user.</P><P>The server's authentication against the client is always using certificates, while clients/users might authenticate against the server using different methods (certificate, basic authentication, token...).</P><P><EM>Fun fact:</EM> if server1 does a technical call to server2, then server1 presents a <EM>client</EM> certificate to server2 (because server1 is the caller and hence assumes the client role in this communication). And server2 presents a <EM>server</EM> certificate to server1. The notation is a bit of a mess…</P><H1 id="toc-hId--320131874">Aside: Root Keys, PKIs, Validity</H1><H2 id="toc-hId--387562660">Root Keys and the Chain of Trust</H2><P>As seen above, a valid certificate is one that is signed by a trusted CA. More precisely, it's signed by the certificate of a CA (a <EM>signing certificate)</EM>. That signing certificate in turn is signed by another of the CA's certificates, the <EM>root certificate</EM>.</P><P>Browsers and other clients often trust the CA's root certificate rather than the individual signing certificates. This makes certificate validation a multi-step process but reduces the number of trusted certificates.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Chain of certificates: root certificate, signing certificate, client certificate" style="width: 940px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/87592iAF1BDE2A466EEEE0/image-size/large?v=v2&amp;px=999" role="button" title="marc_roeder_6-1711553806355.png" alt="Chain of certificates: root certificate, signing certificate, client certificate" /><span class="lia-inline-image-caption" onclick="event.preventDefault();">Chain of certificates: root certificate, signing certificate, client certificate</span></span></P><H2 id="toc-hId--584076165">Public Key Infrastructure</H2><P>This setup of root certificates, signing certificates and trusted issuers is part of the <EM>Public Key Infrastructure </EM>(PKI). The fundamental assumption of this infrastructure is, that there are a few (quite a few, in fact) trustworthy institutions that will dutifully do the identification of servers and individuals so that everybody else can trust the certificates issued as a result of this identification. These trusted institutions are the CAs and their associated registration authorities (which verify certificate applicants – potentially even by inspecting physical documents). All this is pretty similar to the infrastructure for passports in the real world.</P><H2 id="toc-hId--780589670">Local PKIs/CAs</H2><P>Anybody can create a CA, of course – the question is just "who will trust it?". It is not uncommon for companies to maintain a company-internal CA that is only trusted by the company's own servers/clients/users. The CA will issue server certificates for internal applications, client certificates for system-to-system communication, and SSO certificates for users (also a kind of client certificate). All this works if the company-CA's root certificate is trusted by all involved parties (it might be provisioned to all computers with the base-image, via a device management system, or by manual import into the operating system's certificate trust list).&nbsp;But it does not work for communication to the outside (e.g., towards 3rd party SaaS solutions) because the outside party does not trust the company-internal CA.</P><H2 id="toc-hId--629848818">Certificate Validity and Rotation</H2><P>An important aspect of certificates is their <EM>validity</EM>. Certificates are only valid for a certain period: server certificates often expire after a year, root certificates can live for decades, signing certificates for a few years. Validity is part of the certificate metadata itself and cannot be changed, so the certificate has to be renewed ("rotated") before expiration.<BR />Certificates expire silently, but the effects can be rather spectacular. If a signing certificate expires, all certificates that were ever signed by that signing certificate become invalid. Expired certificates break TLS connections and client authentication – systems don't talk to each other anymore. A forgotten certificate can turn into a very expensive and difficult exercise.</P><H1 id="toc-hId--532959316">Up Next: How to Actually Use Client Certificates in SAP S/4HANA Cloud Public Edition</H1><P>Now that we got some of the basics covered, it's time to look at an example. &nbsp;</P><P>In a <SPAN><A href="https://community.sap.com/t5/enterprise-resource-planning-blogs-by-sap/beyond-basic-2-certificate-based-authentication-in-sap-s-4hana-cloud-public/ba-p/13644334" target="_blank">follow-up blog post</A></SPAN>, we will see how to create a client certificate and how to use it for authenticating against an SAP S/4HANA Cloud Public Edition system.</P><P>The scenario will be like that: we configure SAP S/4HANA Cloud Public Edition to expose an API (an "inbound" communication arrangement) that we will call with a technical communication user. And that user authenticates using a client certificate.</P><P>But all this is the topic of the <A href="https://community.sap.com/t5/enterprise-resource-planning-blogs-by-sap/beyond-basic-2-certificate-based-authentication-in-sap-s-4hana-cloud-public/ba-p/13644334" target="_blank">next blog post</A>.</P> 2024-04-05T17:53:02.875000+02:00 https://community.sap.com/t5/enterprise-resource-planning-blogs-by-sap/beyond-basic-2-certificate-based-authentication-in-sap-s-4hana-cloud-public/ba-p/13644334 Beyond Basic (2): Certificate-Based Authentication in SAP S/4HANA Cloud Public Edition 2024-04-05T17:53:13.073000+02:00 marc_roeder https://community.sap.com/t5/user/viewprofilepage/user-id/180997 <P>In a <SPAN><A href="https://community.sap.com/t5/enterprise-resource-planning-blogs-by-sap/beyond-basic-1-certificate-based-authentication/ba-p/13626924" target="_self">previous blog post</A></SPAN>, we discussed the use of certificates for authenticating clients and servers in general. Now it's time to see how all this theory works in the real world.</P><P>In this tutorial, we will see how to call a technical API exposed by an SAP S/4HANA Cloud Public Edition system with certificate-based authentication. In practice, such calls are typically made by a remote system. To keep things simple, we just use an API client and a command-line tool for demonstration.</P><P>Note that this text is <EM>only</EM> about technical connections with communication users (API users), <EM>not</EM> about business users (UI users). More on communication management in SAP S/4HANA Cloud Public Edition can be found in the <SPAN><A href="https://help.sap.com/docs/SAP_S4HANA_CLOUD/0f69f8fb28ac4bf48d2b57b9637e81fa/2e84a10c430645a88bdbfaaa23ac9ff7.html?locale=en-US" target="_blank" rel="noopener noreferrer">official documentation</A></SPAN>.</P><P>To set up certificate-based authentication, we'll have to do some things on the server side and some on the client side. Here's our plan:</P><OL><LI>create a client certificate</LI><LI>create a "communication user"&nbsp;in SAP S/4HANA Cloud and upload our client certificate for the communication user to be used during authentication of inbound connections</LI><LI>create a "communication system" in the SAP S/4HANA Cloud Public Edition backend</LI><LI>create a "communication arrangement" (the API to be exposed) in SAP S/4HANA Cloud and map the communication system and -user to it</LI><LI>try it out in some client software</LI></OL><H1 id="toc-hId-860730881">Step One: Get a Client Certificate</H1><P>This tutorial uses command-line tools available in linux (or the <SPAN><A href="https://learn.microsoft.com/en-us/windows/wsl/about" target="_blank" rel="noopener nofollow noreferrer">Windows Subsystem for Linux</A></SPAN>) for the required cryptographic operations.</P><H2 id="toc-hId-793300095">Create the Private Key and Signing Request</H2><P>The following command creates a new asymmetric key pair. The private key is written to the file <EM>key.pem</EM> and the public key is written to the key-signing request <EM>csr.pem</EM>. The key file can optionally be encrypted with a password.<BR />In addition to the public key, the signing request contains the metadata (the subject) we want to have in our certificate.</P><PRE>openssl req -sha256 -newkey rsa:4096 -nodes -keyout key.pem -out csr.pem -subj "<EM>/C=&lt;country&gt;/O=&lt;org&gt;/CN=&lt;hostname&gt;</EM>"</PRE><P>The signing request will be sent to a certificate authority (CA) which then signs the public key (including metadata) to turn it into a certificate.</P><P>The format of the <EM>-subj</EM> parameter depends on the CA. The CA only signs certificates with particular subjects (remember that by signing, the CA confirms that the subject correctly identifies us or our host). Which subjects are allowed and what validations have to be passed depends on the CA.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="Creation of a key pair" style="width: 957px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/84412iC1B16B3575EB8665/image-size/large?v=v2&amp;px=999" role="button" title="marc_roeder_0-1711023887918.png" alt="Creation of a key pair" /><span class="lia-inline-image-caption" onclick="event.preventDefault();">Creation of a key pair</span></span></P><P><STRONG>Result</STRONG>: a private key key.pem and a certificate signing request csr.pem.<BR /><STRONG>Note</STRONG>: key.pem contains our <STRONG>private key. </STRONG>This is a secret and <FONT color="#800000"><STRONG><FONT color="#FF6600">must not be shared</FONT></STRONG></FONT> with anyone!</P><H2 id="toc-hId-596786590">Get the Certificate Signed by the CA</H2><P>To get our public key signed to turn it into a "good" certificate, we take the <EM>csr.pem</EM> file to our CA (one of the approved ones from SAP Note <SPAN><A href="https://me.sap.com/notes/2801396" target="_blank" rel="noopener noreferrer">2801396</A></SPAN>) and ask for a signature. How this works depends on the specific CA. Often, there's a web UI where you upload the signing request and provide proof that the subject line identifies you or a machine owned by you.</P><P>The format for the certificate should be .pem and include the full chain of certificates. If the CA does not support .pem format including the full chain, we take PKCS#7-format and convert the file in the next step.</P><P><STRONG>Result:</STRONG> a certificate file <EM>cert2.pem </EM>or<EM> certificatePKCS7.p7b</EM>.</P><H2 id="toc-hId-400273085">Convert PKCS#7 Certificate to .pem Format if Needed</H2><P>To be accepted by SAP S/4HANA Cloud Private Edition, the client certificate needs to include the full signature chain and be in <EM>pem </EM>format. If our CA only delivered a PKCS#7 file, we convert it like this:</P><PRE>openssl pkcs7 -print_certs -in certificatePKCS7.p7b -out cert2.pem</PRE><P>The resulting file should look like a list of certificates with human-readable headers in between.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Certificate chain in .pem format" style="width: 400px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/84491i5F26A55C88DF2028/image-size/medium?v=v2&amp;px=400" role="button" title="marc_roeder_0-1711027783007.png" alt="Certificate chain in .pem format" /><span class="lia-inline-image-caption" onclick="event.preventDefault();">Certificate chain in .pem format</span></span></P><P><STRONG>Result:</STRONG> the converted certificate file <EM>cert2.pem</EM></P><P>This is the certificate file we need to pass during authentication. It can also be uploaded to the system to be mapped to a user for identification. That's what we will do now. So, let's head over to configure our SAP S/4HANA Cloud Public Edition system.</P><H1 id="toc-hId-74676861">Step Two: Create a Communication User and Upload the Certificate</H1><P>In the system, we first create a communication user and upload our certificate (app "Maintain Communication Users"). For the user mapping, a .pem file is required. In contrast to the actual authentication, it does not matter here, whether the .pem file contains the full chain of certificates or just the client certificate alone.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Creation of communication user, upload of certificate" style="width: 851px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/84493i32508735D43D05C4/image-size/large?v=v2&amp;px=999" role="button" title="marc_roeder_1-1711027845209.png" alt="Creation of communication user, upload of certificate" /><span class="lia-inline-image-caption" onclick="event.preventDefault();">Creation of communication user, upload of certificate</span></span></P><P>The subject and issuer of the certificate are shown in the UI after upload.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Client certificate in communication user maintenance UI" style="width: 940px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/91492i0029F82CC7A2AA58/image-size/large?v=v2&amp;px=999" role="button" title="marc_roeder_0-1712240998924.png" alt="Client certificate in communication user maintenance UI" /><span class="lia-inline-image-caption" onclick="event.preventDefault();">Client certificate in communication user maintenance UI</span></span></P><H1 id="toc-hId--121836644">Step Three: Reference the Communication User in a Communication System</H1><P>The communication user must then be assigned to a <EM>communication system </EM>(app "Communication Systems"), so we also create one of those and reference the new user as one for <EM>inbound communication</EM>.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Communication system with inbound user and certificate authentication" style="width: 940px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/84494iB157AB42BD5EA3EE/image-size/large?v=v2&amp;px=999" role="button" title="marc_roeder_2-1711027878757.png" alt="Communication system with inbound user and certificate authentication" /><span class="lia-inline-image-caption" onclick="event.preventDefault();">Communication system with inbound user and certificate authentication</span></span></P><H1 id="toc-hId--318350149">Step Four: Reference Communication System and -User in a Communication Arrangement</H1><P>Finally, we decide on the API we want to expose (app "Communication Arrangements"). In our example, we'll take the one for change documents of business roles (corresponding communication scenario: <EM>SAP_COM_0366</EM>). But this is not important – it's the same for all communication scenarios that have an inbound communication channel supporting certificate-based authentication.</P><P>We assign the communication system created before and select our user for inbound communication with authentication method "SSL Client Certificate".</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Communication Arrangement. Highlighted: system, user, API endpoint" style="width: 940px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/84495i7FC1FD7C740BFBCF/image-size/large?v=v2&amp;px=999" role="button" title="marc_roeder_3-1711027907835.png" alt="Communication Arrangement. Highlighted: system, user, API endpoint" /><span class="lia-inline-image-caption" onclick="event.preventDefault();">Communication Arrangement. Highlighted: system, user, API endpoint</span></span></P><H1 id="toc-hId--514863654">Sep Five: Try it Out</H1><P>To see that everything worked, we use our client certificate to call the API endpoint (the service URL displayed in the communication arrangement UI). We try this in two clients: the UI-based API client <A href="https://www.usebruno.com/" target="_blank" rel="noopener nofollow noreferrer">bruno</A> (which is similar to postman) and the command-line client <A href="https://www.man7.org/linux/man-pages/man1/curl.1.html" target="_blank" rel="noopener nofollow noreferrer">cURL</A>.</P><H2 id="toc-hId--582294440">Call Using Bruno</H2><P>In bruno, client certificates are maintained per collection.</P><P>We select the certificate file <EM>cert2.pem</EM> (the one including the full key chain from step one) and the key file <EM>key.pem</EM> and add it. As "Domain", we take the host name of the system we want to connect to. If we chose to protect the private key by password, that password must be entered here.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Certificate, private key configuration in the bruno API client" style="width: 940px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/84496i4F2EF83E2333B7E5/image-size/large?v=v2&amp;px=999" role="button" title="marc_roeder_4-1711027970234.png" alt="Certificate, private key configuration in the bruno API client" /><span class="lia-inline-image-caption" onclick="event.preventDefault();">Certificate, private key configuration in the bruno API client</span></span></P><P>Note that we need to give bruno access to our private key <EM>key.pem </EM>because the client needs to have access to the secret for authentication. But the private key stays with the client and will not be sent to the server.</P><P>In case TLS certificate validation is switched on in the global preferences, we might need to additionally upload the server's CA certificate to bruno (see below).</P><H2 id="toc-hId--778807945">Call Using cURL</H2><P>The cURL command line looks like this:</P><PRE>curl --request GET --key key.pem --cert cert2.pem --url <A target="_blank" rel="noopener">https://&lt;S4_host&gt;/sap/opu/odata/sap/APS_IAM_API_BROLE_CDOC/BusinessRoleChanges</A><BR /><BR /></PRE><P>&nbsp;A CA certificate for validating the server's certificate can be passed with the&nbsp;<EM>--cacert</EM> parameter&nbsp;(read on to learn how to get the CA cert). To suppress checking of the server certificate for testing, we can use the <EM>--insecure</EM> switch.</P><H2 id="toc-hId--628067093">Do we Trust the Server? How to Get the CA Certificate?</H2><P>The previous steps assume that the client (bruno or cURL) is able to validate the <EM>server's</EM> certificate during the TLS handshake. That only works if the client trusts the CA that signed the server certificate. If the client does not use the operating system's certificate store or the server's CA certificate is not in the certificate store, we will need to establish that trust ourselves.</P><P>To check if our client trusts the server, we can do an unauthenticated call to see the response:</P><PRE>curl --request GET --url <A target="_blank" rel="noopener">https://&lt;S4_host&gt;/sap/opu/odata/sap/APS_IAM_API_BROLE_CDOC/BusinessRoleChanges</A></PRE><P>If the result is an http code 401, the TLS handshake worked (the client trusts the server, but the server requests authentication). An http-level error indicates a failed certificate check.</P><P>The same test works in bruno. We just need to remove the client certificate from the collection (or create a second collection without certificate) to call unauthenticated.</P><P>If the handshake doesn't work, we need to make our client trust the CA root certificate that signed the server certificate (for almost all SAP S/4HANA Cloud Public Edition systems, that's “DigiCert Global Root G2”). This certificate can be downloaded from the CA. The server certificate can also be seen in a web browser (after logging on to the system) where it can be downloaded directly. Here are some screenshots from Firefox as an example:</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Steps to get server certificate from Firefox UI" style="width: 940px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/84497i992A7C6D7B109DC5/image-size/large?v=v2&amp;px=999" role="button" title="marc_roeder_5-1711028363243.png" alt="Steps to get server certificate from Firefox UI" /><span class="lia-inline-image-caption" onclick="event.preventDefault();">Steps to get server certificate from Firefox UI</span></span></P><P>This certificate can then be used in bruno as a "custom CA Certificate" or passed to cURL using the --c<EM>acert</EM> parameter.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Certificate verification and CA certificate setting in bruno" style="width: 400px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/84498iEB35EE13F55887CC/image-size/medium?v=v2&amp;px=400" role="button" title="marc_roeder_6-1711028400968.png" alt="Certificate verification and CA certificate setting in bruno" /><span class="lia-inline-image-caption" onclick="event.preventDefault();">Certificate verification and CA certificate setting in bruno</span></span></P><H1 id="toc-hId--531177591">What we Achieved</H1><P>When everything worked, we have a client that trusts the CA that signed the server certificate of SAP S/4HANA Cloud Public Edition.<BR />This enables a secure communication channel.</P><P>We have a communication user that is mapped to the desired API's communication arrangement. This authorizes the technical user to do calls against the API.</P><P>We have a client certificate that is signed by a CA that SAP S/4HANA Cloud trusts.<BR />This enables us to authenticate against SAP S/4HANA Cloud with this certificate.</P><P>And we have our client certificate mapped to the communication user.<BR />This enables us to authenticate as <EM>this particular</EM> communication user and ultimately get data.</P><P>The CAs signing the server and client certificates might of course be different ones, so we show them with different names in the final picture of this blog post.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Client and SAP S/4HANA Cloud: trust relationships and verifications during mutual authentication" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/87537i2CBB94B1C673F96C/image-size/large?v=v2&amp;px=999" role="button" title="Snag_c28b804.png" alt="Client and SAP S/4HANA Cloud: trust relationships and verifications during mutual authentication" /><span class="lia-inline-image-caption" onclick="event.preventDefault();">Client and SAP S/4HANA Cloud: trust relationships and verifications during mutual authentication</span></span></P><P>&nbsp;</P> 2024-04-05T17:53:13.073000+02:00 https://community.sap.com/t5/technology-blogs-by-sap/sap-secure-login-service-for-sap-gui-now-supports-custom-certificate/ba-p/13666599 SAP Secure Login Service for SAP GUI Now Supports Custom Certificate Authorities on AWS 2024-04-11T10:24:50.174000+02:00 Martina_K https://community.sap.com/t5/user/viewprofilepage/user-id/5013 <P><STRONG>The SAP Secure Login Service for SAP GUI solution provides your SAP GUI users with simple and secure access to their ABAP-based business applications. In March 2024, we released the long-awaited Custom Certificate Authority (CA) feature. You can now integrate your own Public Key Infrastructure (PKI) by connecting to a private CA hosted on Amazon Web Services (AWS).</STRONG></P><P>With the SAP Secure Login Service for SAP GUI, you can provide end users of SAP GUI with X.509 certificates that enable single sign-on (SSO) to ABAP-based business applications. After successful authentication, the SAP Secure Login Service provisions a short-lived X.509 certificate to the Secure Login Client on the end-user desktop. This certificate is then used for SSO to the ABAP systems. In the initial scope of the solution, the SAP-managed Cloud CA was used to sign these end user certificates.</P><P><FONT size="4"><STRONG>What’s new?</STRONG></FONT></P><P>With the newly released feature you now have the option to integrate your own PKI by connecting your cloud-based private CA running on Amazon Web Services (AWS) to the SAP Secure Login Service. After successful authentication of the end user, your private CA issues an X.509 certificate. And the SAP Secure Login Service then returns this X.509 certificate to the Secure Login Client on the end user desktop.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="SAP Secure Login Service for SAP GUI - Custom CA AWS.jpg" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/94949iB409141F953D0970/image-size/large?v=v2&amp;px=999" role="button" title="SAP Secure Login Service for SAP GUI - Custom CA AWS.jpg" alt="SAP Secure Login Service for SAP GUI - Custom CA AWS.jpg" /></span></P><P><FONT size="4"><STRONG>How does it work?</STRONG></FONT></P><P>By connecting your cloud-based private CA running on AWS, the X.509 certificates will be signed by your own customer-managed CA. The SAP Secure Login Service will just reuse your CA setup and provision the certificates to the Secure Login Client of the end users.</P><P>Configuration required for the token exchange, credentials for accessing AWS, and which AWS Private CA to be used can be configured in the administration console of SAP Secure Login Service (via the new tab “Custom CA”). This configuration is needed for secure token exchange and to ensure that only your SAP Secure Login Service subscription can be used to access your custom CA. And at the same time, that the certificates can only be used for SAP GUI SSO.</P><P>Of course, the certificates that are signed by your custom CA will look differently from the ones that are signed by the SAP Cloud Root CA. You can decide about the root, how many levels you want to have in there, and the names.</P><P>For configuration information, please refer to the documentation that is available on SAP Help Portal here:</P><P><SPAN><A href="https://help.sap.com/docs/SAP%20SECURE%20LOGIN%20SERVICE/c35917ca71e941c5a97a11d2c55dcacd/32875689a8654e0bb3c8697fb6947940.html" target="_blank" rel="noopener noreferrer">https://help.sap.com/docs/SAP%20SECURE%20LOGIN%20SERVICE/c35917ca71e941c5a97a11d2c55dcacd/32875689a8654e0bb3c8697fb6947940.html</A></SPAN></P><P><FONT size="4"><STRONG>What are the benefits?</STRONG></FONT></P><P>For compliance reasons you might not be allowed to use the SAP-managed Cloud CA to sign the end user certificates but have to use a CA that is fully under your control. With the new feature you can now integrate with your custom CA running on AWS thereby having full control how the CA is set up. For example, the root of the CA, whether it is in the AWS CA or offline, and how the signed certificates will look like.</P><P><FONT size="4"><STRONG>More information</STRONG></FONT></P><P>For more information about our SAP Secure Login Service for SAP GUI solution and to stay up to date on the latest developments, visit our topic page in SAP Community:</P><P><SPAN><A href="https://pages.community.sap.com/topics/single-sign-on" target="_blank" rel="noopener noreferrer"><STRONG>https://pages.community.sap.com/topics/single-sign-on</STRONG></A></SPAN></P><P>&nbsp;</P> 2024-04-11T10:24:50.174000+02:00 https://community.sap.com/t5/enterprise-resource-planning-blogs-by-sap/sap-s-4hana-cloud-public-edition-security-configuration-apis/ba-p/13676120 SAP S/4HANA Cloud Public Edition: Security Configuration APIs 2024-04-19T15:55:22.168000+02:00 Florian_Eller https://community.sap.com/t5/user/viewprofilepage/user-id/131555 <P>Security configuration settings are crucial to run SaaS applications: Are certificates maintained, is CSP enabled, are protection allowlists valid? However, given the ease with which SaaS apps can be deployed by business users, it can quickly become confusing to maintain a good security posture for all of them.</P><P>SaaS Security Posture Management (SSPM) solutions help in identifying gaps in configuration settings across all SaaS apps in use.</P><P>And that makes SSPM solutions different compared to SIEM and CASB solutions. SIEM (Security Incident and Event Management) solutions analyze logs for suspicious patterns. CASB (Cloud Access Security Broker) solutions can enforce security policies based on user behavior and configuration settings.</P><P>With SAP S/4HANA Cloud Public Edition 2402, SAP provides APIs to enable customers to gain insights into their security configuration settings. The available APIs are based on SAP’s <A href="https://help.sap.com/docs/SAP_S4HANA_CLOUD/55a7cb346519450cb9e6d21c1ecd6ec1/fafa6639cf7b4265b68da63efbc8fb96.html" target="_self" rel="noopener noreferrer">security recommendations</A>&nbsp;and cover aspects managed by the customer that might require business decisions, like user and authorization management.</P><P>&nbsp;</P><H1 id="toc-hId-863559069">Available Use Cases and APIs for SAP S/4HANA Cloud Public Edition</H1><P>The following APIs are available with SAP S/4HANA Cloud Public Edition, 2402 under <A href="https://api.sap.com/package/SAPS4HANACloud/overview" target="_blank" rel="noopener noreferrer">api.sap.com</A>. Potential use cases are listed below to serve as examples.</P><H2 id="toc-hId-796128283">Business user role/authorization configuration</H2><P>It is possible to use the following APIs to retrieve business user and role data, e.g. users with important roles. Customers can monitor high-risk roles and role-catalog combinations and limit their usage. The idea is to help monitor critical cases, and not to uncover authorization flaws.</P><UL><LI><A href="https://api.sap.com/api/CE_BUSINESSUSER_0001/overview" target="_blank" rel="noopener noreferrer">Business User - Read Logon Details</A><SPAN> (</SPAN>Type: ODATA V4): Read logon details, such as username, validity, group and assigned business roles using this synchronous inbound service.</LI><LI><A href="https://api.sap.com/api/CE_BUSINESSROLE_0001/overview" target="_blank" rel="noopener noreferrer">Business Role - Read</A><SPAN> (</SPAN>Type: ODATA V4): Read business role details using this synchronous inbound service.</LI></UL><P>The corresponding SAP Fiori apps to cover this use case are <A href="https://fioriappslibrary.hana.ondemand.com/sap/fix/externalViewer/index.html#/detail/Apps('F1303')/S30" target="_blank" rel="noopener nofollow noreferrer">Maintain Business Users (F1303)</A> and <A href="https://fioriappslibrary.hana.ondemand.com/sap/fix/externalViewer/#/detail/Apps('F1492')/S32" target="_blank" rel="noopener nofollow noreferrer">Maintain Business Roles (F1492)</A>. Further documentation also referenced in our security recommendations can be found in <A href="https://help.sap.com/docs/SAP_S4HANA_CLOUD/55a7cb346519450cb9e6d21c1ecd6ec1/e40e710321c74f28916affa9ae984bce.html" target="_blank" rel="noopener noreferrer">our help portal</A>.</P><H2 id="toc-hId-599614778">Detection of unused users/connections</H2><P>The following APIs support the use case to enable customers retrieve an overview of either locked or unused business users. Ideally a definition is available how much time must pass to assess if business users are locked / unused for too long. The same applies for communication users, especially if the communication user is unused for a long time, but assigned to a communication arrangement.</P><UL><LI><A href="https://api.sap.com/api/CE_BUSINESSUSER_0001/overview" target="_blank" rel="noopener noreferrer">Business User - Read Logon Details</A><SPAN> (</SPAN>Type: ODATA V4): Read logon details, such as username, validity, group and assigned business roles using this synchronous inbound service.</LI><LI><A href="https://api.sap.com/api/CE_COMMUNICATIONUSER_0001/overview" target="_blank" rel="noopener noreferrer">Communication User - Read</A><SPAN> (</SPAN>Type: ODATA V4): Read communication user using this synchronous inbound service.</LI></UL><P>As written before, users can also achieve the same with SAP Fiori app <A href="https://fioriappslibrary.hana.ondemand.com/sap/fix/externalViewer/index.html#/detail/Apps('F1303')/S30" target="_blank" rel="noopener nofollow noreferrer">Maintain Business Users (F1303)</A>. Regarding communication user maintenance, the suitable SAP Fiori app is&nbsp;<A href="https://fioriappslibrary.hana.ondemand.com/sap/fix/externalViewer/index.html#/detail/Apps('F1338')/S32" target="_blank" rel="noopener nofollow noreferrer">Maintain Communication Users (F1338)</A>. Our SAP help portal also provides the following information regarding <A href="https://help.sap.com/docs/SAP_S4HANA_CLOUD/55a7cb346519450cb9e6d21c1ecd6ec1/365b0d6fe67d4cecbfe11cc8344264cc.html" target="_blank" rel="noopener noreferrer">role maintenance</A> and <A href="https://help.sap.com/docs/SAP_S4HANA_CLOUD/0f69f8fb28ac4bf48d2b57b9637e81fa/2e84a10c430645a88bdbfaaa23ac9ff7.html" target="_blank" rel="noopener noreferrer">communication management</A>.</P><H2 id="toc-hId-403101273">Communication settings (authentication methods etc.)</H2><P>To gain insights into communication settings, the following APIs can be used. Ideally, customers define a policy to determine acceptable combinations of communication arrangements and authentication methods and an identification via API of communication arrangements violating this policy can be established, or communication users used in multiple communication arrangements.</P><UL><LI><A href="https://api.sap.com/api/CE_COMMUNICATIONUSER_0001/overview" target="_blank" rel="noopener noreferrer">Communication User - Read</A><SPAN> (</SPAN>Type: ODATA V4): Read communication user using this synchronous inbound service.</LI><LI><A href="https://api.sap.com/api/CE_COMMUNICATIONSYSTEM_0001/overview" target="_blank" rel="noopener noreferrer">Communication System - Read</A><SPAN> (</SPAN>Type: ODATA V4): Read communication systems using this synchronous inbound service.</LI><LI><A href="https://api.sap.com/api/CE_COMMUNICATIONARRANGEMENT_0001/overview" target="_blank" rel="noopener noreferrer">Communication Arrangement - Read</A><SPAN> (</SPAN>Type: ODATA V4): Read communication arrangements using this synchronous inbound service.</LI></UL><P>The above mentioned documentation regarding <A href="https://help.sap.com/docs/SAP_S4HANA_CLOUD/0f69f8fb28ac4bf48d2b57b9637e81fa/2e84a10c430645a88bdbfaaa23ac9ff7.html" target="_blank" rel="noopener noreferrer">communication management</A> is good start to dive deeper into the details on communication settings. Corresponding SAP Fiori apps are <A href="https://fioriappslibrary.hana.ondemand.com/sap/fix/externalViewer/index.html#/detail/Apps('F1338')/S32" target="_blank" rel="noopener nofollow noreferrer">Maintain Communication Users (F1338)</A>, <A href="https://fioriappslibrary.hana.ondemand.com/sap/fix/externalViewer/index.html#/detail/Apps('F1762')/S32" target="_blank" rel="noopener nofollow noreferrer">Communication Systems (F1762)</A> and <A href="https://fioriappslibrary.hana.ondemand.com/sap/fix/externalViewer/index.html#/detail/Apps('F1763')/S32" target="_blank" rel="noopener nofollow noreferrer">Communication Arrangements (F1763)</A>.</P><H2 id="toc-hId-206587768">HTTP protection (csp, cors, framing) configuration</H2><P>To protect the UI user, a status of the customer-defined Content Security Policy can be fetched as well as information on specific functionality available through protection allowlists, like clickjacking protection.</P><UL><LI><A href="https://api.sap.com/api/CE_CONTENTSECURITYPOLICY_0001/overview" target="_blank" rel="noopener noreferrer">Content Security Policy - Read</A><SPAN> (</SPAN>Type: ODATA V4): Read Content Security Policy (CSP) using this synchronous inbound service.</LI><LI><A href="https://api.sap.com/api/CE_PROTECTIONALLOWLIST_0001/overview" target="_blank" rel="noopener noreferrer">Protection Allowlist - Read</A><SPAN> (</SPAN>Type: ODATA V4): Read the protection allowlists using this synchronous inbound service.</LI></UL><P><A href="https://help.sap.com/docs/SAP_S4HANA_CLOUD/55a7cb346519450cb9e6d21c1ecd6ec1/dd3935c7b88e4696b071f161f21a6052.html" target="_blank" rel="noopener noreferrer">This section</A> of the secure communication chapter of the SAP S/4HANA Cloud Public Edition documentation provides details on CSP and allowlists. Respective SAP Fiori apps are <A href="https://fioriappslibrary.hana.ondemand.com/sap/fix/externalViewer/index.html#/detail/Apps('F3856')/S32" target="_blank" rel="noopener nofollow noreferrer">Manage Content Security Policy (F3856)</A> and <A href="https://fioriappslibrary.hana.ondemand.com/sap/fix/externalViewer/index.html#/detail/Apps('F3195')/S32" target="_blank" rel="noopener nofollow noreferrer">Maintain Protection Allowlists (F3195)</A>.</P><H2 id="toc-hId-10074263">Trusted certificates</H2><P>Retrieving a status of certificate trust lists for trusted certification authorities.</P><UL><LI><A href="https://api.sap.com/api/CE_CERTIFICATES_0001/overview" target="_blank" rel="noopener noreferrer">Certificate - Read</A><SPAN> (</SPAN>Type: ODATA V4): Read the client certificates and certificate trust lists using this synchronous inbound service.</LI></UL><P>Documentation covering certificate trust lists can be found <A href="https://help.sap.com/docs/SAP_S4HANA_CLOUD/55a7cb346519450cb9e6d21c1ecd6ec1/2b3c3f1e4007472883abe5226e84f05f.html" target="_blank" rel="noopener noreferrer">here</A>. The corresponding SAP Fiori apps are <A href="https://fioriappslibrary.hana.ondemand.com/sap/fix/externalViewer/#/detail/Apps('F2275')/S32" target="_self" rel="nofollow noopener noreferrer">Maintain Certificate Trust List (F2275)</A> for root certificates and&nbsp;<A href="https://fioriappslibrary.hana.ondemand.com/sap/fix/externalViewer/#/detail/Apps('F5350')/S32" target="_blank" rel="noopener nofollow noreferrer">Maintain Client Certificates (F5350)</A>&nbsp;for client certificates.</P><H1 id="toc-hId--315521961">&nbsp;</H1><H1 id="toc-hId--512035466">Conclusion</H1><P>With SAP S/4HANA Cloud Public Edition 2402, SAP enhances its security posture and enables customers to harness insights from the configuration status of various security features of SAP S/4HANA Cloud Public Edition.</P> 2024-04-19T15:55:22.168000+02:00 https://community.sap.com/t5/enterprise-resource-planning-blogs-by-sap/isae-3000-for-sap-s-4hana-cloud-public-edition-evaluation-of-the/ba-p/13672124 ISAE 3000 for SAP S/4HANA Cloud Public Edition - Evaluation of the Authorization Role Concept 2024-04-24T18:37:57.586000+02:00 anandkapadia https://community.sap.com/t5/user/viewprofilepage/user-id/37089 <P style=" text-align: center; "><STRONG>This blog post is featured in the&nbsp;<A href="https://community.sap.com/t5/enterprise-resource-planning-blogs-by-sap/sap-s-4hana-cloud-public-edition-identity-access-management-your-knowledge/ba-p/13533425" target="_blank">SAP S/4HANA Cloud Public Edition Identity Access Management - Your Knowledge Base</A>.</STRONG></P><H2 id="toc-hId-992522628">Introduction</H2><P>Authorization plays an essential role when we are talking about the Identity Access Management strategy of any ERP solution. Authorizing is the function of specifying access rights/privileges to resources. Authorizations allow what you can do on the system, once you have been authenticated.</P><P>In the context of SAP S/4HANA Cloud Public Edition, SAP divides the business functionality into semantically meaningful business catalogs, representing tasks or subprocesses within a business process. These business catalogs are the most finely grained units regarding structuring of work and authorization assignment.</P><H2 id="toc-hId-796009123">Background</H2><P>Business catalogs grant access to an app, a set of apps, or individual aspects of an app. Some business catalogs have restrictions. These restrictions give customers the option to further specify the way the user might interact with the app: they may, for example, grant write or read access. Business catalogs are grouped into collections called business roles.</P><P>A business role generally contains multiple business catalogs and corresponds to a set of authorizations required to perform the tasks of a particular job description, for example, a warehouse clerk. On the business role level, restriction values of the contained business catalogs are defined. A business catalog might be contained in different business roles and might have different restriction values assigned in these different business roles.</P><P>But now the question comes up, how does SAP ensure that the business catalogs - as the smallest building block from an IAM perspective - are not containing any inherent segregation of duties (SoD) conflicts and are fulfilling proper development processes?</P><P>For this, SAP regularly hires an external auditor to perform assurance procedures as a reasonable assurance engagement in accordance with the International Standard on Assurance Engagements (ISAE) 3000 Revised, "Assurance Engagements Other Than Audits or Reviews of Historical Financial Information” (ISAE 3000).</P><P>In this blog post, we will see the scope of the ISAE 3000 Assurance Report as well as the steps for requesting a copy of it.</P><H2 id="toc-hId-599495618">Scope of the ISAE3000 Assurance Report</H2><P>The scope of this report includes assurance procedures on the design and implementation as well as the effectiveness of the SAP S/4HANA Cloud Public Edition Authorization Concept of SAP regarding development, design, and implementation to avoid SoD conflicts.</P><P>In order to gain reasonable assurance evidence, the external auditor decided to assess all relevant processes that influence the quality and usage of the released business catalogs by SAP to customers. Some of these assurance procedures refer to the technical backend view on the Business Catalogs, called Business Catalog Roles. Please note that the technical backend cannot be accessed by SAP customers.</P><P>The assurance procedures included the assessment of the business catalog role concept structure covered following aspects (technical view):</P><UL><LI>Business catalog roles implemented naming conventions</LI><LI>Development process for business catalogs</LI><LI>Rule-compliant definition of SAP S/4HANA Cloud Public Edition business catalog roles</LI><LI>SoD-compliant definition of SAP S/4HANA Cloud Public Edition business catalog roles</LI></UL><P>Additionally, the external auditor inspected the SAP-internal testing and change management process with regards to the business catalog roles. Ultimately, the business catalog implementation by SAP (as it is delivered to customers) has been evaluated. This part of the assurance involved walkthroughs with the involved development teams through the newly released SAP Fiori applications to SAP S/4HANA Cloud Public Edition.</P><H2 id="toc-hId-402982113">Requesting a Copy of the ISAE3000 Assurance Report</H2><P style=" text-align : justify; ">The use of this report is restricted. A copy of this report is available for all SAP S/4HANA Cloud Edition customers with productive systems. This report is also available for prospective customers under the signed non-disclosure agreement. The report may include a qualified opinion.</P><P style=" text-align : justify; ">For requesting the report, kindly follow these steps:</P><UL><LI>Go to <A href="https://www.sap.com/about/trust-center.html" target="_blank" rel="noopener noreferrer">SAP Trust Center</A></LI><LI>Select&nbsp;<STRONG>Compliance</STRONG></LI></UL><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="Compliance.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/97101i1E1E6D1D1407E68D/image-size/large?v=v2&amp;px=999" role="button" title="Compliance.png" alt="Compliance.png" /></span></P><UL><LI>Select<STRONG> Find Compliance Documents</STRONG></LI></UL><P><STRONG><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="Find compliance documents.png" style="width: 965px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/97102i230802B948CA6B8A/image-size/large?v=v2&amp;px=999" role="button" title="Find compliance documents.png" alt="Find compliance documents.png" /></span></STRONG></P><UL><LI>Filter the List of compliance documents. Search in the <STRONG>Offering Name</STRONG> for SAP S/4HANA Public Cloud</LI></UL><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="S4HC.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/97103iF9DA867BF48BBDC2/image-size/large?v=v2&amp;px=999" role="button" title="S4HC.png" alt="S4HC.png" /></span></P><UL><LI>Search and Click on <STRONG>Reasonable Assurance Report (ISAE3000) on the S/4HANA Cloud Edition Authorization Role Concept</STRONG></LI></UL><P><STRONG><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="ISAE300.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/97104i2C2B54945DD3B341/image-size/large?v=v2&amp;px=999" role="button" title="ISAE300.png" alt="ISAE300.png" /></span></STRONG></P><UL><LI>&nbsp;Scroll down and click on the button <STRONG><STRONG>Request a copy of the SAP S/4HANA ISAE 3000 Assurance Report</STRONG></STRONG></LI></UL><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="request.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/97105i93D06E1F132CEAB9/image-size/large?v=v2&amp;px=999" role="button" title="request.png" alt="request.png" /></span></P><P>&nbsp;</P><H2 id="toc-hId-206468608">Conclusion</H2><P>For more Identity Access Management-related topics on SAP S/4HANA Cloud Public Edition, you can check out my blog post&nbsp;<A href="https://community.sap.com/t5/enterprise-resource-planning-blogs-by-sap/sap-s-4hana-cloud-public-edition-identity-access-management-your-knowledge/ba-p/13533425" target="_blank">SAP S/4HANA Cloud Public Edition Identity Access Management - Your Knowledge Base</A>.</P><P>Please feel free to provide your feedback in the comment sections.&nbsp;</P><P>For more updates you can follow me via<SPAN>&nbsp;</SPAN><A href="https://www.linkedin.com/in/anand-kapadia" target="_blank" rel="noopener nofollow noreferrer">LinkedIn</A>.</P><P>&nbsp;</P> 2024-04-24T18:37:57.586000+02:00 https://community.sap.com/t5/enterprise-resource-planning-blogs-by-sap/influence-the-development-of-sap-enterprise-threat-detection-cloud-edition/ba-p/13687244 INFLUENCE THE DEVELOPMENT OF SAP ENTERPRISE THREAT DETECTION, CLOUD EDITION 2024-05-03T06:40:10.948000+02:00 KirtiSingh01 https://community.sap.com/t5/user/viewprofilepage/user-id/1447958 <P>Introducing influence page for SAP Enterprise Threat Detection, cloud edition.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="KirtiSingh01_2-1714475829296.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/103858i767BFD6748C29B56/image-size/large?v=v2&amp;px=999" role="button" title="KirtiSingh01_2-1714475829296.png" alt="KirtiSingh01_2-1714475829296.png" /></span></P><P>The SAP Enterprise Threat Detection product team are inviting customers and partners to share their feedback and ideas to enhance our solution.</P><P>On <A href="https://influence.sap.com/sap/ino/#/campaign/3606" target="_blank" rel="noopener noreferrer">SAP Enterprise Threat Detection, cloud edition Influence page</A> you can see all submitted requests, submit your improvement requests, vote and comment on other ideas.</P><P>The rationale and advantages of a customer influence page include:</P><UL><LI>Augmenting customers engagement and influence on product features.</LI><LI>Improving product/services using meaningful customer insights.</LI><LI>Cultivating an engaged community.</LI><LI>Serving as a central platform for customer suggestions and fueling innovation.</LI></UL><P>The product team regularly evaluates the ideas and considers them for roadmap planning. Votes help to priorities ideas along with other important selection criteria such as:</P><UL><LI><STRONG>DESIRABILITY</STRONG>: How many customers voted for this? How many customers will benefit from it?</LI><LI><STRONG>VIABILITY</STRONG>: Is this Improvement Request globally relevant? Is this in alignment with SAP’s strategy for the product?</LI><LI><STRONG>FEASIBILITY</STRONG>: Is the development effort realistic? Is this request achievable within the product’s architecture?</LI></UL><P>While this page is mainly for the public cloud edition, for private cloud and on-premise versions feel free to propose integration-related ideas.</P><P><STRONG>Follow the steps below to get access</STRONG>&nbsp;and start sharing your enhancement ideas:</P><UL><LI><STRONG>Go to</STRONG>&nbsp;<A href="https://influence.sap.com/sap/ino/#/campaign/3606" target="_blank" rel="noopener noreferrer">SAP Enterprise Threat Detection, cloud edition Influence page</A><U>.</U>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<UL class="lia-list-style-type-circle"><LI>In case you are a new user, create a user account using S-User-ID and accept the Terms of Use. Once the user is created you activate SSO and can access without any interruption.</LI></UL></LI></UL><UL><LI><STRONG>Follow&nbsp;</STRONG>the session to get notified of new Improvement Requests and blogs.</LI><LI><STRONG>Vote</STRONG>&nbsp;and&nbsp;<STRONG>comment</STRONG>&nbsp;on Improvement Requests posted by other customers/ partners.</LI><LI><STRONG>Submit</STRONG>&nbsp;new Improvement Requests.</LI></UL><P>You can also check out the videos\link below, if you wish to learn more about SAP Continuous Influence and how to submit and manage improvement requests:</P><UL><LI><A href="https://www.sap.com/assetdetail/2019/06/145793d7-517d-0010-87a3-c30de2ffd8ff.html" target="_blank" rel="noopener noreferrer">How to get started and navigate on the Customer Influence Site</A></LI><LI><A href="https://www.sap.com/assetdetail/2018/11/08f0cc5e-277d-0010-87a3-c30de2ffd8ff.html" target="_blank" rel="noopener noreferrer">How to submit an improvement request</A></LI><LI><A href="https://www.sap.com/about/customer-involvement/influence-adopt.influence-opportunities.html#join-customer-influence" target="_blank" rel="noopener noreferrer">SAP Customer Influence and Adoption main info page</A></LI></UL><P>Please reach us at <A href="mailto:SAP-ETD@sap.com" target="_blank" rel="noopener nofollow noreferrer">SAP-ETD@sap.com</A> in case of any issue.</P><P>We look forward to seeing your ideas and further improve our software as we move forward.</P> 2024-05-03T06:40:10.948000+02:00 https://community.sap.com/t5/technology-blogs-by-members/threat-actors-targeting-sap-applications/ba-p/13679657 Threat Actors targeting SAP Applications 2024-05-03T07:57:35.500000+02:00 jppereze https://community.sap.com/t5/user/viewprofilepage/user-id/91040 <P>Last week, Onapsis and Flashpoint released a report describing the evolution of the Treat Landscape around SAP Applications, including the intersection of SAP and Ransomware. Some of its highlights include a 490% increase of the mentions to SAP exploits or vulnerabilities across the open deep and dark web from 2020 to 2023, or a whopping 400% increase in the price or an Remote Command Execution exploit for SAP Applications from August of 2020 to April of 2024.</P><P>These Threat Intelligence indicates that Threat Actors of all types understand how to target SAP technology, by exploiting SAP CVE(s), exfiltrating financial reports from SAP Applications, performing financial fraud over extended periods of time, or even through the execution of Ransomware, which also targets SAP Applications and data. Some examples of these Threat Actors are APT10, a state sponsored actor, FIN7/FIN13, which are financially motivated Threat Actors or Cobalt Spider, a cybercriminal group.&nbsp;</P><P>This is an effort moving in the direction of helping SAP Customers tackle cybersecurity threats such as active cyberattacks or ransomware, as done in the past jointly with SAP:</P><UL><LI><A href="https://news.sap.com/2021/07/ransomware-threats-sap-onapsis/" target="_blank" rel="noopener noreferrer">Taking Ransomware Threats Seriously | SAP &amp; Onapsis | SAP News</A>&nbsp;</LI><LI><A href="https://news.sap.com/2021/04/sap-onapsis-application-cyber-threat/" target="_blank" rel="noopener noreferrer">SAP and Onapsis Help Protect Against Cyber Threats | SAP News</A>&nbsp;</LI></UL><P>So as SAP Customers, what should we do?&nbsp;</P><P>In short, Vulnerability Management, Threat Detection and Threat Intelligence should integrate and incorporate SAP Applications.&nbsp;</P><UL><LI>&nbsp;Vulnerabilities and misconfigurations affecting SAP are used by Threat Actors to target SAP Applications, so SAP Customers should have proper vulnerability management programs addressing vulnerabilities and issues in a timely way.&nbsp; There are specific vulnerabilities and risks that were identified as part of this research so those individual CVE(s) and misconfigurations are among the ones we should prioritize. Having said that, SAP releases patches periodically (second Tuesday of every month) and we should be able to process them and react accordingly. As an example, these are the patches released by SAP on April 2024:&nbsp;<A href="https://support.sap.com/en/my-support/knowledge-base/security-notes-news/april-2024.html" target="_blank" rel="noopener noreferrer">SAP Security Patch Day – April 2024</A>&nbsp; &nbsp;</LI><LI>Threat Intelligence tailored to SAP Applications should be consumed and integrated into Security Operation Centers, giving defenders the right signals to protect these applications before the bad guys act. Besides this recently released report, in the past, CISA has released a number of alerts, warning SAP customers about a number of different threats:&nbsp;<UL class="lia-list-style-type-square"><LI><P><A href="https://www.cisa.gov/news-events/alerts/2021/04/06/malicious-cyber-activity-targeting-critical-sap-applications" target="_blank" rel="noopener nofollow noreferrer"><SPAN>Malicious Cyber Activity Targeting Critical SAP Applications | CISA</SPAN></A><SPAN>&nbsp;</SPAN></P></LI><LI><P><A href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa20-195a" target="_blank" rel="noopener nofollow noreferrer"><SPAN>Critical Vulnerability in SAP NetWeaver AS Java | CISA</SPAN></A><SPAN>&nbsp;</SPAN></P></LI><LI><P><A href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa19-122a" target="_blank" rel="noopener nofollow noreferrer"><SPAN>New Exploits for Unsecure SAP Systems | CISA</SPAN></A></P></LI><LI><P><A href="https://www.cisa.gov/news-events/alerts/2016/05/11/exploitation-sap-business-applications" target="_blank" rel="noopener nofollow noreferrer"><SPAN>Exploitation of SAP Business Applications | CISA</SPAN></A></P></LI></UL></LI><LI>Feeds of logs and audit trails should be integrated into existing continuous monitoring programs to detect when SAP vulnerabilities are being exploited, SAP users are compromised or any other type of threat is affecting SAP Applications. These types of signals are extremely important to understand what happens through an SAP Application and to proactively detect potential threats.</LI></UL><P>If you are interested on reading more of this research, the report is available for download at both Onapsis and Flashpoint sites (SAP community policies do not allow to add the link directly on this blog).&nbsp;</P><P>&nbsp;</P> 2024-05-03T07:57:35.500000+02:00 https://community.sap.com/t5/technology-blogs-by-sap/integration-between-sap-and-one-identity/ba-p/13688557 Integration between SAP and One Identity 2024-05-03T08:31:39.439000+02:00 gcerbone https://community.sap.com/t5/user/viewprofilepage/user-id/139312 <P>As SAP Identity Management (SAP IDM) reaches its <A href="https://community.sap.com/t5/technology-blogs-by-sap/preparing-for-sap-identity-management-s-end-of-maintenance-in-2027/ba-p/13596101" target="_blank">end-of-maintenance</A>, customers will need to explore alternatives for their identity management landscapes. Here are some key elements to consider:</P><H3 id="toc-hId-1122711554">Embracing industry standards</H3><P data-unlink="true"><a href="https://community.sap.com/t5/c-khhcw49343/SAP+Cloud+Identity+Services/pd-p/67837800100800007337" class="lia-product-mention" data-product="155-1">SAP Cloud Identity Services</a>form the core of SAP’s IAM strategy, relying on industry standards such as Security Assertion Markup Language (SAML), OpenID Connect (OIDC), X.509 certificates and System for Cross-Domain Identity Management (SCIM).&nbsp; Any identity management solution considered should have strong support for these protocols and easily integrate with SAP Cloud Identity Services.</P><H3 id="toc-hId-926198049">On-premises workload support</H3><P>Given the diverse adoption levels and significant on-premises footprints among SAP IDM customers, strong support for on-premises workloads is a critical capability. Customers should also ensure that integration with SAP solutions are using supported and certified integration methods.</P><H3 id="toc-hId-729684544">Migration expertise</H3><P>Finally, customers should look for partners with experience in migration from SAP IDM to the partners solution, either through the partner’s professional services or through their network of partners.</P><H3 id="toc-hId-533171039">Integration with One Identity Manager</H3><P>SAP recently performed a proof-of-concept examining integration with solutions from SAP.&nbsp; The results:</P><OL><LI><SPAN>One Identity was able to prove all use cases for both ABAP and SCIM based connectivity scenarios.</SPAN><SPAN>&nbsp;</SPAN></LI><LI>One Identity Manager has a long track record of support for ABAP workloads using a certified connector, support for Cloud Identity with SCIM, and a broad network of partners with experience both in SAP solutions and with One Identity deployments.</LI><LI>The One Identity Manager solution can manage the identity lifecycle of SAP users through the certified SAP Connector for ABAP based SAP systems. Due to the deep integration and the resulting SAP expertise, customers can be supported not only in managing their SAP accounts on different SAP systems, either directly or indirectly via a CUA, but also in license measurement. It can assign accounts, the necessary SAP licenses and thus support customers in licensing SAP users. The certified connector of One Identity Manager is also able to synchronize HR data from an SAP HCM system. Current developments are also constantly considered and adopted, so that the One Identity Manager in a modern S/4HANA instance is well aware of the business partner concept and fully supports them.</LI></OL><H3 id="toc-hId-336657534">Integration with One Identity Manger and S/4</H3><P>The following set of graphics will show an S/4 HANA system being connected to One Identity’s IGA solution.</P><P>First, an S/4 HANA system is selected:</P><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="Picture1.jpg" style="width: 646px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/104476iB95D0FCA72F4BCF5/image-size/large?v=v2&amp;px=999" role="button" title="Picture1.jpg" alt="Picture1.jpg" /></span></P><P>Next, the clients to integrate are selected:</P><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="Picture2.jpg" style="width: 640px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/104477iBA0D0AFBE589F195/image-size/large?v=v2&amp;px=999" role="button" title="Picture2.jpg" alt="Picture2.jpg" /></span></P><P>&nbsp;Within One Identity Manager, the SAP ABAP connector is selected:</P><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="Picture3.jpg" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/104478iADD0A8D128774456/image-size/large?v=v2&amp;px=999" role="button" title="Picture3.jpg" alt="Picture3.jpg" /></span></P><P>&nbsp;Next, the data to integrate is selected.&nbsp;&nbsp;(note: although the button is labeled R/3, S/4 is supported):</P><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="Picture4.jpg" style="width: 632px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/104480iEA4DB5AC9118DC6F/image-size/large?v=v2&amp;px=999" role="button" title="Picture4.jpg" alt="Picture4.jpg" /></span></P><P>&nbsp;<SPAN>One Identity Manager synchronizes client specific data as well as system specific information. The below screenshot shows the list of clients on this SAP S4/HANA system.</SPAN></P><P><SPAN><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="Picture5.jpg" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/104481i5026E817A25FF000/image-size/large?v=v2&amp;px=999" role="button" title="Picture5.jpg" alt="Picture5.jpg" /></span></SPAN></P><P>&nbsp;The One Identity Manager’s target system browser allows live browsing. The list of SAP users and their details are shown below.&nbsp;</P><P><SPAN><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="Picture6.jpg" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/104482i233A63F5DD5D1420/image-size/large?v=v2&amp;px=999" role="button" title="Picture6.jpg" alt="Picture6.jpg" /></span></SPAN></P><P>&nbsp;The ABAP connector provides deep level attribute mapping, as well as the ability to map custom attributes.</P><P><SPAN><SPAN><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="Picture7.jpg" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/104483i0E1DA8EE08D3C8D4/image-size/large?v=v2&amp;px=999" role="button" title="Picture7.jpg" alt="Picture7.jpg" /></span></SPAN></SPAN></P><P>&nbsp;Once the S/4 HANA system has been successfully connected with the appropriate Client(s), Users, and attributes mapped, the data model is synchronized into One Identity Manager.</P><P><SPAN><SPAN><SPAN><SPAN><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="Picture8.jpg" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/104484i9D54C4270763759A/image-size/large?v=v2&amp;px=999" role="button" title="Picture8.jpg" alt="Picture8.jpg" /></span></SPAN></SPAN></SPAN></SPAN></P><P>&nbsp;<span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Picture9.jpg" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/104485iE365D64E8D11106E/image-size/large?v=v2&amp;px=999" role="button" title="Picture9.jpg" alt="Picture9.jpg" /></span></P><P><SPAN><SPAN><SPAN><SPAN>A user’s SAP roles are synchronized.</SPAN></SPAN></SPAN></SPAN></P><P><SPAN><SPAN><SPAN><SPAN><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="Picture10.jpg" style="width: 686px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/104486i7E7B0C1EC1586CE8/image-size/large?v=v2&amp;px=999" role="button" title="Picture10.jpg" alt="Picture10.jpg" /></span></SPAN></SPAN></SPAN></SPAN></P><P>&nbsp;Finally,&nbsp;changes made in One Identity Manager can be reflected back into S/4:</P><P><SPAN><SPAN><SPAN><SPAN><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="Picture13.jpg" style="width: 675px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/104487iE64CA35A6F18EE6B/image-size/large?v=v2&amp;px=999" role="button" title="Picture13.jpg" alt="Picture13.jpg" /></span></SPAN></SPAN></SPAN></SPAN></P><P>&nbsp;</P><P><SPAN><SPAN><SPAN><SPAN><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="Picture14.jpg" style="width: 670px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/104488i9C547C8C55CC6076/image-size/large?v=v2&amp;px=999" role="button" title="Picture14.jpg" alt="Picture14.jpg" /></span></SPAN></SPAN></SPAN></SPAN></P><P>&nbsp;</P><P>Customers who are already in a hybrid world and are utilizing RISE to migrate services to the cloud, have additional requirements for security, efficiency, and reliability. These customers not only have SAP's classic on-prem products and solutions in place, but also cloud-based solutions.</P><P>Hybrid SAP customers use services from the SAP cloud in addition to on-premises solutions. In this case, One Identity Manager can manage the ABAP-based SAP S/4HANA cloud private instances through the certified SAP connector, just like the on-prem ABAP-based SAP systems.</P><P>One Identity Manager can not only integrate SAP IAG, but also directly integrate applications on the SAP Business Technology Platform (SAP BTP). For this purpose, a SCIM-based standard connector is provided via their Starling Connect service, which enables integration via SAP Cloud Identity Services.</P><P>For customers utilizing SAP SuccessFactors, SAP Concur, SAP Ariba and other cloud hosted solutions, they can also be managed with One Identity Manager, ensuring holistic governance for our customers landscapes as they move forward.</P><P>Solutions like One Identity Manager will help facilitate a transition from SAP IDM to SAP Cloud solutions by supporting both ABAP and SCIM as well as other systems that customers have in their environments to help them satisfy their security requirements.</P><P>&nbsp;</P><P>&nbsp;</P><P>&nbsp;</P> 2024-05-03T08:31:39.439000+02:00 https://community.sap.com/t5/enterprise-resource-planning-blogs-by-sap/shared-trouble-is-security-doubled-the-shared-responsibility-model-for-sap/ba-p/13690550 Shared Trouble is security doubled: the shared responsibility model for SAP S/4HANA Cloud 2024-05-07T09:21:45.077000+02:00 patrickboch https://community.sap.com/t5/user/viewprofilepage/user-id/727153 <P><SPAN>One of the advantages of cloud applications is that you don’t have to take care of security. Which is true – mostly. In reality, while most of the security responsibilities and tasks are taken over by the cloud service provider, there are some things which the customer still holds responsible for. And that also goes for the security responsibilities in SAP S/4HANA Cloud. </SPAN></P><P><SPAN>&nbsp;</SPAN><SPAN>Now, the title of this article specifically mentions SAP S/4HANA Cloud, without specifying whether it refers to private or public cloud. This is intentional as the focus is on the customer's responsibilities in the S/4HANA Cloud responsibility model – and in the following I’d like to highlight the responsibilities of the customer in general, while detailing the differences between SAP S/4HANA Cloud Privat Edition versus SAP S/4HANA Cloud Public Edition. </SPAN></P><H3 id="toc-hId-1123396740"><SPAN>&nbsp;</SPAN><STRONG><SPAN>Responsibilities in General</SPAN></STRONG></H3><P><SPAN>&nbsp;</SPAN><SPAN>In terms of security, responsibilities are relatively clearly split between the Cloud Service Provider (CSP) and the customer. On a high level, the CSP’s responsibility includes security operations, network application, database management, operating system management, and the bare metal, unless partnering with a hyperscaler.</SPAN></P><P><SPAN>&nbsp;</SPAN><SPAN>The customer, on the other hand, is responsible for the application's access and security. However, there's a significant distinction depending on whether we're discussing SAP S/4HANA public or private cloud. </SPAN></P><P><SPAN>&nbsp;</SPAN><SPAN>Looking at it from another perspective, as the cloud service provider, we don't have access to your customer data, user identities, authentication, and business processes. The responsibility for these aspects lies with the customer. Conversely, security for the application server, database, operating systems, physical security, and bare metal security falls under our, SAP's, jurisdiction as a cloud service provider. </SPAN></P><P><SPAN>Understanding the difference is crucial, not just for security, but for adjacent topics as well.</SPAN></P><H3 id="toc-hId-926883235"><SPAN>&nbsp;</SPAN><STRONG><SPAN>Auditing cloud applications</SPAN></STRONG></H3><P><SPAN>&nbsp;</SPAN><SPAN>In order to get an overview, let’s begin with how auditing is approached in different cloud deployment options. This will help elucidate why it's critical to clearly distinguish responsibilities between you as a customer and SAP as the cloud service provider. </SPAN></P><P><SPAN>&nbsp;</SPAN><SPAN>When examining IT general controls, one should consider business processes, applications, and infrastructure. These elements require auditing by your auditor. IT application controls relate to business transactions and processes. The software, such as SAP S/4HANA, handles this. However, as the customer, you define the business processes and are therefore accountable to the auditor to ensure these processes function as designed.</SPAN></P><P><SPAN>&nbsp;</SPAN><SPAN>Secondly, there are application-related controls. These involve access management, change management, security configuration, and monitoring of application jobs and integration scenarios. The goal here is to ensure the application is implemented securely and correctly to meet the requirements of the business processes. </SPAN></P><P><SPAN>&nbsp;</SPAN><SPAN>The same principle applies to IT infrastructure, which must be implemented correctly to support business processes without negative impacts. This includes operating system and database security, but also physical data center security. </SPAN></P><H3 id="toc-hId-730369730"><SPAN>&nbsp;</SPAN><STRONG><SPAN>Customer Audits </SPAN></STRONG></H3><P><SPAN>When considering various cloud service models, the scope of the auditor's role varies significantly between on-premise installations and software as a service. In an on-premise model, the customer’s auditor must assess everything from physical security to business process controls. </SPAN></P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Different Cloud Deployment Models" style="width: 400px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/105434iAAC8DD5A814E93CC/image-size/medium?v=v2&amp;px=400" role="button" title="patrickboch_1-1714726533473.png" alt="Different Cloud Deployment Models" /><span class="lia-inline-image-caption" onclick="event.preventDefault();">Different Cloud Deployment Models</span></span></P><P><SPAN>In an Infrastructure as a Service (IaaS) model, the auditor would need to rely on the cloud service provider for physical data center security and hardware matters. However, everything else, including service operating systems and databases, remains the customer's responsibility and must be audited accordingly.</SPAN></P><P><SPAN>&nbsp;</SPAN><SPAN>With Platform as a Service (PaaS), like S/4HANA private cloud, responsibilities for the security of operating systems and databases shift to the cloud service provider. </SPAN></P><P><SPAN>Software as a Service (SaaS) extends this concept further, in cases like the SAP S/4HANA public cloud, where standardized software is used by all customers. </SPAN></P><P><SPAN>&nbsp;</SPAN><SPAN>To manage these varying responsibilities, the SOC (Service Organization Control) report, specifically the SOC 2 report has been established as an industry standard. This report is an attestation from auditors that all controls regarding IT infrastructure and application responsibility are functioning as designed. </SPAN></P><P><SPAN>The SOC report's purpose is to prevent each customer's auditor from having to verify that a CSP is maintaining their controls correctly. </SPAN></P><P><SPAN>However, it's crucial to note that customers must request the SOC 2 report regularly from the CSP, review it, and ensure it aligns with their security requirements. Subsequently, the company and its IT auditors need to review the controls within the SOC 2 report to verify everything is in order.</SPAN></P><H3 id="toc-hId-533856225"><STRONG><SPAN>The differences in SAP S/4HANA deployment models</SPAN></STRONG></H3><P><SPAN>Let's delve into the S/4HANA application, specifically focusing on the differences between private and public cloud options. </SPAN><SPAN>&nbsp;</SPAN></P><P><SPAN>To do this, we could proceed alphabetically by topic, but the most effective approach would be through the lens of the SAP Secure Operations Map. This tool, although developed before the advent of cloud technology, remains relevant as it comprehensively covers all tasks required for running applications like S/4HANA.</SPAN></P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="SAP Secure Operations Map" style="width: 400px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/105432i977A4808F87DD35E/image-size/medium?v=v2&amp;px=400" role="button" title="patrickboch_2-1714726533473.png" alt="SAP Secure Operations Map" /><span class="lia-inline-image-caption" onclick="event.preventDefault();">SAP Secure Operations Map</span></span></P><P><SPAN>As a brief overview, the map starts at the top with the organization, which isn't directly related to IT. It emphasizes the need for security governance awareness and risk management - an area that's often overlooked. In essence, it's crucial to identify potential risks, prepare responses, and manage them appropriately. </SPAN></P><P><SPAN>Next, the secure operations map addresses the application itself, highlighting aspects like access management, authentication, authorizations, and custom code security. It considers all customizations made in your SAP S/4HANA system.</SPAN><SPAN>&nbsp;</SPAN></P><P><SPAN>On the system level, the map focuses on security hardening, secure SAP code, our secure development process, and security monitoring. </SPAN></P><P><SPAN>At the bottom of the map, mirroring the cloud responsibilities we've discussed, there’s the environment. This includes network security, operating system, database security, and client security. </SPAN></P><P><SPAN>Taking a closer look at this, and returning to the cloud deployment models we discussed earlier, we see that the Secure Operations Map's five topics (environment, system, application, process, and organization) are all the customer's responsibility in an on-premise environment.</SPAN></P><P><SPAN>In a private environment, the responsibility transitions between SAP and the customer around the application area. In a public environment, we, as the service provider, shoulder a larger share of the responsibility compared to the customer.</SPAN><SPAN>&nbsp;</SPAN></P><P><SPAN>Network security is a shared responsibility between customers and SAP, regardless of whether the environment is private or public. As a customer, you must ensure that the network you use to access applications is secure. For instance, in a private environment, you may use SAP GUI via a VPN tunnel to our network. In contrast, in the public cloud, you can only access the software through a web browser over the internet. In both cases, you as the customer need to ensure that the network on your end is secured.</SPAN></P><P><SPAN>The operating system database security is our responsibility, again, regardless of whether it's a private or public cloud. Client security, on the other hand, such as ensuring the SAP GUI or web browser is set up securely, falls under the customer's domain in both cases.</SPAN></P><P><SPAN>When it comes to system security hardening, it's our responsibility, fully. Secure SAP code, from a development perspective, is our responsibility in both private and public cloud scenarios. However, there's a key difference when it comes to patch management in the private cloud. Here, updates are individual per customer and may affect business processes or require system restarts. Therefore, we coordinate with you before initiating any updates, unlike in the public cloud, where updates affect all customers.</SPAN></P><P><SPAN>Security monitoring and forensics represent another shared responsibility, but there are differences between Rise and Grow. In Rise, due to access to most of the ABAP stack, similar to an on-premise environment, you receive more information, including infrastructure logs provided by our private cloud operations team, a service called LogServe. </SPAN></P><P><SPAN>In a public cloud scenario, we provide a limited number of logs for security monitoring. Some information, technically, is shared among all customers; hence, we can't share it with individual customers.</SPAN></P><H3 id="toc-hId-337342720"><STRONG><SPAN>The application</SPAN></STRONG></H3><P><SPAN>Let's delve into the application, specifically User and Identity Management. </SPAN></P><P><SPAN>When we discuss roles and authorizations, we see a distinction between private and public cloud environments. In a private cloud, customers retain access to the PFCG, the SAP system transaction where roles and authorizations are defined and implemented. It's important to note that while you do have PFCG access in the private cloud, it's not usually full access. You typically can't assign authorizations or access the roles and authorizations definition, PFCG, as an admin, particularly when it comes to technical security topics. </SPAN></P><P><SPAN>In the public cloud, we implement a different strategy. We use what we call business catalogues, the smallest units of roles and authorizations. These catalogues are combined to create roles within the application, aligning with your business processes. </SPAN></P><P><SPAN>Regarding Custom Code Security, your code is generally your responsibility. However, there's a slight difference between private and public clouds. In the private cloud, you have more opportunities to program additional applications on top of S/4HANA. In contrast, in the public cloud, we provide Developer Extensibility that allows business application extensions but limits access to low level functionality. </SPAN></P><P><SPAN>The last main topic from within the Secure Operations Map is Processes and Organizations. This is primarily the customer's responsibility, which is why we won’t discuss it here. </SPAN><SPAN>&nbsp;</SPAN></P><H3 id="toc-hId-140829215">Conclusion: Lots and less to think about</H3><P>As mentioned in the opening of this article: moving to the cloud gives you a lot less to think and worry about, especially when it comes to security. However, it does not relieve customers from all responsibility - something to keep in mind. On the other hand, we at SAP will support now and in the future by guiding customers through those settings they are responsible for. And by making S/4HANA Cloud the most secure ERP system.&nbsp;</P> 2024-05-07T09:21:45.077000+02:00 https://community.sap.com/t5/technology-blogs-by-members/streamlining-user-provisioning-from-ibm-verify-to-sap-cloud-identity/ba-p/13695010 Streamlining User Provisioning from IBM Verify to SAP Cloud Identity Services 2024-05-08T12:57:02.652000+02:00 TusharTrivedi https://community.sap.com/t5/user/viewprofilepage/user-id/150726 <P>SAP Cloud Identity Services (CIS), part of SAP BTP, can be used to integrate Identity Access Management (IAM). In our last blog, we discussed the integration of SAP Cloud Identity Services (CIS) with IBM Security Verify, and now we're taking the next step in this integration. User provisioning is the process of setting up new user accounts in a system or application. In this blog, we will explore a common use case - - transitioning user provisioning from IBM Verify to SAP Cloud Identity Services, and how this transition can streamline operations and enhance security.</P><P><STRONG>The Challenge of User Provisioning</STRONG></P><P>User provisioning is the process of granting and controlling access to resources within an organisation’s information technology infrastructure. Historically, on-boarding or off-boarding users has been a laborious and time-consuming procedure that frequently required numerous processes across multiple systems. As businesses embrace cloud solutions, the complexity of user provisioning has grown, necessitating automated and integrated approaches.</P><P><STRONG>Transitioning from IBM Verify to SAP Cloud Identity Services</STRONG></P><P>IBM Verify is a comprehensive identity and access management system that includes multi-factor authentication (MFA) and adaptive access control, while SAP Cloud Identity Services offers identity lifecycle management, single sign-on (SSO), and access governance features. Integrating these two systems can help organisations automate and streamline user provisioning operations, while also improving security and user experience.</P><P>&nbsp;</P><P><STRONG><U>How does it work?</U></STRONG></P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Picture 1.jpg" style="width: 600px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/107254iC87D93636632C1FF/image-dimensions/600x390?v=v2" width="600" height="390" role="button" title="Picture 1.jpg" alt="Picture 1.jpg" /></span></P><P>The diagram shows that IBM Security Verify acts as a central user management system. It creates user accounts and manages their attributes, and also provisions them (or creates them) in SAP Cloud Identity Services, potentially syncing relevant user attributes. Selected attributes from Verify are&nbsp;mapped&nbsp;to specific target attributes in SAP Cloud Identity Services, ensuring consistent user information across both systems. SCIM, a standardised protocol, enables communication between Verify and SAP Cloud Identity Services. On the left side of the diagram, IBM Security Verify acts as a SCIM server, receiving requests for user management and then modifying the target directory as needed. This streamlines user creation and ensures consistent user information across both systems.</P><P>&nbsp;</P><P><STRONG><U>Prerequisites</U></STRONG></P><UL><LI>SAP Cloud Identity Services (for trial instance check this <A href="https://help.sap.com/docs/cloud-identity?locale=en-US" target="_blank" rel="noopener noreferrer">link</A>)</LI><LI>IBM Security Verify (for trial instance check this <A href="https://www.ibm.com/docs/en/security-verify?topic=overview-accessing-security-verify" target="_blank" rel="noopener nofollow noreferrer">link</A>)</LI><LI>A smartphone with IBM Security Verify App</LI></UL><P>&nbsp;</P><P><STRONG><U>Configurations and Settings in IBM Security Verify and SAP Cloud Identity Services</U></STRONG></P><P>Log into <A href="https://ibmlabs.verify.ibm.com/ui/admin" target="_blank" rel="noopener nofollow noreferrer">IBM Security Verify</A> as an administrator  </P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Picture 2.jpg" style="width: 600px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/107255iF33506AB018341EE/image-dimensions/600x315?v=v2" width="600" height="315" role="button" title="Picture 2.jpg" alt="Picture 2.jpg" /></span></P><P>When a user logs in, the home screen as shown below will be displayed.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Picture 3.jpg" style="width: 600px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/107256iA46ECE028C7D63C1/image-dimensions/600x315?v=v2" width="600" height="315" role="button" title="Picture 3.jpg" alt="Picture 3.jpg" /></span></P><P>On the left panel, click on "Applications" under "Applications". On the right side of the screen, there is an “Add application” button. Click on it.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Picture 4.jpg" style="width: 600px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/107258i998C9B160EB85555/image-dimensions/600x329?v=v2" width="600" height="329" role="button" title="Picture 4.jpg" alt="Picture 4.jpg" /></span></P><P>Fill in the necessary details under “General” section as below and save the details.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Picture 5.jpg" style="width: 600px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/107259iF49D6F1784AAD6A7/image-dimensions/600x363?v=v2" width="600" height="363" role="button" title="Picture 5.jpg" alt="Picture 5.jpg" /></span></P><P>Before we go further, let’s log into SAP BTP account and you will be navigated on SAP BTP Cockpit. As suggested below, navigate to the “Instances and Subscriptions” tab which is under “Services.”</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Picture 6.jpg" style="width: 601px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/107261i1A4FCC6A1C0D1C12/image-dimensions/601x326?v=v2" width="601" height="326" role="button" title="Picture 6.jpg" alt="Picture 6.jpg" /></span></P><P>You have to enable the cloud identity services application.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Picture 7.jpg" style="width: 601px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/107262i0B72D5F41CB61C9B/image-dimensions/601x316?v=v2" width="601" height="316" role="button" title="Picture 7.jpg" alt="Picture 7.jpg" /></span></P><P>Once enabled, it will look as below. Now, click on Cloud Identity Services application and you will be redirected to the login screen of the SAP authentication screen as shown below.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Picture 8.jpg" style="width: 601px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/107263iCC19230226369943/image-dimensions/601x316?v=v2" width="601" height="316" role="button" title="Picture 8.jpg" alt="Picture 8.jpg" /></span></P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Picture 9.jpg" style="width: 600px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/107266i357621A8168E5EF0/image-dimensions/600x315?v=v2" width="600" height="315" role="button" title="Picture 9.jpg" alt="Picture 9.jpg" /></span></P><P>After a successful login, you can see the home screen of Cloud identity Services. Go to the “Identity Providers” as highlighted below :</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Picture 10.jpg" style="width: 601px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/107268i5D2F63349F825C38/image-dimensions/601x337?v=v2" width="601" height="337" role="button" title="Picture 10.jpg" alt="Picture 10.jpg" /></span></P><P>Click on the Corporate Identity providers and create new identity provider.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Picture 11.jpg" style="width: 601px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/107269i7DEC6BF3C2F442CB/image-dimensions/601x313?v=v2" width="601" height="313" role="button" title="Picture 11.jpg" alt="Picture 11.jpg" /></span></P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Picture 12.jpg" style="width: 601px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/107270iDFD2CD3C9DA26807/image-dimensions/601x337?v=v2" width="601" height="337" role="button" title="Picture 12.jpg" alt="Picture 12.jpg" /></span></P><P>Once the new identity provider is successfully added,&nbsp; click on the identity provider type and select SAML 2.0 compliant, as shown below:</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Picture 13.jpg" style="width: 600px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/107271i5C962799BF791BA2/image-dimensions/600x315?v=v2" width="600" height="315" role="button" title="Picture 13.jpg" alt="Picture 13.jpg" /></span></P><P>Go to the SAML configuration section and fill in the information as shown below:</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Picture 14.jpg" style="width: 600px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/107275iD992FDB591A7B11C/image-dimensions/600x315?v=v2" width="600" height="315" role="button" title="Picture 14.jpg" alt="Picture 14.jpg" /></span></P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Picture 15.jpg" style="width: 601px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/107279i5840BC903244CD42/image-dimensions/601x314?v=v2" width="601" height="314" role="button" title="Picture 15.jpg" alt="Picture 15.jpg" /></span></P><P>You can browse the “Metadata” file from your device once you download it from IBM Security Verify dashboard. Go to the &nbsp;“Sign on” section of the application and on the right side of the screen, download the file from the given URL and upload the same in SAP Cloud Identity Services as highlighted below:</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Picture 16.jpg" style="width: 598px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/107280i74553FB8FBABC481/image-dimensions/598x329?v=v2" width="598" height="329" role="button" title="Picture 16.jpg" alt="Picture 16.jpg" /></span></P><P>Click on the Trusting application section and add SAP BTP trial subaccount.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Picture 17.jpg" style="width: 600px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/107281i7C0241A7448A67D6/image-dimensions/600x315?v=v2" width="600" height="315" role="button" title="Picture 17.jpg" alt="Picture 17.jpg" /></span></P><P>Establish the trust configuration, which is under the “Security” section &nbsp;for the cloud identity application as shown in the below screenshots.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Picture 18.jpg" style="width: 600px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/107282i6B60DB321260CD72/image-dimensions/600x315?v=v2" width="600" height="315" role="button" title="Picture 18.jpg" alt="Picture 18.jpg" /></span></P><P>You will see the below steps once you click on establish trust. In the first step, choose tenant and click on the next.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Picture 19.jpg" style="width: 600px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/107284iC5DF2A58932143A3/image-dimensions/600x315?v=v2" width="600" height="315" role="button" title="Picture 19.jpg" alt="Picture 19.jpg" /></span></P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Picture 20.jpg" style="width: 601px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/107285i669823593CB1EF97/image-dimensions/601x317?v=v2" width="601" height="317" role="button" title="Picture 20.jpg" alt="Picture 20.jpg" /></span></P><P>After selecting a tenant, choose domain for your SAP Cloud Identity Services application.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Picture 21.jpg" style="width: 600px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/107286iDC0DF0A0829D035F/image-dimensions/600x315?v=v2" width="600" height="315" role="button" title="Picture 21.jpg" alt="Picture 21.jpg" /></span></P><P>Click on the next button and configure parameters as shown in the below screenshot.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Picture 22.jpg" style="width: 601px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/107288iD40F34CDECC0FD9A/image-dimensions/601x317?v=v2" width="601" height="317" role="button" title="Picture 22.jpg" alt="Picture 22.jpg" /></span></P><P>Click on the next button and review the setup that you have done while establishing the trust. Finally, click on the finish button and save the details.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Picture 23.jpg" style="width: 600px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/107289iD6BAA6A35F4A9AA5/image-dimensions/600x315?v=v2" width="600" height="315" role="button" title="Picture 23.jpg" alt="Picture 23.jpg" /></span></P><P>Once done, you can see the trust new active trust configuration as shown below:</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Picture 24.jpg" style="width: 601px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/107392i27CD4C569D25B32C/image-dimensions/601x317?v=v2" width="601" height="317" role="button" title="Picture 24.jpg" alt="Picture 24.jpg" /></span></P><P>Now go back to IBM Security Verify and click on “Sign-on” section, then select “Use metadata” checkbox. It will allow us to upload the metadata file which we have downloaded from SAP BTP as shown below:</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Picture 25.jpg" style="width: 601px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/107394i216EC7591BDAD303/image-dimensions/601x317?v=v2" width="601" height="317" role="button" title="Picture 25.jpg" alt="Picture 25.jpg" /></span></P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Picture 26.jpg" style="width: 600px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/107395i35F9A561397134EF/image-dimensions/600x315?v=v2" width="600" height="315" role="button" title="Picture 26.jpg" alt="Picture 26.jpg" /></span></P><P>Upload the metadata file which you have recently saved on your device to IBM Verify dashboard.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Picture 27.jpg" style="width: 600px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/107397i52227C152B94583A/image-dimensions/600x339?v=v2" width="600" height="339" role="button" title="Picture 27.jpg" alt="Picture 27.jpg" /></span></P><P>Now go to the “Account lifecycle” tab and add SCIM URL, Username and password detail as shown in below image. You can get all the details from SAP Cloud Identity Services application page.</P><P>&nbsp;</P><P>To get SCIM URL, go to SAP CIS and get the URL details from the browser and add “SCIM” at the end of URL.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Picture 28.jpg" style="width: 600px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/107398i0F1E9139A1B89A00/image-dimensions/600x333?v=v2" width="600" height="333" role="button" title="Picture 28.jpg" alt="Picture 28.jpg" /></span></P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Picture 29.jpg" style="width: 600px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/107399iC0B3302E3F629661/image-dimensions/600x333?v=v2" width="600" height="333" role="button" title="Picture 29.jpg" alt="Picture 29.jpg" /></span></P><P>After adding the above details, scroll down and you can see “Attribute mapping” section. &nbsp;Click on the checkbox for which attribute you want to map from IBM Verify to SAP CIS and want to keep updated. Here we have checked email. &nbsp;Save this detail once changes are completed.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Picture 30.jpg" style="width: 600px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/107400i05DBB07F4608DEC7/image-dimensions/600x351?v=v2" width="600" height="351" role="button" title="Picture 30.jpg" alt="Picture 30.jpg" /></span></P><P>We have completed the configurations in IBM Security Verify and SAP Cloud Identity Services. Let’s add user with attribute&nbsp; into Verify and check if it is mapped to Cloud Identity Users dashboard.</P><P>Go to the Users tab under the “Directory” section on the left side of the verify dashboard and click on the “Add User” button as shown in below screenshot.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Picture 31.jpg" style="width: 601px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/107401iD25469100AB22F06/image-dimensions/601x359?v=v2" width="601" height="359" role="button" title="Picture 31.jpg" alt="Picture 31.jpg" /></span></P><P>Fill out the necessary information for the user as mentioned in the below image and click on the “Save” user tab.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Picture 32.jpg" style="width: 300px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/107402i6BC43DACFD285AE2/image-dimensions/300x427?v=v2" width="300" height="427" role="button" title="Picture 32.jpg" alt="Picture 32.jpg" /></span></P><P>Scroll down and you can add more detail about the user. Here we have added an email ID, mobile number and user company details.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Picture 33.jpg" style="width: 300px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/107404i61838B107F605CA6/image-dimensions/300x495?v=v2" width="300" height="495" role="button" title="Picture 33.jpg" alt="Picture 33.jpg" /></span>&nbsp;<span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Picture 34.jpg" style="width: 293px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/107405i6D6E7519C623DBAE/image-dimensions/293x495?v=v2" width="293" height="495" role="button" title="Picture 34.jpg" alt="Picture 34.jpg" /></span></P><P>Once done, click on the Save button and the user detail will be saved.</P><P>Open the Cloud Identity Services application and go to the user section to check whether the newly-created user from Verify is mapped.</P><P>Click on the “Instance and subscription” section from the “Services” section on the left menu, and once the application list is shown, click on the Cloud Identity Services application as shown below.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Picture 35.jpg" style="width: 601px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/107406i9D4A6985D7838094/image-dimensions/601x353?v=v2" width="601" height="353" role="button" title="Picture 35.jpg" alt="Picture 35.jpg" /></span></P><P>When the new application is loaded, click on the “User Management” tile and all the user list will be displayed.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Picture 36.jpg" style="width: 600px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/107407i4908B40D66F3039E/image-dimensions/600x354?v=v2" width="600" height="354" role="button" title="Picture 36.jpg" alt="Picture 36.jpg" /></span></P><P>As you can see in the below screenshot, a new user is created, which is added from Verify and mapped into SAP Cloud Identity Services. Also, the user detail is mapped into Cloud Identity Services.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Picture 37.jpg" style="width: 600px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/107408i49144A562C9FB9B1/image-dimensions/600x351?v=v2" width="600" height="351" role="button" title="Picture 37.jpg" alt="Picture 37.jpg" /></span></P><P><STRONG><U>Conclusion</U></STRONG></P><P>Effective user provisioning is critical to maintaining security, compliance, and operational efficiency. Centralising identity management, improving security, and streamlining administration activities enables organisations to successfully manage user identities and access controls across their entire IT infrastructure. Embracing integrated identity management solutions is more than just convenient - - &nbsp;it is a strategic need for businesses looking to flourish in an increasingly linked and security-conscious environment.</P><P><STRONG><U>More information:</U></STRONG></P><P>Refer to our another blog on <A href="https://community.sap.com/t5/technology-blogs-by-members/integrating-ibm-security-verify-with-sap-cloud-identity-services-in-sap-btp/ba-p/13651722" target="_blank">SAP Cloud Identity Service integration with IBM Security Verify</A>.</P><P>If you have any question or query about&nbsp;SAP BTP please refer to <A href="https://community.sap.com/" target="_blank">SAP Community</A> and for any question or query about IBM Security Verify refer to <A href="https://community.ibm.com/community/user/security/communities/community-home?CommunityKey=e7c36119-46d7-42f2-97a9-b44f0cc89c6d" target="_blank" rel="noopener nofollow noreferrer">IBM Security Verify Community</A></P> 2024-05-08T12:57:02.652000+02:00 https://community.sap.com/t5/enterprise-resource-planning-blogs-by-sap/sap-s-4hana-extracting-user-email-addresses-from-standard-tables/ba-p/13697756 SAP S/4HANA - Extracting User Email Addresses from Standard Tables 2024-05-10T15:09:30.362000+02:00 karthikj2 https://community.sap.com/t5/user/viewprofilepage/user-id/148163 <P><FONT size="5"><STRONG>What are we discussing here?</STRONG></FONT></P><P>When working with SAP systems, it is fundamental to need / verify user <FONT size="4">email</FONT> addresses for various purposes. Whether it is to send Automated Notifications, facilitating communication between users, or Generating Reports, having accurate and up-to-date email addresses is crucial. However, extracting the email address from SAP system is not as easy as we think. In this blog post, we will explore the simplest method to extract / find email addresses of users from SAP Standard tables.</P><P>Note : There is no direct transaction code or program to extract email addresses of users</P><P><FONT size="5"><STRONG>How are we going to achieve it?</STRONG></FONT></P><P>The primary table that stores user information in SAP is <STRONG>USR21</STRONG>. This table contains User Master Data, including Personal Numbers (<STRONG>PERSNUMBER</STRONG>) associated with each user. To retrieve email addresses, we will link this table with the address data table <STRONG>ADR6</STRONG>.</P><P><STRONG>What is USR21?</STRONG></P><P>USR21 is a standard table in SAP ERP system that assigns User Names and Address Keys.</P><P><STRONG>What is ADR6?</STRONG></P><P>The ADR6 table in SAP ERP system is a standard table that stores email addresses (Business Address Services) for any address record.</P><P><FONT size="5"><STRONG>Procedure to Extract Email Address from SAP Tables</STRONG></FONT></P><P>Execute table view transaction code: <STRONG>SE16</STRONG> -&gt; Enter Table Name : <STRONG>USR21</STRONG> -&gt; Execute</P><P>Provide the list of User ID(s) through Multiple Selection for <STRONG>BNAME </STRONG>-&gt; Execute</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="karthikj2_5-1715344388432.png" style="width: 400px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/108676iCEC89D0CE48CCB7B/image-size/medium?v=v2&amp;px=400" role="button" title="karthikj2_5-1715344388432.png" alt="karthikj2_5-1715344388432.png" /></span></P><P>Copy the list of Personnel Number <STRONG>(PERSNUMBER)</STRONG> for the users</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="karthikj2_6-1715344388441.png" style="width: 400px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/108674iCC1979566995EEFE/image-size/medium?v=v2&amp;px=400" role="button" title="karthikj2_6-1715344388441.png" alt="karthikj2_6-1715344388441.png" /></span></P><P>Execute table view transaction code: <STRONG>SE16</STRONG> -&gt; Enter Table Name: <STRONG>ADR6</STRONG> -&gt; Execute</P><P>Provide the list of Personnel Number(s) through Multiple Selection for <STRONG>PERSNUMBER </STRONG>-&gt; Execute</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="karthikj2_7-1715344388447.png" style="width: 400px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/108675i7E1876E52EBE5A3D/image-size/medium?v=v2&amp;px=400" role="button" title="karthikj2_7-1715344388447.png" alt="karthikj2_7-1715344388447.png" /></span></P><P><STRONG>SMTP_ADDR</STRONG> column of ADR6 table will provide the list of email address for users</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="karthikj2_8-1715344388454.png" style="width: 400px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/108680i9911656A2E120BA1/image-size/medium?v=v2&amp;px=400" role="button" title="karthikj2_8-1715344388454.png" alt="karthikj2_8-1715344388454.png" /></span></P><P>SAP also offers to extract the list into Spreadsheet from this screen</P><P><STRONG>&nbsp;</STRONG><STRONG>Tip :</STRONG> Ensure to select ALV Grid Display in User Specific Settings at initial screen of ADR6</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="karthikj2_9-1715344388461.png" style="width: 400px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/108681iA9B307175988C370/image-size/medium?v=v2&amp;px=400" role="button" title="karthikj2_9-1715344388461.png" alt="karthikj2_9-1715344388461.png" /></span></P><P><FONT size="5"><STRONG>Word of Caution</STRONG></FONT></P><P><STRONG>Avoid Unintended Disclosure</STRONG></P><P>When querying SAP tables, be cautious not to inadvertently disclose email addresses to unauthorized users or external sources.</P><P>Limit access to relevant personnel and follow proper authorization procedures.</P><P>Remember, accurate and secure email addresses contribute to smooth business processes and effective communication within your organization. Handle them responsibly, and always prioritize data protection.</P><P>If you have any further questions or need assistance, do not hesitate to comment on this blog. Happy SAP querying!</P><P>Feel free to share this article with your colleagues and peers who work with SAP systems.</P> 2024-05-10T15:09:30.362000+02:00