https://raw.githubusercontent.com/ajmaradiaga/feeds/main/scmt/topics/Security-blog-posts.xml SAP Community - Security 2026-02-17T12:01:48.357843+00:00 python-feedgen Security blog posts in SAP Community https://community.sap.com/t5/technology-blog-posts-by-sap/what-are-btp-platform-capabilities/ba-p/14261609 What are BTP Platform capabilities 2025-11-05T19:09:10.881000+01:00 AnaAreiqat https://community.sap.com/t5/user/viewprofilepage/user-id/1761748 <P><STRONG>Unlocking agility with SAP BTP Platform capabilities</STRONG></P><P>Think about the last time your business was under pressure. Maybe a critical system went down, a compliance audit was looming, or your teams were scrambling to connect data across multiple environments. In those moments, it’s not just technology that’s on the line, its customer trust, revenue, and reputation. For leaders, the stakes couldn’t be higher: every second of downtime or data risk ripples directly into the business.<BR /><BR />This is exactly the kind of pressure Jeff faces every day.<BR /><BR />Jeff is the IT operations lead at a U.S. logistics company. His team just deployed a new shipment tracking app in their West Coast cloud data center. The rollout goes well customers will receive real-time updates, and leadership is excited. But only a week later, the business calls with a new demand: “We need this live on the East Coast immediately.” That means a different region, new compliance requirements, and an entirely different setup. For most IT teams, this would mean long nights, rushing to reconfigure systems, and hoping nothing breaks in the process.<BR /><BR />Jeff feels the pressure, but he doesn’t panic. His IT stack is running on SAP Business Technology Platform (BTP<SPAN>)</SPAN>. Deployments can be transported and monitored easily. Security and compliance are handled within the platform, not bolted on after the fact. Connections across environments are already streamlined, and performance scales as demand grows. By the end of the week, the app is live across the country. Customers get the same seamless experience, the business captures new opportunities, and Jeff’s team avoids chaos.<BR /><BR />Jeff’s story isn’t unique. This is the reality for enterprises everywhere: running mission-critical workloads, managing enterprise applications, and orchestrating complex business processes has never been more challenging. Complexity is no longer just an IT problem-it’s a business risk.</P><P><A href="https://www.sap.com/products/technology-platform.html#:~:text=Over%2033%2C000%20customers%20are%20succeeding%20with%20SAP%20Business%20Technology%20Platform" target="_blank" rel="noopener noreferrer">See how other customers are transforming their operations, securing their landscapes, and scaling innovation with SAP BTP.</A></P><P><STRONG>Rising complexity &amp; market demands</STRONG></P><P>Business and technology leaders today face:</P><P>Rising complexity from fragmented, multi-vendor landscapes</P><UL><LI>95% of organizations struggle with system integration (<A href="https://www.adalo.com/posts/integration-challenges-with-legacy-technologies-b2b-stats" target="_blank" rel="noopener nofollow noreferrer">Adalo,2025</A>)</LI></UL><P>Escalating cybersecurity threats</P><UL><LI>38% of global cyberattacks rose in 2022 (<A href="https://www.globenewswire.com/news-release/2023/02/08/2604259/0/en/Check-Point-Software-Releases-its-2023-Security-Report-Highlighting-Rise-in-Cyberattacks-and-Disruptive-Malware.html" target="_blank" rel="noopener nofollow noreferrer">Check Point Research, 2023</A>)</LI></UL><P>Outdated systems</P><UL><LI>62% of leaders noted overburdened legacy models cannot support current and future strategic objectives and plans (<A href="https://www.gartner.com/en/articles/cio-challenges" target="_blank" rel="noopener nofollow noreferrer">Gartner, 2025</A>)</LI></UL><P>Pressure to innovate faster while controlling costs</P><UL><LI>80% of organizations say outdated tech is holding back innovation (<A href="https://services.global.ntt/en-us/newsroom/80-percent-of-organizations-agree-that-inadequate-or-outdated-technology-is-holding-back-innovation" target="_blank" rel="noopener nofollow noreferrer">NTT Global Research, 2024</A>)</LI></UL><P>Without a cohesive approach, enterprises risk losing the very agility they need to stay competitive. Meeting these demands takes more than infrastructure-it takes a platform that unifies the essential capabilities enterprises depend on: Application lifecycle management, Security, Interoperability, and Administration &amp; Operations. Together, these keep core systems consistent and reliable while enabling flexibility to adapt and innovate at scale.</P><P><STRONG>The Capabilities Every Enterprise Needs</STRONG></P><P>To address these challenges, enterprises need a platform. Let's define its core capabilities:</P><UL><LI><STRONG>Application Lifecycle Management</STRONG> - Keep business applications consistent, reliable, and up to date across their entire lifecycle.</LI><LI><STRONG>Security </STRONG>- Safeguard data, systems, and users with enterprise-grade protection and compliance.</LI><LI><STRONG>Interoperability</STRONG> - Seamlessly connect processes, applications, and data across hybrid, multi-cloud, and heterogeneous landscapes.</LI><LI><STRONG>Administration &amp; Operations</STRONG> - Ensure resilient, efficient, and scalable operations across regions and environments.</LI></UL><P>These capabilities don’t just keep the lights on-they empower enterprises to adapt and innovate with confidence. Interviewed SAP customers described their specific considerations in choosing SAP BTP: strength of analytics, integration, and automation (SAP SuccessFactors): “We chose SAP BTP because it offers comprehensive data analytics, integration, and automation capabilities. It provides a 360-degree view of our systems and applications.” (<A href="https://www.sap.com/products/technology-platform.html?pdf-asset=5cb3ae0b-167f-0010-bca6-c68f7e60039b&amp;page=1" target="_blank" rel="noopener noreferrer">SAP Business Value Report. 2025</A>)</P><P><STRONG>&nbsp;</STRONG></P><P><STRONG>Why SAP BTP Is Different</STRONG></P><P>Unlike fragmented, multi-vendor approaches, SAP BTP delivers these capabilities as part of a unified platform. With BTP, organizations can manage and evolve applications seamlessly across their entire lifecycle, protect data and systems with built-in enterprise-grade security, and connect processes and data end to end without silos. At the same time, they can keep operations reliable and consistent across regions and environments. This cohesive layer enables enterprises to move beyond patchwork solutions and gain the confidence to standardize, secure, and scale their business without compromise-with IDC research showing a 516% three-year ROI from SAP BTP <A href="https://www.sap.com/products/technology-platform.html?pdf-asset=5cb3ae0b-167f-0010-bca6-c68f7e60039b&amp;page=1" target="_blank" rel="noopener noreferrer">(SAP Business Value Report, 2025).<BR /><BR /></A>Powered by application lifecycle management, security, interoperability, and administration &amp; operations, SAP BTP provides a consistent, protected, and reliable way to run across regions and environments. This is what makes the promises of Build, Integration, and AI real to accelerate application development, connect SAP and non-SAP systems seamlessly, and embed AI into business processes.</P><P>&nbsp;</P><P><STRONG>Let’s bring to into focus</STRONG></P><P><STRONG>Application Lifecycle Management </STRONG>- Keep pace with change</P><P>Businesses never stand still, and applications can’t either. Application Lifecycle Management streamlines how teams build, test, and release, shrinking development cycles from months to weeks, so apps evolve at the pace to meet growing business demands.&nbsp;</P><P><STRONG>Security</STRONG> - Protect what matters most</P><P>With escalating threats and tighter regulations, security cannot be an afterthought. SAP BTP embeds identity, access, and compliance into the platform itself, protecting sensitive data and transactions so enterprises can innovate with trust.</P><P><STRONG>Interoperability</STRONG> - Connect everything, everywhere</P><P>Enterprises run on a mix of SAP, non-SAP, and multi-cloud systems. By removing integration barriers, SAP BTP ensures seamless data and process flow, reducing complexity and enabling rapid adaptation.</P><P><STRONG>Administration &amp; Operations </STRONG>- Run reliably at scale</P><P>Innovation only thrives when operations are stable. Real-time visibility helps IT teams optimize performance, control costs, and ensure mission-critical workloads run reliably across regions.</P><P><STRONG>Turning capabilities into outcomes</STRONG></P><P>SAP BTP isn’t just a platform-it’s a set of capabilities that help you run with confidence today and prepare for whatever comes next. By unifying what matters most, it ensures your business stays secure, connected, and ready to grow. Customers echo this value, saying: “We chose SAP BTP because it offers comprehensive data analytics, integration, and automation capabilities. It provides a 360-degree view of our systems and applications”. (<A href="https://www.sap.com/products/technology-platform.html?pdf-asset=5cb3ae0b-167f-0010-bca6-c68f7e60039b&amp;page=1" target="_blank" rel="noopener noreferrer">SAP Business Value Report, 2025</A>)<BR /><BR /></P><UL><LI><A href="https://www.sap.com/products/technology-platform/what-is-sap-business-technology-platform.html" target="_blank" rel="noopener noreferrer">Explore what SAP BTP Platform capabilities</A> can do for your business</LI><LI>Watch the <SPAN><A href="https://www.sap.com/events/2025-09-10-online-idc-sap-webcast.html" target="_blank" rel="noopener noreferrer">IDC + SAP webcast on the business value of SAP BTP</A></SPAN></LI></UL> 2025-11-05T19:09:10.881000+01:00 https://community.sap.com/t5/technology-blog-posts-by-sap/using-communication-targets-for-outbound-rfc-communication-in-abap/ba-p/14261486 Using Communication Targets for Outbound RFC Communication in ABAP 2025-11-10T04:12:55.469000+01:00 Nikolina_MH https://community.sap.com/t5/user/viewprofilepage/user-id/1952786 <P><SPAN>For those of you, who want to keep unwanted (you could even say badly dressed) destinations out of their HTTP(S) connections, check out this blog post:<BR /><A href="https://community.sap.com/t5/technology-blog-posts-by-sap/receiver-validation-http-enhance-your-security-by-controlling-destination/ba-p/13972704" target="_self">Receiver Validation HTTP - Enhance Your Security by Controlling Destination Usage</A><BR /></SPAN><SPAN><BR /></SPAN><SPAN>In the world of SAP systems, remote-enabled function modules (RFMs) are essential for connecting different systems and running functions remotely. </SPAN><SPAN>&nbsp;<BR /><BR /></SPAN><SPAN>In this article, you will be guided through the process of calling an RFM using communication targets. This ensures smooth integration between your SAP system and remote systems.</SPAN><SPAN>&nbsp;There is even a song about this phenomenon called "Smooth Integrator" . You see what we did there?&nbsp;<BR /></SPAN></P><P><STRONG>Why should you use communication targets?&nbsp;<BR /></STRONG><SPAN>Well, imagine throwing a party and accidentally inviting your ex, your accountant, and that one neighbor who always complains about your music. Nobody wants unwanted guests crashing their (SAP system) party!<BR />That's what happens when you don't have control over which applications can use which RFC destinations. It's a security and maintainability nightmare.&nbsp;&nbsp;</SPAN><SPAN><BR /></SPAN><SPAN>&nbsp;<BR /></SPAN><SPAN>You might wonder how exactly communication target get to be the "life of the party".<BR />Communication targets and application destinations provide a strong layer that simplifies complex processes. They define</SPAN><STRONG><SPAN> how</SPAN></STRONG><SPAN> your SAP system connects with external systems. For that we need to use specific configurations known as appplication destinations.&nbsp;</SPAN><SPAN>&nbsp;</SPAN></P><P><SPAN>What is an <STRONG>application destination</STRONG>, you ask? </SPAN><SPAN>&nbsp;<BR /></SPAN><SPAN>Imagine it as the ultimate party planner for your data!</SPAN><SPAN>&nbsp;</SPAN></P><P><SPAN>It's the one responsible for making sure your data arrives at the right place, with the right credentials, and doesn't end up going to the wrong party. You know, like that one time you got invited&nbsp; to a LAN-Party, but&nbsp; showed up at a wild rave instead. Oops!</SPAN><SPAN>&nbsp;</SPAN></P><P><STRONG>Let's dive into the technical details.&nbsp;&nbsp;</STRONG></P><P><SPAN>When you create a communication target, you need to carefully choose which of the following settings suit you best:</SPAN><SPAN>&nbsp;<BR /></SPAN></P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Nikolina_MH_0-1762359295594.png" style="width: 400px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/336584i082E454D8E2D2F41/image-size/medium?v=v2&amp;px=400" role="button" title="Nikolina_MH_0-1762359295594.png" alt="Nikolina_MH_0-1762359295594.png" /></span></P><UL><LI><SPAN>Enforce SAP GUI Support - it ensures application destinations allow GUIs and disallow WebSocket RFC.&nbsp;</SPAN><SPAN>&nbsp;</SPAN></LI></UL><UL><LI><SPAN>Enforce Fast Serialization - mandates the use of Fast Serializer for application destinations, preventing issues by disallowing other serializers if the scenario was developed with Fast Serializer.&nbsp;</SPAN><SPAN>&nbsp;</SPAN></LI></UL><UL><LI><SPAN>Default Compression Mode - allows predefined settings for higher compression in WAN scenarios or fast compression in LAN scenarios.</SPAN><SPAN>&nbsp;</SPAN></LI></UL><P><SPAN>When using communication targets, you can create an application destination in the transaction APPLDEST.&nbsp; This process ensures you communicate only with the intended recipients. </SPAN><SPAN>&nbsp;<BR /></SPAN><SPAN>You select your communication target and create a new application destination with a right-click:</SPAN><SPAN>&nbsp;<BR /></SPAN></P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Nikolina_MH_1-1762359295594.png" style="width: 400px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/336585i188C55D787BF95FF/image-size/medium?v=v2&amp;px=400" role="button" title="Nikolina_MH_1-1762359295594.png" alt="Nikolina_MH_1-1762359295594.png" /></span></P><P>&nbsp;</P><P><SPAN>&nbsp;</SPAN></P><P><SPAN>Then you just need to name it, enter the client and select CPIC for the RFC Type.</SPAN><SPAN>&nbsp;<BR /></SPAN></P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Nikolina_MH_2-1762359295595.png" style="width: 400px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/336586iAF8DB8E057E40079/image-size/medium?v=v2&amp;px=400" role="button" title="Nikolina_MH_2-1762359295595.png" alt="Nikolina_MH_2-1762359295595.png" /></span></P><P><SPAN>Alright, now you have an application destination. You still need to enter some important details like the host name (it can be retrieved from transaction SM51), instance and which authentication method you want to use.</SPAN><SPAN>&nbsp;<BR /></SPAN><SPAN>Application destinations are crucial component for managing external connections efficiently and securely. And now you have one too.</SPAN><SPAN>&nbsp;Good for you!<BR /></SPAN><SPAN>&nbsp;<BR /></SPAN><SPAN>If you use Cloud capabilities,&nbsp; communication targets are now available as well!</SPAN><SPAN><BR /></SPAN><SPAN>Instead of using the traditional APPLDEST transaction, the cloud environment introduces some differences regarding the application destination:</SPAN><SPAN>&nbsp;<BR /></SPAN></P><UL><LI><SPAN>In the cloud, you start by creating a communication scenario for outbound RFC, which defines the interaction between your SAP system and external systems. </SPAN></LI><LI><SPAN>A corresponding runtime configuration, including a communication arrangement and communication system, must exist for your scenario. </SPAN></LI><LI><SPAN>When a communication arrangement is saved, the system automatically creates an application destination.&nbsp;</SPAN><SPAN>&nbsp;</SPAN></LI></UL><P><EM>But wait, there's more! </EM><SPAN><EM>&nbsp;</EM><BR /></SPAN><SPAN>&nbsp;<BR /></SPAN><SPAN>Communication targets can generally have either multiple or exactly one assigned application destination. If you're calling an RFC service via communication targets in your ABAP code, you use the CALL FUNCTION (…) IN REMOTE SESSION method, it is essential for running the function remotely. </SPAN><SPAN>It is basically like sending an RSVP to your guest, ensuring they got the invite (you get a response much faster though).&nbsp;</SPAN><SPAN><BR /></SPAN><SPAN>&nbsp;<BR /></SPAN><SPAN>When a communication target has exactly one assigned application destination, the process is straightforward. In cases where a communication target has several assigned application destinations, a few additional steps are required. </SPAN><SPAN>&nbsp;<BR /></SPAN><SPAN>When you have several assigned application destinations, one must pass the name of the relevant application destination to the parameter </SPAN><STRONG><SPAN>application_destination</SPAN></STRONG><SPAN> when creating the communication target instance. This ensures that the correct destination is used during the remote session. Check out how easy it is: </SPAN><SPAN>&nbsp;<BR /></SPAN></P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Nikolina_MH_3-1762359295595.png" style="width: 400px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/336588iA65ECC7143018EC0/image-size/medium?v=v2&amp;px=400" role="button" title="Nikolina_MH_3-1762359295595.png" alt="Nikolina_MH_3-1762359295595.png" /></span></P><P>&nbsp;</P><P><SPAN>&nbsp;<BR /></SPAN></P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Nikolina_MH_4-1762359295595.png" style="width: 400px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/336587iD5756D315B8B63AA/image-size/medium?v=v2&amp;px=400" role="button" title="Nikolina_MH_4-1762359295595.png" alt="Nikolina_MH_4-1762359295595.png" /></span></P><P><SPAN>In this example we called the function </SPAN><STRONG><SPAN>RFC_SYSTEM_INFO</SPAN></STRONG><SPAN> and we wanted to find out the maximal resources. 45 is the result.</SPAN><SPAN>&nbsp;<BR />That´s a Bingo!<BR /><BR /></SPAN></P><P><SPAN>By following alle these steps, you can call RFMs using communication targets, improving the connectivity and functionality of your SAP system.&nbsp;</SPAN><SPAN>&nbsp;</SPAN></P><P><SPAN>Just remember, the key is in the configuration.&nbsp; It should fit your specific needs, like making sure your party playlist has the right mix of songs to keep everyone dancing, and not just that one weird guy.&nbsp; We all know that one guy who just loooves to play the DJ, please don´t let him.&nbsp;<BR /></SPAN><SPAN><BR /></SPAN></P><P><SPAN>To summarize, communication targets and application destinations let you:</SPAN><SPAN>&nbsp;</SPAN></P><UL><LI><SPAN>Control which applications can crash which parties (application destinations).</SPAN><SPAN>&nbsp;</SPAN></LI><LI><SPAN>Restrict access to only those who need it.</SPAN><SPAN>&nbsp;</SPAN></LI><LI><SPAN>Avoid runtime errors and security mishaps.</SPAN><SPAN>&nbsp;</SPAN></LI></UL><P><SPAN>&nbsp;</SPAN></P><P><SPAN>In case you are not a party animal, check out the step by step guide: </SPAN><SPAN>&nbsp;<BR /></SPAN><SPAN><A href="https://help.sap.com/docs/abap-cloud/abap-integration-connectivity/calling-rfc-service-via-communication-targets?" target="_self" rel="noopener noreferrer">Calling a RFM via Communication Targets</A><BR /></SPAN></P> 2025-11-10T04:12:55.469000+01:00 https://community.sap.com/t5/technology-blog-posts-by-members/sap-ea-real-world-asset-tokenization-with-distributed-ledger-technology-on/ba-p/14263514 SAP EA - Real World Asset Tokenization with Distributed Ledger Technology on the SAP BTP Kyma 🚀 2025-11-10T06:21:30.705000+01:00 AndySilvey https://community.sap.com/t5/user/viewprofilepage/user-id/1397601 <P>I is for Innovation....&nbsp; &nbsp;EA is about... the goal of this blog is to get us thinking and talking about tokenization before the Business turn up demanding it...</P><P>I've always wished and dreamed that us SAP EA's would know our Business so well and at the same time have Road Maps for all of our Technology Standards and including Emerging Standards so that we would know what Technical Capabilities the Business requires before they even come to us with their Demand.</P><P>In reality, in my experience 9 times out 10 it's the Business who come to EA with demands for new technologies (innovations).</P><P>How do we bring in or do "Innovation" ? Ideally with Roadmaps and Emerging Technology Standards.&nbsp;</P><P>SAP's next generation Customer CoE guides&nbsp;<A href="https://support.sap.com/en/offerings-programs/ccoe/cio-customer-coe-guides.html" target="_blank" rel="noopener noreferrer">SAP Guides for Customer COE</A>&nbsp;provide thought leadership on bringing in innovations,&nbsp;<A href="https://support.sap.com/content/dam/support/en_us/library/ssp/offerings-and-programs/customer-center-of-expertise/ccoe-document-store/ccoe_strategy_framework.pdf" target="_blank" rel="noopener noreferrer">Customer Center of Expertise - Strategy, Governance and Organization</A></P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="AndySilvey_0-1762682779455.png" style="width: 615px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/337570i27B1E817EBC24DDA/image-dimensions/615x232/is-moderation-mode/true?v=v2" width="615" height="232" role="button" title="AndySilvey_0-1762682779455.png" alt="AndySilvey_0-1762682779455.png" /></span></P><P>and&nbsp;<A href="https://support.sap.com/content/dam/support/en_us/library/ssp/offerings-and-programs/customer-center-of-expertise/media-library/general-information/continuous-improvement-and-innovation-with-a-ccoe.pdf" target="_blank" rel="noopener noreferrer">continuous-improvement-and-innovation-with-a-ccoe.pdf</A></P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="AndySilvey_1-1762682809277.png" style="width: 666px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/337571iADBDBB14302DDC90/image-dimensions/666x164/is-moderation-mode/true?v=v2" width="666" height="164" role="button" title="AndySilvey_1-1762682809277.png" alt="AndySilvey_1-1762682809277.png" /></span><FONT size="2"><EM><A href="https://support.sap.com/en/offerings-programs/ccoe.html" target="_blank" rel="noopener noreferrer">Customer Center of Expertise</A>&nbsp; &nbsp;</EM></FONT></P><P><FONT size="2"><EM><A href="https://support.sap.com/content/dam/support/en_us/library/ssp/offerings-and-programs/customer-center-of-expertise/ccoe-document-store/ccoe_continuous_success_en.pdf" target="_blank" rel="noopener noreferrer">ccoe_continuous_success_en.pdf</A></EM></FONT></P><P>In SAP's documentation, in the North Star Architecture, in the next generation SAP CCoE,&nbsp; innovation responsibilities come in to a number of Roles</P><P class="lia-indent-padding-left-60px" style="padding-left : 60px;"><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Innovation.png" style="width: 494px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/337572i4B08DA86F99069D2/image-dimensions/494x66/is-moderation-mode/true?v=v2" width="494" height="66" role="button" title="Innovation.png" alt="Innovation.png" /></span></P><P>And combined with the Digital Innovation Manager&nbsp;<A href="https://pages.community.sap.com/topics/digital-innovation/innovation-manager" target="_blank" rel="noopener noreferrer">Digital Innovation Manager | Digital Technology and Innovation Management| SAP Community</A></P><P>And that is what this blog is about, innovation, and innovation in the area of Tokenization and RWA Real World Asset Tokenization.</P><P>There is a silent digital revolution going on, where evidence, assets, transactions are being given a digital fingerprint, a hash on a Distributed Ledger and being tokenized.</P><P>What is Tokenization and who's doing it and where is it going ?</P><P>Let's start by looking at what's happening in the space:</P><P><FONT size="2"><EM>[Disclaimer - we cannot post links outside of the Community and if you want to read these articles then just go on your favourite search engine and find them]</EM></FONT></P><P><STRONG>Pairpoint - Vodafone Sumitomo JV</STRONG></P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="AndySilvey_0-1762686128517.png" style="width: 660px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/337573iA002B384AABC2C17/image-dimensions/660x200/is-moderation-mode/true?v=v2" width="660" height="200" role="button" title="AndySilvey_0-1762686128517.png" alt="AndySilvey_0-1762686128517.png" /></span></P><P>&nbsp;</P><P><STRONG>World Economic Forum</STRONG></P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="AndySilvey_1-1762686256814.png" style="width: 672px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/337574i4A7807BA9CE2E38D/image-dimensions/672x247/is-moderation-mode/true?v=v2" width="672" height="247" role="button" title="AndySilvey_1-1762686256814.png" alt="AndySilvey_1-1762686256814.png" /></span></P><P>&nbsp;</P><P><STRONG>Fortune - Asia's quiet tokenization revolution</STRONG></P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="AndySilvey_2-1762686461543.png" style="width: 664px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/337575i7E66101D3ED96765/image-dimensions/664x326/is-moderation-mode/true?v=v2" width="664" height="326" role="button" title="AndySilvey_2-1762686461543.png" alt="AndySilvey_2-1762686461543.png" /></span></P><P>&nbsp;</P><P><STRONG>CNBC</STRONG></P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="AndySilvey_3-1762686822450.png" style="width: 671px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/337576i70B3831229B65900/image-dimensions/671x354/is-moderation-mode/true?v=v2" width="671" height="354" role="button" title="AndySilvey_3-1762686822450.png" alt="AndySilvey_3-1762686822450.png" /></span></P><P>&nbsp;</P><P><STRONG>Oracle</STRONG></P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="AndySilvey_4-1762687234784.png" style="width: 664px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/337577iD169BB0792B6D8FE/image-dimensions/664x312/is-moderation-mode/true?v=v2" width="664" height="312" role="button" title="AndySilvey_4-1762687234784.png" alt="AndySilvey_4-1762687234784.png" /></span></P><P>from the same article, <STRONG>this is how Oracle sees it</STRONG>:</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="AndySilvey_5-1762687423595.png" style="width: 683px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/337578iCB56818D0FFD22CB/image-dimensions/683x529/is-moderation-mode/true?v=v2" width="683" height="529" role="button" title="AndySilvey_5-1762687423595.png" alt="AndySilvey_5-1762687423595.png" /></span></P><P>&nbsp;</P><P>If they all see Tokenization that way then maybe the EA innovation leads in our Organisations should be having a look at Tokenization too.</P><P>This older SAP article considered common use cases&nbsp;<A href="https://pages.community.sap.com/topics/digital-innovation/non-fungible-token-nft#nft-digital-asset-representation-on-a-blockchain" target="_blank" rel="noopener noreferrer">NFT (Non-Fungible-Tokens) | Digital Technology and Innovation Management | SAP Community</A></P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="AndySilvey_6-1762688278702.png" style="width: 643px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/337579iEC3BBC895BC4A3CD/image-dimensions/643x336/is-moderation-mode/true?v=v2" width="643" height="336" role="button" title="AndySilvey_6-1762688278702.png" alt="AndySilvey_6-1762688278702.png" /></span></P><P>SAP has dipped their toes into the water with the SAP Green Ledger&nbsp;<A href="https://help.sap.com/docs/green-ledger/introduction/introduction" target="_blank" rel="noopener noreferrer">What Is SAP Green Ledger? | SAP Help Portal</A>&nbsp;, in my opinion the scope is too narrow,&nbsp;<A href="https://www.sap.com/assetdetail/2023/05/52ec66b4-727e-0010-bca6-c68f7e60039b.html" target="_blank" rel="noopener noreferrer">Green Ledger: Where Carbon and Financial Accounting Unite</A>&nbsp; &nbsp;<A href="https://www.sap.com/assetdetail/2024/06/428fc78f-c17e-0010-bca6-c68f7e60039b.html" target="_blank" rel="noopener noreferrer">SAP Green Ledger and an ERP-centric approach to reinvent carbon accounting</A>&nbsp; &nbsp;and Carbon Accounting is the tip of the iceberg.</P><P>Learning.sap.com has some excellent resources including videos&nbsp;<A href="https://learning.sap.com/courses/helping-business-thrive-in-a-circular-economy/blockchain-_LE_2bf04a9e-f791-493b-82e3-072718564c9e" target="_blank" rel="noopener noreferrer">Blockchain</A>&nbsp; and this incredible Blockchain course&nbsp;<A href="https://learning.sap.com/courses/what-can-blockchain-do-for-you" target="_blank" rel="noopener noreferrer">What Can Blockchain Do for You</A>&nbsp;.</P><P>Have a think about how Tokenization and Distributed Ledger Technology capabilities fit towards your Business, your Business Processes, your Business Partners.</P><P>Have a think about drawing the <A href="https://community.sap.com/t5/technology-blog-posts-by-members/enterprise-architecture-enterprise-blockchain-platform-business-capability/ba-p/13902640" target="_self">Blockchain Capability Map</A>,&nbsp; <A href="https://community.sap.com/t5/technology-blog-posts-by-members/sap-enterprise-architecture-positioning-blockchain-database-as-an/ba-p/13629842" target="_self">positioning Enterprise Blockchain as an Emerging Technology Standard</A>, and then when the Business come with the Demand... <A href="https://community.sap.com/t5/technology-blog-posts-by-members/sap-enterprise-architecture-let-the-use-case-find-the-blockchain/ba-p/13632458" target="_self">let the use-case / Demand find the Blockchain</A>, and if you want to have a play with Enterprise Blockchain on the BTP Kyma, even the BTP Trial Edition Kyma <A href="https://community.sap.com/t5/technology-blog-posts-by-members/running-your-own-blockchain-on-the-sap-btp-kyma-trial-a-hands-on-how-to/ba-p/13724580" target="_self">then just follow this blog</A> and reach out if there are any questions.</P><P>And that's the purpose of this blog, to get Tokenization onto our EA radars.</P><P>What do you think, put your thoughts in the comments.</P><P>Ultimately this is all "<A class="" href="https://community.sap.com/t5/technology-blog-posts-by-members/why-i-love-sap-and-blockchain-databases-and-why-you-should-too/ba-p/13625869" target="_blank">Why I love SAP and Blockchain Databases and why you should too <span class="lia-unicode-emoji" title=":rocket:">🚀</span></A>".</P><P>Andy Silvey.</P><P>Independent<SPAN>&nbsp;</SPAN><EM>SAP Technical Architect and SAP Basis SME</EM><SPAN>&nbsp;</SPAN>[you might also find my SAP S/4HANA RISE &amp; BTP Toolbox interesting:&nbsp;<SPAN>&nbsp;</SPAN><A class="" href="https://community.sap.com/t5/technology-blog-posts-by-members/%EF%B8%8F-the-sap-s-4hana-rise-amp-sap-btp-toolbox-%EF%B8%8F/ba-p/13944069" target="_blank">🧰👷‍ The SAP S/4HANA RISE &amp; SAP BTP - Toolbox 👷‍🧰</A>] and CEO of atkrypto (.) io</P><P>Author Bio:</P><P>Andy Silvey is a 26 years SAP Technology veteran&nbsp;[26<EM>&nbsp;years SAP Basis and&nbsp; including 12 years SAP Tech Arch including Tech, Integration, Security, Data from 3.1H to S/4HANA PCE on RISE and the BTP and everything in between, and<SPAN>&nbsp;</SPAN><A href="https://community.sap.com/t5/welcome-corner-blog-posts/andy-silvey-scn-moderator-spotlight/ba-p/13054438" target="_self">former SCN Moderator and Mentor alumni</A>].</EM></P><P>Andy is also co-Founder of atkrypto inc, an startup whose ambition is to make Blockchain easy for Enterprise.</P><P>atkrypto (.) io's flagship product is the atkrypto Enterprise Blockchain Platform for SAP,&nbsp; and atkrypto (.) io is a SAP Partner Edge Open EcoSystem Partner.&nbsp;</P><P>The&nbsp;atkrypto Enterprise Blockchain Platform for SAP has been designed by SAP Independent Experts for the needs of SAP Customers and to be deployed on the SAP BTP Kyma Runtime Service and leverage native integration to SAP Products.</P><P>atkrypto&nbsp;Enterprise Blockchain Platform for SAP has a number of unique qualities, including being the only Blockchain software in the world which has a DataCenter version and a light mobile version which can run on Edge/IoT/Mobile devices and enables data to be written to the Blockchain at the Edge where that same Blockchain is running on a Server in the DataCenter, protecting the integrity and originality of data from the Edge to Insights. Taking Blockchain to the Data at the Edge instead of taking the Data to the Blockchain.</P><P>&nbsp;</P><P>&nbsp;</P><P>&nbsp;</P><P>&nbsp;</P><P>&nbsp;</P> 2025-11-10T06:21:30.705000+01:00 https://community.sap.com/t5/artificial-intelligence-blogs-posts/leverage-ai-agents-in-enterprise-security/ba-p/14267632 Leverage AI Agents in Enterprise Security 2025-11-13T11:03:37.441000+01:00 Prasanth_RJ https://community.sap.com/t5/user/viewprofilepage/user-id/2218098 <H1 id="toc-hId-1635657254"><STRONG>Leveraging AI Agents in Enterprise Security</STRONG></H1><P>As the world of cybersecurity evolves rapidly, the scale and sophistication of attacks are also increasing. Malicious actors are becoming smarter, and with the help of AI, the curation of attacks is advancing. Meanwhile, cybersecurity professionals struggle with alert fatigue and resource shortages. Traditional security tools, reliant on static rules and signature-based detection, are struggling to keep up. This has created a critical gap between the speed of attacks and the response capabilities of human security teams. To address this, enterprises require an advanced security platform that can think, learn, adapt, and respond intelligently.</P><H2 id="toc-hId-1568226468"><STRONG>Security Challenges</STRONG></H2><H3 id="toc-hId-1500795682">Large Alert Volumes (CVE)</H3><P>SIEMs and IDS systems generate thousands of alerts daily, making manual review nearly impossible. Many alerts are noise or false positives. The time to identify and contain a breach averages <STRONG>277 days</STRONG>, costing organizations millions.[1]</P><H3 id="toc-hId-1304282177">Zero-day Attack Vectors</H3><P>Zero-day vulnerabilities are unknown security flaws with no available patches. They are dangerous because attackers can exploit them before defenders have any chance to react.</P><H3 id="toc-hId-1107768672">Human Resource Limitations</H3><P>As environments scale, manual log analysis becomes infeasible. This leads to alert fatigue, causing critical threats to be missed.</P><H3 id="toc-hId-911255167">Blind Spots</H3><P>Complex environments often have limited visibility due to network and endpoint blind spots. Attackers exploit these gaps with tactics like zero-day exploits, ransomware, and social engineering.</P><H3 id="toc-hId-714741662">Delayed Response Time</H3><P>Even after detecting a threat, organizations may take hours or days to respond—significantly increasing damage.</P><H2 id="toc-hId-389145438"><STRONG>Current Implementation in HCM</STRONG></H2><P>Today’s processes rely heavily on traditional DevSecOps methods such as SAST, DAST, IDS/IPS, and vulnerability scanning. These tools are rule-based and require extensive manual review.</P><H3 id="toc-hId-321714652"><STRONG>Security Development &amp; Operations Lifecycle</STRONG></H3><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ANMOL_AGARWAL31_1-1763028125571.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/339989iDBED379ED8C944C6/image-size/large?v=v2&amp;px=999" role="button" title="ANMOL_AGARWAL31_1-1763028125571.png" alt="ANMOL_AGARWAL31_1-1763028125571.png" /></span></P><P>&nbsp;</P><P>Despite integration across the lifecycle, these tools still need significant manual effort and cross-team communication:</P><UL><LI><STRONG>SAST &amp; DAST:</STRONG> More than 70% false positives requiring manual review.</LI><LI><STRONG>Security Controls:</STRONG> Manual remediation even for small changes.</LI><LI><STRONG>Secret Scanners:</STRONG> Find sensitive information in code repositories.</LI><LI><STRONG>CI/CD Automation:</STRONG> Pipeline-dependent, rule-based, requires continuous rule maintenance.</LI></UL><H3 id="toc-hId-125201147"><STRONG>HXM SIEM Process</STRONG></H3><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ANMOL_AGARWAL31_2-1763028177240.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/339990iEBEEC9B3E790F6BC/image-size/large?v=v2&amp;px=999" role="button" title="ANMOL_AGARWAL31_2-1763028177240.png" alt="ANMOL_AGARWAL31_2-1763028177240.png" /></span></P><P>&nbsp;</P><UL><LI>Policy and Security Requirements: BISO</LI><LI>Tooling: SecOps</LI><LI>Response: App/Platform Ops</LI></UL><H2 id="toc-hId-146859280"><STRONG>AI Agents: Autonomous Security Analysts</STRONG></H2><P>An AI agent in cybersecurity is an autonomous system powered by LLMs, ML, and NLP. It perceives logs, network traffic, and user behavior; analyzes threats; and can take predefined actions—without constant human intervention.</P><H2 id="toc-hId--49654225"><STRONG>How AI Agents Work</STRONG></H2><P>AI agents perform multiple roles and can collaborate with other agents or external tools via APIs.</P><H3 id="toc-hId--539570737">Example Roles</H3><UL><LI><STRONG>Threat Hunting &amp; Detection:</STRONG> Detect anomalies and zero-day attacks without rule dependency.</LI><LI><STRONG>Threat Analysis &amp; Correlation:</STRONG> Reduce noise by correlating logs across systems.</LI><LI><STRONG>Automated Response &amp; Patching:</STRONG> Quarantine devices, revoke access, or roll back systems.</LI><LI><STRONG>Forensics:</STRONG> Trace attack origins and impacts.</LI><LI><STRONG>Proactive &amp; Predictive Defense:</STRONG> Identify misconfigurations and predicted attack vectors.</LI></UL><H2 id="toc-hId--442681235"><STRONG>AI Agent Development Frameworks</STRONG></H2><UL><LI><STRONG>LangChain:</STRONG> For multi-step LLM workflows integrating reasoning and tool usage.</LI><LI><STRONG>AutoGen:</STRONG> Microsoft’s framework for multi-agent collaboration.</LI><LI><STRONG>CrewAI:</STRONG> Role-based multi-agent orchestration framework.</LI></UL><H2 id="toc-hId--639194740"><STRONG>What Gaps Can AI Close?</STRONG></H2><H3 id="toc-hId--1129111252">Advanced Threat Detection</H3><P>AI agents detect unknown threats using unsupervised learning, closing gaps in rule-based security tools.</P><H3 id="toc-hId--1325624757">Anomaly Detection &amp; Behavior Analysis</H3><P>Agents establish baseline behavior and flag deviations—catching stealthy attacks that evade traditional detection.</P><H3 id="toc-hId--1522138262">Zero-Day Vulnerability Detection</H3><P>Agents analyze behavior patterns to detect zero-day attacks earlier, giving analysts time to respond.</P><H3 id="toc-hId--1718651767">Real-Time Threat Detection</H3><P>AI filters large SIEM/IDS data streams and reduces false positives, allowing analysts to focus on high-impact events.</P><H3 id="toc-hId--1915165272">Social Engineering &amp; AI-driven Phishing</H3><P>Agents analyze email content, sender reputation, and context to detect highly realistic phishing attempts.</P><H3 id="toc-hId--1943495086">Automating Routine Investigations</H3><P>Agents continuously scan for IOCs and ensure compliance without manual audits.</P><H3 id="toc-hId--2140008591">Incident Response Automation</H3><P>Once a threat is confirmed, agents execute predefined actions such as blocking IPs or isolating endpoints.</P><H2 id="toc-hId--2043119089"><STRONG>Real-World Use Cases</STRONG></H2><UL><LI><STRONG>Microsoft Security Copilot:</STRONG> Phishing triage and vulnerability remediation.[2]</LI><LI><STRONG>CrowdStrike Charlotte AI:</STRONG> Doubles detection triage speed and reduces computational load by 50%.[3]</LI><LI><STRONG>360 Security Agent:</STRONG> Identified and analyzed an APT in 1 minute.[4]</LI><LI><STRONG>Darktrace Antigena:</STRONG> Real-time autonomous device isolation.[5]</LI></UL><P>AI agent adoption spans:</P><UL><LI><STRONG>SOAR platforms</STRONG></LI><LI><STRONG>SOCs</STRONG></LI><LI><STRONG>Endpoint security</STRONG></LI><LI><STRONG>Cloud security</STRONG></LI></UL><H2 id="toc-hId-2055334702"><STRONG>Challenges &amp; Responsible Deployment</STRONG></H2><UL><LI><STRONG>Hallucinations:</STRONG> LLMs may generate incorrect insights.</LI><LI><STRONG>Adversarial Attacks:</STRONG> Agents may be vulnerable to prompt injection or model poisoning.</LI><LI><STRONG>Data Privacy Risks:</STRONG> Continuous monitoring must comply with regulations.</LI><LI><STRONG>Need for Human Oversight:</STRONG> Ethical or critical decisions require human judgment.</LI></UL><P>Responsible deployment requires red-teaming, runtime guardrails, confidential computing, and human-in-the-loop workflows.</P><H2 id="toc-hId-1858821197"><STRONG>Conclusion</STRONG></H2><P>The cybersecurity gap—driven by complex threats and limited human capacity—is one of the biggest challenges of our digital era. AI agents provide unprecedented scale, speed, and intelligence, transforming security from reactive to proactive. With thoughtful governance, AI agents help organizations stay ahead of threats and build a safer digital ecosystem.</P><H3 id="toc-hId-1368904685"><STRONG>References</STRONG></H3><OL><LI>Multi-AI Agent Security Technology (folio3.ai)</LI><LI>Microsoft Security Copilot (windowsnew.ai)</LI><LI>How AI Agents Improve Cybersecurity (nvidia.com)</LI><LI>360 AI Agents – Tencent</LI><LI>Multi-AI Agent Security Technology (foli3.ai)</LI></OL> 2025-11-13T11:03:37.441000+01:00 https://community.sap.com/t5/technology-blog-posts-by-sap/project-foxhound-on-the-scent-of-client-side-web-vulnerabilities/ba-p/14272605 Project Foxhound - on the Scent of Client-Side Web Vulnerabilities 2025-11-19T11:10:41.188000+01:00 Fempel https://community.sap.com/t5/user/viewprofilepage/user-id/10046 <P><SPAN class=""><SPAN class=""><span class="lia-inline-image-display-wrapper lia-image-align-left" image-alt="logo_foxhound.png" style="width: 200px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/342623i26737B2381B0CC35/image-size/small?v=v2&amp;px=200" role="button" title="logo_foxhound.png" alt="logo_foxhound.png" /></span>In this article</SPAN><SPAN class="">,</SPAN><SPAN class=""> we show how the open-source&nbsp;</SPAN></SPAN><A href="https://github.com/SAP/project-foxhound" target="_blank" rel="noopener noreferrer nofollow">Project Foxhound</A><SPAN class=""><SPAN class=""> has evolved </SPAN><SPAN class="">from its </SPAN><SPAN class="">academic </SPAN><SPAN class="">roots </SPAN><SPAN class="">t</SPAN><SPAN class="">o become </SPAN><SPAN class="">the </SPAN></SPAN><A class="" href="https://www.dais.unive.it/~calzavara/papers/www25.pdf" target="_blank" rel="noreferrer noopener nofollow"><SPAN class=""><SPAN class="">best tool</SPAN></SPAN></A><SPAN class=""><SPAN class=""> for discovering client-side security </SPAN><SPAN class="">vulnerabilities.&nbsp;</SPAN></SPAN></P><P><SPAN class=""><SPAN class=""><SPAN class=""><SPAN class="">The most recent </SPAN><SPAN class="">development on this journey is that </SPAN><SPAN class="">Foxhound </SPAN><SPAN class="">was</SPAN><SPAN class=""> selected to appear as part of </SPAN></SPAN><A class="" href="https://www.blackhat.com/eu-25/arsenal/schedule/#project-foxhound-48440" target="_blank" rel="noreferrer noopener nofollow"><SPAN class=""><SPAN class="">Black Hat Arsenal</SPAN><SPAN class=""> 2025</SPAN></SPAN></A><SPAN class=""><SPAN class=""> in London in December! If you are attending the conference, be sure to check out our demo, where we are hoping to reveal some exciting new features and integrations!</SPAN></SPAN><SPAN class="">&nbsp;</SPAN></SPAN></SPAN></P><H4 id="toc-hId-2023679887">&nbsp;</H4><H4 id="toc-hId-1827166382"><SPAN class=""><SPAN class=""><SPAN class=""><SPAN class=""><SPAN class="">Background</SPAN></SPAN></SPAN></SPAN></SPAN></H4><P><SPAN>The world-wide-web is one of the most pervasive innovations of the modern age, underpinning communications, banking, education and business. However, programming flaws or misconfigurations can cause security vulnerabilities, exposing the systems and their data to malicious attackers. According to a recent report from IBM, the </SPAN><A href="https://www.ibm.com/reports/data-breach" target="_blank" rel="noopener nofollow noreferrer"><SPAN>average cost</SPAN></A><SPAN> of a Cybersecurity data breach is $4.4M.</SPAN><SPAN>&nbsp;</SPAN></P><P><SPAN>In recent years, web applications have seen a paradigm shift from on-premise, monolithic server applications, to heterogeneous collections of cloud-based microservices. As such, much of the application logic has shifted from the server to the client, with program logic running as JavaScript code in a user's browser. This shift has brought with it new classes of client-side (or DOM-based) web vulnerabilities, for example:</SPAN><SPAN>&nbsp;</SPAN></P><UL class="lia-list-style-type-disc"><LI><SPAN>Client-Side Cross-Site Scripting (XSS)</SPAN><SPAN>&nbsp;</SPAN></LI><LI><SPAN>Client-Side Cross-Site Request Forgery (CSRF)</SPAN><SPAN>&nbsp;</SPAN></LI><LI><SPAN>Request Hijacking</SPAN><SPAN>&nbsp;</SPAN></LI><LI><SPAN>Markup Injection</SPAN><SPAN>&nbsp;</SPAN></LI></UL><P><SPAN>Most state-of-the-art tools, however, are still focused on detection of their server-side counterparts (such as reflected XSS). Hunting for client-side issues, remains a manual effort, requiring time-intensive and costly penetration tests.</SPAN><SPAN>&nbsp;</SPAN></P><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="image (8).png" style="width: 729px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/342604i0E33F8E07828D261/image-dimensions/729x189?v=v2" width="729" height="189" role="button" title="image (8).png" alt="image (8).png" /></span></P><P><EM>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Figure&nbsp;1: JavaScript vulnerable to client-side XSS</EM></P><H4 id="toc-hId-1630652877">&nbsp;</H4><H4 id="toc-hId-1434139372"><SPAN><SPAN class="">Project </SPAN><SPAN class="">Foxhound</SPAN></SPAN></H4><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="foxhound quote.png" style="width: 651px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/342600i4D673F5B9208373D/image-dimensions/651x250?v=v2" width="651" height="250" role="button" title="foxhound quote.png" alt="foxhound quote.png" /></span></P><P><SPAN class="">This is </SPAN><SPAN class="">where project</SPAN><SPAN class=""> Foxhound come</SPAN><SPAN class="">s</SPAN><SPAN class=""> in </SPAN><SPAN class="">–</SPAN> <SPAN class="">providing </SPAN><SPAN class="">a state-of-the-art</SPAN><SPAN class=""> framework for the detection of client-side web application vulnerabilities. It has seen a wide range of proven </SPAN><SPAN class="">use-cases</SPAN><SPAN class="">, from academic studies to industrial-scale dynamic testing and even education.</SPAN></P><H4 id="toc-hId-1237625867"><STRONG><SPAN class=""><SPAN class=""><SPAN class=""><SPAN class="">Features</SPAN></SPAN></SPAN></SPAN></STRONG></H4><P><SPAN>Foxhound is a modified web browser based on Firefox with the following enhancements:</SPAN><SPAN>&nbsp;</SPAN></P><UL class="lia-list-style-type-disc"><LI><SPAN>An instrumented JavaScript engine and content model to track insecure data-flows using dynamic taint-tracking.&nbsp;</SPAN><SPAN>&nbsp;</SPAN></LI><LI><SPAN>Taint tracking makes it possible to automatically detect client-side vulnerabilities by </SPAN><I><SPAN>tainting</SPAN></I><SPAN> certain attacker-controlled strings, e.g., </SPAN><SPAN>location.hash</SPAN><SPAN>, and notifying the user when tainted data reaches a sensitive sink, e.g., </SPAN><SPAN>eval()</SPAN><SPAN> or </SPAN><SPAN>.innerHTML</SPAN><SPAN>.</SPAN><SPAN>&nbsp;</SPAN></LI><LI><SPAN>Foxhound also tracks a history of operations performed on the string at runtime, allowing automatic detection of potential input sanitization which essentially reduces false positives.</SPAN><SPAN>&nbsp;</SPAN></LI><LI><SPAN>Integration with popular browser automation frameworks, such as Selenium and Playwright.&nbsp;</SPAN><SPAN>&nbsp;</SPAN></LI></UL><H4 id="toc-hId-1041112362"><SPAN><SPAN class=""><SPAN class="">History</SPAN></SPAN><SPAN class="">&nbsp;</SPAN></SPAN></H4><P><SPAN>The technology for Foxhound was conceived at SAP Security Research </SPAN><A href="https://swag.cispa.saarland/papers/lekies2013flows.pdf" target="_blank" rel="noopener nofollow noreferrer"><SPAN>back in 2013</SPAN></A><SPAN>, where it was successfully used to discover that at least 10% of web applications are vulnerable to cross-site scripting. This paper spawned multiple follow-ups, with many research groups implementing their own instrumented browsers, which is not a trivial task!</SPAN><SPAN>&nbsp;</SPAN></P><P><SPAN>We saw the need in the community for an open-source, up-to-date tool for teams to use as a platform for their own research. This gap was the main inspiration to open-source our implementation, which was released in 2022 – and Foxhound was born!&nbsp;</SPAN><SPAN>&nbsp;</SPAN></P><P><SPAN>Since then, the Foxhound community has grown from the initial founders at SAP and the <A href="https://www.tu-braunschweig.de/en/ias" target="_self" rel="nofollow noopener noreferrer">University of Braunschweig</A> and is currently in use by groups at CISPA (Germany), Waterloo (Canada), and Venice (Italy). With the support of the SAP Open Source team, the project has evolved and matured, appearing in podcasts, at conferences, and even has a new logo!</SPAN><SPAN>&nbsp;</SPAN></P><P><SPAN>Foxhound has also proven its worth in industry, with SAP using it to dynamically test UI5 applications since 2023 as part of the </SPAN><A href="https://www.csoonline.com/article/3541180/sap-se-revamps-application-security-scanning-using-simulation-and-automation-2.html" target="_blank" rel="noopener nofollow noreferrer"><SPAN>award-winning FioriDAST tool</SPAN></A><SPAN>.</SPAN><SPAN>&nbsp;</SPAN></P><H4 id="toc-hId-844598857"><SPAN><SPAN class=""><SPAN class="">Why Foxhound?!</SPAN></SPAN><SPAN class="">&nbsp;</SPAN></SPAN></H4><P><SPAN>Foxhound offers several advantages over existing tools and techniques to outperform the competition. Firstly, as Foxhound uses dynamic testing, it benefits from lower false positives and higher accuracy compared to static analysis techniques. Secondly, Foxhound is non-invasive and does not require actively probing an application with potentially harmful and inaccurate payloads.</SPAN><SPAN>&nbsp;</SPAN></P><P><SPAN>In fact, </SPAN><A href="https://www.dais.unive.it/~calzavara/papers/www25.pdf" target="_blank" rel="noopener nofollow noreferrer"><SPAN>a recent independent academic study</SPAN></A><SPAN> found that Foxhound was the best tool for dynamic JavaScript analysis. To quote the paper: </SPAN><I><SPAN>"the only effective solution given the current state of the art is Project Foxhound."</SPAN></I><SPAN>&nbsp;</SPAN></P><P><SPAN><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="undefined.png" style="width: 903px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/342602i30D606B450364532/image-size/large?v=v2&amp;px=999" role="button" title="undefined.png" alt="undefined.png" /></span></SPAN></P><P><EM>&nbsp;<SPAN class=""><SPAN class="">Figure </SPAN></SPAN><SPAN class=""><SPAN class=""><SPAN class="">2</SPAN></SPAN></SPAN><SPAN class=""><SPAN class="">: Foxhound hard at work detecting </SPAN><SPAN class="">a cross-site scripting vulnerability at </SPAN></SPAN><A class="" href="https://domgo.at/" target="_blank" rel="noreferrer noopener nofollow"><SPAN class=""><SPAN class="">https://domgo.at</SPAN></SPAN></A><SPAN class=""><SPAN class="">&nbsp;</SPAN></SPAN><SPAN class="">&nbsp;</SPAN></EM></P><H4 id="toc-hId-648085352">&nbsp;</H4><H4 id="toc-hId-451571847"><SPAN><SPAN class=""><SPAN class="">Find out More</SPAN></SPAN><SPAN class="">&nbsp;</SPAN></SPAN></H4><P><SPAN>The next opportunity to experience Foxhound live and meet the team in person will be at </SPAN><A href="https://www.blackhat.com/eu-25/arsenal/schedule/#project-foxhound-48440" target="_blank" rel="noopener nofollow noreferrer"><SPAN>Black Hat Europe</SPAN></A><SPAN>, where Foxhound has been selected to appear as part of the Arsenal program. So be sure to pass by our booth to check out the latest features!</SPAN><SPAN>&nbsp;</SPAN></P><P><SPAN>If you can’t make it to Black Hat, but are still interested in the project, check out the following links:</SPAN><SPAN>&nbsp;</SPAN></P><UL><LI><SPAN>The best place to find out more is on our </SPAN><A href="https://github.com/SAP/project-foxhound" target="_blank" rel="noopener nofollow noreferrer"><SPAN>GitHub repository</SPAN></A><SPAN> where we also manage development via issues and pull requests and actions.</SPAN><SPAN>&nbsp;</SPAN></LI><LI><SPAN>Binaries for selected platforms are provided by the University of Braunschweig on a </SPAN><A href="https://foxhound.ias.tu-bs.de/" target="_blank" rel="noopener nofollow noreferrer"><SPAN>dedicated server</SPAN></A><SPAN>.</SPAN><SPAN>&nbsp;</SPAN></LI><LI><SPAN>More resources include </SPAN><A href="https://github.com/SAP/project-foxhound/wiki/Publications" target="_blank" rel="noopener nofollow noreferrer"><SPAN>academic papers</SPAN></A><SPAN>, talks at </SPAN><A href="https://youtu.be/iZ8F1h51zas?feature=shared" target="_blank" rel="noopener nofollow noreferrer"><SPAN>IEEE S&amp;P 2025</SPAN></A><SPAN> and the </SPAN><A href="https://media.ccc.de/v/god2024-56282-protecting-web-application" target="_blank" rel="noopener nofollow noreferrer"><SPAN>German OWASP day,</SPAN></A><SPAN> and even a </SPAN><A href="https://podcast.opensap.info/open-source-way/2023/10/25/project-foxhound-hunting-cross-site-scripting-on-the-web/" target="_blank" rel="noopener nofollow noreferrer"><SPAN>Podcast</SPAN></A><SPAN>!</SPAN><SPAN>&nbsp;</SPAN></LI></UL><P><STRONG>Authors of this Article</STRONG></P><UL><LI><SPAN>Thomas Barber, Product Security Expert, SAP BTP</SPAN></LI><LI><SPAN>Ulrike Fempel, SAP Open Source Program Office</SPAN></LI></UL> 2025-11-19T11:10:41.188000+01:00 https://community.sap.com/t5/technology-blog-posts-by-sap/introducing-application-vulnerability-report-for-cloudfoundry-applications/ba-p/14281684 Introducing Application Vulnerability Report for Cloudfoundry Applications – Try It Now! 2025-12-02T08:25:25.852000+01:00 Yogananda https://community.sap.com/t5/user/viewprofilepage/user-id/75 <TABLE border="1" width="100%"><TBODY><TR><TD width="100%"><P class="lia-align-center" style="text-align: center;"><FONT color="#993300"><STRONG>Application Vulnerability Report Service is currently in Beta Phase&nbsp;<BR />Try it out and provide feedback on your observations<BR />SAP Technical Support Ticket Component : <FONT color="#0000FF">BC-CP-SEC-AVR</FONT></STRONG></FONT></P></TD></TR></TBODY></TABLE><H3 id="toc-hId-1895491145"><STRONG>What Is Application Vulnerability Report?</STRONG></H3><P>Security is a top priority in today’s digital landscape, especially when applications rely heavily on open-source components. These components, while powerful and cost-effective, often come with publicly known vulnerabilities that can put your business data at risk.</P><P>The <STRONG>Application Vulnerability Report</STRONG> is a newly introduced feature for <STRONG>SAP Business Technology Platform (BTP)</STRONG> services that helps you <STRONG>detect and remediate vulnerabilities in your Cloud Foundry applications</STRONG>. This tool scans your application for known security issues based on <STRONG>Common Vulnerabilities and Exposures (CVEs)</STRONG>, ensuring that you stay ahead of potential threats.<BR /><BR /><STRONG>Currently in Beta Phase and available in eu-10 region</STRONG>.. Once Beta Phase is completed.. roll-out to other regions are expected in Q1 or Q2 2026.</P><H3 id="toc-hId-1698977640"><FONT color="#FF6600">How to enable in your tenant ?</FONT></H3><P><STRONG>Go to Entitlements in your SAP BTP Sub-account to add <FONT color="#800080">Application Vulnerability Report</FONT> to add the plans</STRONG><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="2025-12-02_07-58-18.png" style="width: 872px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/347349i7738C4E67E3A7A98/image-size/large?v=v2&amp;px=999" role="button" title="2025-12-02_07-58-18.png" alt="2025-12-02_07-58-18.png" /></span></P><H3 id="toc-hId-1502464135">Service Marketplace</H3><P><SPAN>Search for&nbsp;</SPAN><SPAN class="">application-vulnerability-report-service</SPAN><SPAN>&nbsp;in the SAP BTP&nbsp;</SPAN><SPAN class="">Service Marketplace </SPAN><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="2025-12-02_07-59-10.png" style="width: 896px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/347351iFA4CF76136F80CA0/image-size/large?v=v2&amp;px=999" role="button" title="2025-12-02_07-59-10.png" alt="2025-12-02_07-59-10.png" /></span></P><H3 id="toc-hId-1305950630">Create Instance in your Cloud Foundry space</H3><UL><LI>Go to your Cloud Foundry Space (example : Dev, UAT, TST...etc)</LI><LI>Create a new Instance for <STRONG>Application Vulnerability Report</STRONG> with default plan</LI><LI>Provide a Instance Name</LI></UL><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="2025-12-02_08-32-48.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/347352i842A08BDE0279914/image-size/large?v=v2&amp;px=999" role="button" title="2025-12-02_08-32-48.png" alt="2025-12-02_08-32-48.png" /></span></P><H3 id="toc-hId-1109437125"><SPAN>Create Service Key</SPAN></H3><UL><LI><SPAN>Create a New Service Key for API Access</SPAN></LI></UL><P><SPAN><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="2025-12-02_08-34-24.png" style="width: 824px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/347353i27C3C5AE2AFC001C/image-size/large?v=v2&amp;px=999" role="button" title="2025-12-02_08-34-24.png" alt="2025-12-02_08-34-24.png" /></span></SPAN></P><H3 id="allow-the-user-to-access-the-space" id="toc-hId-912923620"><SPAN>Allow the User to Access the Space</SPAN></H3><P><SPAN>You need to manually add the&nbsp;application-vulnerability-report-scanner@sap.com&nbsp;user to your Cloud Foundry space. This enables the&nbsp;<SPAN class="">application vulnerability report</SPAN>&nbsp;to download the droplets of the respective applications and scan them accordingly.</SPAN></P><OL><LI>Log on to the CF space that you want to scan.</LI><LI>Select the<SPAN>&nbsp;</SPAN><SPAN class="">Space Members</SPAN><SPAN>&nbsp;</SPAN>tab and choose<SPAN>&nbsp;</SPAN><SPAN class="">Add Member</SPAN>.</LI><LI>Enter the<SPAN>&nbsp;</SPAN>application-vulnerability-report-scanner@sap.com<SPAN>&nbsp;</SPAN>user and assign the<SPAN>&nbsp;</SPAN><SPAN class="">Space Auditor</SPAN><SPAN>&nbsp;</SPAN>role to it.</LI></OL><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="2025-12-02_08-41-38.png" style="width: 956px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/347355i171C8D88B9EADC90/image-size/large?v=v2&amp;px=999" role="button" title="2025-12-02_08-41-38.png" alt="2025-12-02_08-41-38.png" /></span></P><H3 id="toc-hId-716410115"><STRONG>Why Is This Important?</STRONG></H3><P>Open-source vulnerabilities are one of the most frequent security challenges in modern application development. Attackers are quick to exploit these weaknesses, and failing to address them promptly can lead to severe consequences, including data breaches and compliance violations.</P><P>By using the Application Vulnerability Report, you can:</P><UL><LI><STRONG>Identify vulnerabilities early</STRONG> in your application lifecycle.</LI><LI><STRONG>Understand the severity</STRONG> of each issue based on CVE data.</LI><LI><STRONG>Take corrective actions quickly</STRONG> to secure your SAP BTP landscape.</LI></UL><H3 id="toc-hId-519896610">&nbsp;</H3><H3 id="toc-hId-323383105"><FONT color="#800080"><SPAN class="">Application Vulnerability Report</SPAN><SPAN>&nbsp; - Process overview</SPAN></FONT></H3><P><FONT color="#000000"><SPAN>The&nbsp;<SPAN class="">application vulnerability report</SPAN>&nbsp;supports you in the detection of vulnerabilities in custom applications during runtime. Instead of a shift-left support approach during pipeline runs, this service provides security-relevant information for what has already been deployed (and maybe forgotten). The service scans the applications using a proprietary scanning layer that utilizes open-source scanners such as Open Source Vulnerabilities (OSV) and trivy, as well as custom SAP BTP-specific and 0-day exploit targeted scanners. This unique combination offers a very broad and up-to-date coverage of vulnerabilities in your applications. By using an API, you can integrate the report data into your incident and security workflow.</SPAN></FONT></P><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="jpeg (1)1764659722.png" style="width: 666px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/347350iF7393CD884DAB60E/image-size/large?v=v2&amp;px=999" role="button" title="jpeg (1)1764659722.png" alt="jpeg (1)1764659722.png" /></span></P><H3 id="toc-hId-126869600"><FONT color="#FF00FF">Overview of the each Process flow</FONT></H3><H4 id="toc-hId--438278281"><STRONG>1. Applications Running on SAP BTP</STRONG></H4><UL><LI>This is the starting point.</LI><LI>It includes all your <STRONG>Cloud Foundry applications</STRONG> deployed on SAP Business Technology Platform.</LI><LI>Example : CAP, Python, Javascript, Java, Go, Dot-Net... any programming languages those are deployed in your Space.. (This also includes NPM Libraries, Pip libraries or any libraries which are consumed in your applications)</LI><LI>These applications often use <STRONG>open-source libraries and packages</STRONG>, which can have vulnerabilities.</LI></UL><HR /><H4 id="toc-hId--634791786"><STRONG>2. Scanning Layer</STRONG></H4><P>This layer performs the <STRONG>security scans</STRONG> on your applications. It's currently runs weekly scan. It consists of multiple scanning sources:</P><UL><LI><P><FONT color="#FF00FF"><STRONG>Commercial</STRONG></FONT><BR />Uses commercial vulnerability databases and tools to identify known issues.</P></LI><LI><P><FONT color="#FF00FF"><STRONG>Trivy/OSV</STRONG></FONT><BR /><STRONG>Trivy</STRONG> is an open-source vulnerability scanner, and <STRONG>OSV</STRONG> (Open Source Vulnerabilities) is a database of vulnerabilities in open-source software.<BR />These help detect issues in widely used open-source components.</P></LI><LI><P><FONT color="#FF00FF"><STRONG>BTP Specific</STRONG></FONT><BR />Scans for vulnerabilities specific to <STRONG>SAP BTP services and configurations</STRONG>, ensuring platform-level security.</P></LI><LI><P><FONT color="#FF00FF"><STRONG>0 Day</STRONG></FONT><BR />Focuses on <STRONG>zero-day vulnerabilities</STRONG>, which are newly discovered and not yet patched.<BR />These are critical because attackers often exploit them quickly.</P></LI></UL><HR /><H4 id="toc-hId--831305291"><STRONG>3. Application Vulnerability Report for SAP BTP</STRONG></H4><UL><LI>After scanning, all findings are consolidated into a <STRONG>single report</STRONG>.</LI><LI>This report provides:<UL><LI><STRONG>List of vulnerabilities</STRONG></LI><LI><STRONG>Severity levels</STRONG></LI><LI><STRONG>Recommendations for remediation</STRONG></LI></UL></LI><LI>It acts as a <STRONG>centralized dashboard</STRONG> for security insights.</LI></UL><HR /><H4 id="toc-hId--1027818796"><STRONG>4. API for Customers</STRONG></H4><UL><LI>Customers can <STRONG>access the report via API</STRONG>.</LI><LI>This allows integration with:<UL><LI><STRONG>Security dashboards</STRONG></LI><LI><STRONG>CI/CD pipelines</STRONG></LI><LI><STRONG>Monitoring tools</STRONG></LI></UL></LI><LI>Ensures automation and continuous security checks.</LI></UL><HR /><H4 id="toc-hId--1224332301"><STRONG>5. Customers</STRONG></H4><UL><LI>End-users (developers, security teams) consume the report and take <STRONG>corrective actions</STRONG> to secure applications.</LI></UL><P>&nbsp;</P><H4 id="toc-hId--1420845806"><FONT color="#FF00FF">Technical Usage</FONT><BR /><BR />How to get findings of your deployed CF applications running.<span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="2025-12-02_09-43-39.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/347367i3495E311BCED4211/image-size/large?v=v2&amp;px=999" role="button" title="2025-12-02_09-43-39.png" alt="2025-12-02_09-43-39.png" /></span></H4><P><STRONG>Example : Scanned Finding Report</STRONG><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="2025-12-03_09-06-34.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/347835i8D868D2DC99AE3FB/image-size/large?v=v2&amp;px=999" role="button" title="2025-12-03_09-06-34.png" alt="2025-12-03_09-06-34.png" /></span></P><P>&nbsp;</P><H3 id="toc-hId--1323956304">Reference:</H3><UL><LI><A href="https://help.sap.com/docs/application-vulnerability-report/application-vulnerability-report-e02c6e1a86544ce981810c8c8a12e750/initial-setup" target="_self" rel="noopener noreferrer">Initial Setup Process</A></LI><LI><A href="https://help.sap.com/docs/application-vulnerability-report/application-vulnerability-report-e02c6e1a86544ce981810c8c8a12e750/authentication" target="_self" rel="noopener noreferrer">Authentication Process</A></LI><LI><A href="https://help.sap.com/docs/application-vulnerability-report/application-vulnerability-report-e02c6e1a86544ce981810c8c8a12e750/auditing-and-logging-information" target="_self" rel="noopener noreferrer">Audit Logging Process</A></LI><LI><A href="https://roadmaps.sap.com/board?PRODUCT=73554900100800006073&amp;range=CURRENT-LAST" target="_self" rel="noopener noreferrer">Roadmap for AVR</A></LI></UL><H3 id="toc-hId--1520469809">External resource:</H3><UL><LI><A href="https://osv.dev/" target="_self" rel="nofollow noopener noreferrer">OSV database&nbsp;</A></LI></UL> 2025-12-02T08:25:25.852000+01:00 https://community.sap.com/t5/technology-blog-posts-by-sap/beta-version-of-application-vulnerability-report-for-sap-btp-now-available/ba-p/14283839 Beta Version of Application Vulnerability Report for SAP BTP Now Available 2025-12-04T14:18:40.970000+01:00 Fabian_Richter https://community.sap.com/t5/user/viewprofilepage/user-id/1859514 <P><SPAN class="">Earlier this month, we released the application vulnerability report&nbsp;(beta)&nbsp;for SAP Business Technology Platform (SAP BTP).&nbsp;You can use this new service&nbsp;to detect and remediate&nbsp;open-source&nbsp;application&nbsp;vulnerabilities in your&nbsp;SAP&nbsp;BTP&nbsp;deployed&nbsp;applications.</SPAN><SPAN class="">&nbsp;</SPAN></P><H2 id="toc-hId-1766469780"><STRONG><SPAN>What&nbsp;is this new service all about?</SPAN></STRONG><SPAN>&nbsp;</SPAN></H2><P><SPAN>Frequent security issues in&nbsp;open-source&nbsp;components endanger business data in customer deployed applications. Customers&nbsp;are responsible&nbsp;for&nbsp;performing&nbsp;vigilant&nbsp;patch&nbsp;and vulnerability management. By&nbsp;leveraging&nbsp;the&nbsp;new&nbsp;application&nbsp;vulnerability&nbsp;report&nbsp;for SAP BTP,&nbsp;open-source&nbsp;vulnerabilities&nbsp;in your Cloud Foundry applications&nbsp;can be detected and remediated.&nbsp;It's&nbsp;crucial to&nbsp;fix&nbsp;such vulnerabilities quickly,&nbsp;as attackers are&nbsp;usually&nbsp;aware of them and might try to break into vulnerable systems.</SPAN><SPAN>&nbsp;</SPAN></P><H2 id="toc-hId-1569956275"><STRONG><SPAN>What does the new application vulnerability report service offer you?</SPAN></STRONG><SPAN>&nbsp;</SPAN></H2><P><SPAN>The application vulnerability report supports you in the detection of vulnerabilities in custom applications during runtime.&nbsp;It enables you to act&nbsp;on criticality and other provided vulnerability details, like mitigation recommendations.&nbsp;</SPAN><SPAN>&nbsp;</SPAN></P><P><SPAN>If we take a closer look at the process, the service scans the applications using a proprietary scanning layer that&nbsp;utilizes&nbsp;open-source scanners as well as custom SAP BTP-specific and 0-day exploit targeted scanners.&nbsp;This unique combination offers&nbsp;a very broad&nbsp;and up-to-date coverage of vulnerabilities in your applications.&nbsp;By using an API, you can also integrate the report data into your incident and security workflow.</SPAN><SPAN>&nbsp;</SPAN></P><P><SPAN>Let’s&nbsp;have a quick look at the architecture overview:</SPAN><SPAN>&nbsp;</SPAN></P><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="Fabian_Richter_0-1764845089098.png" style="width: 400px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/348480iF8F3D2E11CE07ED0/image-size/medium?v=v2&amp;px=400" role="button" title="Fabian_Richter_0-1764845089098.png" alt="Fabian_Richter_0-1764845089098.png" /></span></P><P class="lia-align-center" style="text-align: center;"><I><SPAN>Application Vulnerability Report&nbsp;for SAP BTP&nbsp;– Architecture Overview</SPAN></I><SPAN>&nbsp;</SPAN></P><H2 id="toc-hId-1373442770"><STRONG><SPAN>Get started now!</SPAN></STRONG><SPAN>&nbsp;</SPAN></H2><P><SPAN>You can find lots of useful information in this practical hands-on blog&nbsp;post:</SPAN><SPAN>&nbsp;</SPAN></P><P><A href="https://community.sap.com/t5/technology-blog-posts-by-sap/introducing-application-vulnerability-report-for-cloudfoundry-applications/ba-p/14281684" target="_blank"><SPAN>Introducing Application Vulnerability Report for Cloud Foundry Applications – Try It Now!</SPAN></A><SPAN>&nbsp;</SPAN></P><P><SPAN>The complete documentation&nbsp;is available&nbsp;on&nbsp;</SPAN><A href="https://help.sap.com/docs/application-vulnerability-report?locale=en-US" target="_blank" rel="noopener noreferrer"><SPAN>SAP Help Portal</SPAN></A><SPAN>.</SPAN><SPAN>&nbsp;</SPAN></P><P><SPAN>Please&nbsp;note&nbsp;that this is a&nbsp;</SPAN><STRONG><SPAN>beta service</SPAN></STRONG><SPAN>&nbsp;available on SAP BTP for subaccounts in trial and enterprise accounts.&nbsp;It is currently available&nbsp;in the “cf-eu10” landscape.&nbsp;Once&nbsp;the beta&nbsp;phase is completed, we plan to&nbsp;roll out&nbsp;the service to other regions.</SPAN><SPAN>&nbsp;</SPAN></P><P><SPAN>If you are interested in&nbsp;what’s&nbsp;more to come, check out the road map in&nbsp;</SPAN><A href="https://roadmaps.sap.com/board?PRODUCT=73554900100800006073&amp;range=CURRENT-LAST" target="_blank" rel="noopener noreferrer"><SPAN>SAP Road Map Explorer</SPAN></A><SPAN>.</SPAN><SPAN>&nbsp;</SPAN></P><P><SPAN>Try it out,&nbsp;and we look forward to your feedback!</SPAN><SPAN>&nbsp;</SPAN></P><P><SPAN>&nbsp;</SPAN></P><P><STRONG><SPAN>Also&nbsp;make sure to&nbsp;join&nbsp;our community&nbsp;to&nbsp;learn more about the security services and features in SAP Business Technology Platform here:</SPAN></STRONG><SPAN>&nbsp;</SPAN></P><P><A href="https://community.sap.com/topics/btp-security" target="_blank"><STRONG><SPAN>https://community.sap.com/topics/btp-security</SPAN></STRONG></A><SPAN>&nbsp;</SPAN></P> 2025-12-04T14:18:40.970000+01:00 https://community.sap.com/t5/technology-blog-posts-by-sap/building-secure-sapui5-applications-best-practices-for-developers/ba-p/14267269 Building Secure SAPUI5 Applications: Best Practices for Developers 2025-12-10T08:16:09.335000+01:00 Manisha_19 https://community.sap.com/t5/user/viewprofilepage/user-id/1695623 <H3 id="toc-hId-1893818948"><STRONG>Introduction</STRONG></H3><P>In today’s enterprise landscape, security is fundamental, not optional. As the user-facing gateway to SAP systems, SAPUI5 apps must be built with security in mind from the start.</P><P>This blog shares practical, developer-focused techniques to help you secure your SAPUI5 applications from input validation and Cross-Site Scripting (XSS) prevention to using ESLint and safe communication practices. By adopting secure coding habits early, you can ensure your UI remains clean, efficient, and resilient against modern threats.</P><H3 id="toc-hId-1697305443"><STRONG>Why Security Matters in SAPUI5</STRONG></H3><P>The UI layer is where users interact, input data, and access sensitive information.<BR />Even a small oversight like an unsanitized binding or debug log can lead to security exposure or data misuse.</P><P>By following secure UI5 coding standards, developers can:</P><UL><LI>Maintain data integrity and confidentiality</LI><LI>Prevent unauthorized access</LI><LI>Build user trust through reliable and safe design</LI></UL><H3 id="toc-hId-1500791938"><STRONG>Secure Coding Practices for SAPUI5 Developers</STRONG></H3><P><STRONG>1. Validate and Sanitize User Input</STRONG></P><P>Always validate what users enter before sending it to your backend.</P><UL><LI>Use data types in input fields for built-in validation:</LI></UL><pre class="lia-code-sample language-markup"><code>&lt;Input value="{path: 'age', type: 'sap.ui.model.type.Integer'}" /&gt;</code></pre><UL><LI>Add custom formatters or validators for domain-specific logic.</LI><LI>Reject invalid inputs early, don’t rely on the backend to catch them.</LI></UL><P><STRONG>&nbsp;2.&nbsp;</STRONG><STRONG>Prevent Cross-Site Scripting (XSS)</STRONG></P><P>XSS attacks occur when untrusted input is rendered as executable code in the browser.<BR />To prevent it in UI5:</P><UL><LI>Use <STRONG>Text</STRONG> control instead of <STRONG>FormattedText</STRONG> unless the content is sanitized.</LI><LI>Escape dynamic strings using encodeHTML().</LI><LI>Avoid direct DOM manipulation like innerHTML or jQuery .html().</LI><LI>Never include untrusted HTML in views or models.</LI></UL><P><STRONG>&nbsp;3.&nbsp;</STRONG><STRONG>Protect Sensitive Information</STRONG></P><UL><LI>Do <STRONG>not</STRONG> store tokens, passwords, or system URLs in <STRONG>localStorage</STRONG> or <STRONG>sessionStorage</STRONG>.</LI><LI>Avoid exposing business logic or identifiers in console logs.</LI><LI>Remove debug logs before deployment as they often reveal internal system details.</LI></UL><P><STRONG>&nbsp;4.&nbsp;</STRONG><STRONG>Use ESLint for Secure and Consistent Code&nbsp; </STRONG></P><P>Static code analysis helps detect vulnerabilities and enforces coding standards.</P><P>Install and configure ESLint with SAP’s recommended rules:</P><pre class="lia-code-sample language-bash"><code>npm install eslint eslint-config-ui5 --save-dev</code></pre><P>Create a .eslintrc.json file:</P><pre class="lia-code-sample language-json"><code>{ "extends": ["eslint-config-ui5"] }</code></pre><P><STRONG>Benefits:</STRONG></P><UL><LI>Detects unsafe DOM access or unused imports</LI><LI>Prevents insecure practices like eval statements</LI><LI>Promotes consistent, readable, and maintainable code</LI></UL><P>Run ESLint regularly as part of your build or CI pipeline:</P><pre class="lia-code-sample language-bash"><code>eslint .</code></pre><P><STRONG>&nbsp;5.&nbsp;</STRONG><STRONG>Secure Communication with Backend</STRONG></P><P>Even though backend services handle authentication, the UI must communicate securely.</P><UL><LI>Always use <STRONG>HTTPS</STRONG> for service endpoints.</LI><LI>Avoid hardcoding URLs use destination configurations or environment variables.</LI><LI>Enable <STRONG>Cross-Site Request Forgery</STRONG> <STRONG>(CSRF) protection</STRONG>&nbsp;in your ODataModel configuration:</LI></UL><pre class="lia-code-sample language-javascript"><code>let oModel = new sap.ui.model.odata.v2.ODataModel("/odata/service", { tokenHandling: true });</code></pre><H3 id="toc-hId-1304278433"><STRONG>Developer Mindset: Security as a Habit</STRONG></H3><P>Security isn’t a one-time setup, it’s an ongoing practice.<BR />Adopt a security-first mindset by:</P><UL><LI>Reviewing code with security in mind</LI><LI>Regularly updating libraries and dependencies</LI><LI>Integrating linting and vulnerability scans in CI/CD</LI></UL><P>When security becomes part of your coding routine, your applications naturally grow more resilient and trustworthy.</P><H3 id="toc-hId-1107764928"><STRONG>Conclusion</STRONG></H3><P>Building secure SAPUI5 applications isn’t just about backend policies, it starts right in your controllers, bindings, and XML views.<BR />By validating inputs, preventing XSS, protecting sensitive data, and using tools like ESLint, you strengthen your application’s defense without compromising usability or performance.</P> 2025-12-10T08:16:09.335000+01:00 https://community.sap.com/t5/technology-blog-posts-by-sap/new-version-8-6-of-the-sap-cryptographic-library-with-quantum-safe/ba-p/14280039 New version 8.6 of the SAP Cryptographic Library with quantum-safe cryptography and FIPS 140-3 mode 2025-12-12T17:10:56.764000+01:00 Christian_Cohrs1 https://community.sap.com/t5/user/viewprofilepage/user-id/181868 <H3 id="toc-hId-1895455438">Overview</H3><P>The SAP Cryptographic Library enables applications like SAP S/4 HANA to support security protocols such as TLS (Transport Layer Security), SNC (Secure Network Communication), SSF (Secure Store and Forward) and X.509. While the library already includes "modern" cryptographic algorithms such as those based on Elliptic Curve Cryptography, these were until now all part of the group of "classic" algorithms.&nbsp;</P><P>Most "classic" algorithms for asymmetric cryptography are vulnerable when a cryptographically relevant quantum computer becomes reality. This might have an impact even today if attackers record encrypted communication and store it for later decryption ("harvest-now-decrypt-later").&nbsp;</P><H3 id="toc-hId-1698941933">Quantum-safe cryptography in the SAP Cryptographic Library</H3><P>The new version 8.6 of the library enables support for a quantum-safe TLS 1.3 handshake. When the library is installed on an SAP NetWeaver ABAP system and TLS 1.3 is used to establish a connection, then a&nbsp;hybrid ECDHE-MLKEM key agreement based on X25519MLKEM768 takes place. ML-KEM is a new, quantum-safe algorithm for key encapsulation, which was already standardized as FIPS-203. This makes it impossible, even for a quantum computer, to determine the session key and decrypt the session communication.&nbsp;</P><H3 id="toc-hId-1502428428">New FIPS 140-3 certification of the FIPS crypto kernel</H3><P><span class="lia-inline-image-display-wrapper lia-image-align-left" image-alt="FIPS 140-3 Logo Color.jpg" style="width: 200px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/346969iB07BD5CD89083833/image-size/small/is-moderation-mode/true?v=v2&amp;px=200" role="button" title="FIPS 140-3 Logo Color.jpg" alt="FIPS 140-3 Logo Color.jpg" /></span></P><P>FIPS stands for Federal Information Processing Standard.&nbsp;A FIPS certification is required by US public sector agencies, healthcare, and financial industries, and many more. FIPS 140-3 validates the proper implementation of the algorithms in cryptographic modules.</P><P>The FIPS crypto kernel is a dedicated module in the SAP Cryptographic Library that was recently certified as compliant with FIPS 140-3. The certificate is available from the National Institute of Standards and Technology (NIST):&nbsp;<A href="https://csrc.nist.gov/projects/cryptographic-module-validation-program/certificate/5093" target="_self" rel="nofollow noopener noreferrer">Certificate #5093</A>.</P><P>For SAP Application Server ABAP and SAP HANA,&nbsp;<A href="https://me.sap.com/notes/2180024" target="_self" rel="noopener noreferrer">SAP note 2180024</A> explains the configuration steps that are required to switch the SAP Cryptographic Library to FIPS mode.</P><H3 id="toc-hId-1305914923">Release Details</H3><P>The release note "<A href="https://me.sap.com/notes/3685428" target="_self" rel="noopener noreferrer">3685428 - Fixes and features in CommonCryptoLib 8.6.2</A>" has now been published. More information about the SAP Cryptographic Library is available in "<A href="https://me.sap.com/notes/1848999" target="_self" rel="noopener noreferrer">1848999 - Central Note for CommonCryptoLib 8 (SAPCRYPTOLIB)</A>".</P> 2025-12-12T17:10:56.764000+01:00 https://community.sap.com/t5/technology-blog-posts-by-sap/sap-integrated-business-planning-on-demand-stay-secure-with-sap-earlywatch/ba-p/14293573 SAP Integrated Business Planning On Demand - Stay Secure with SAP EarlyWatch Alert 2025-12-19T06:11:34.454000+01:00 marcus_trehy https://community.sap.com/t5/user/viewprofilepage/user-id/1446930 <P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="Security with SAP IBP OD.jpg" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/353883iAAD057987323660A/image-size/large/is-moderation-mode/true?v=v2&amp;px=999" role="button" title="Security with SAP IBP OD.jpg" alt="Security with SAP IBP OD.jpg" /></span></P><P>With SAP Integrated Business Planning On Demand, SAP takes care of many security-related topics as cloud provider. However, in order to stay secure, customers are still responsible for the mitigation of risks such as business or technical users having critical authorizations.</P><P><SPAN>Here, the&nbsp;</SPAN><A href="https://community.sap.com/t5/c-khhcw49343/SAP+EarlyWatch+Alert/pd-p/f811a31e-b1e7-42ac-9f17-9051d8410d93" target="_self">SAP EarlyWatch Alert</A><SPAN>&nbsp;report in&nbsp;</SPAN><A href="https://community.sap.com/t5/c-khhcw49343/SAP+for+Me/pd-p/e1868089-7a3a-410f-8dcc-3f2380ed5fa4" target="_self">SAP for Me</A><SPAN>&nbsp;</SPAN><SPAN>comes into play as it gives you insights into security risks in the chapter "Security (SAP IBP OD)". This chapter provides insights and alerts you on the following topics:</SPAN></P><UL><LI><STRONG>Assignment of Users to Business Role SAP_BR_ADMINISTRATOR</STRONG> - check for usage of this role in production, leading to segregation of duties (SoD) conflicts as it is intended only for initial system configuration</LI><LI><STRONG>Use of Read/Write Unrestricted</STRONG> - get alerts on business roles with unrestricted write, read and value help access, allowing users global data access</LI><LI><STRONG>Critical Business Catalog Assignment</STRONG> - be warned about over-assignment of critical authorizations which should have limited use in production</LI><LI><STRONG>Critical Authorization Combinations</STRONG> - get alerts for users assigned excess authorizations through critical combinations of business catalogs</LI><LI><STRONG>Communication (Inbound/Outbound)</STRONG> - get alerts on customer-managed communication arrangements based on user/password authentication, where certificate-based authentication is more secure</LI><LI><STRONG>Upcoming Certificate Expiration</STRONG> - get early warnings for customer-managed certificates which will expire within the next 90 days</LI></UL><P>You can find more details on each of these chapters below or by directly accessing the <A href="https://me.sap.com/ewa/report" target="_self" rel="noopener noreferrer">SAP EarlyWatch Alert report</A>* for your systems in SAP for Me.&nbsp;<BR /><FONT size="2"><EM>* an authorized user is needed to access this application - refer to this <A href="https://support.sap.com/en/offerings-programs/support-services/earlywatch-alert.html?anchorId=section_543542880_co" target="_self" rel="noopener noreferrer">SAP Support page</A> on how to get access.</EM></FONT></P><P><FONT size="5"><STRONG>Assignment of Users to Business Role SAP_BR_ADMINISTRATOR</STRONG></FONT></P><P>The role SAP_BR_ADMINISTRATOR is predefined by SAP and is intended only for the initial configuration of a system. Using this role in production is not recommended by SAP and may lead to compliance issues. This section checks the role's usage and points to in-depth information on Identity Access Management. It provides a link to the procedure for creating a more restricted administration role, suitable for use in production.</P><P><FONT size="5"><STRONG>Use of Read/Write Unrestricted</STRONG></FONT></P><P>Using unrestricted fields in the maintenance of business roles allow users to have global data access. SAP best practices recommend to carefully review which users need to have restricted data access and maintain the access appropriately, e.g. ensuring employees only have access to data belonging to their sales organization. This chapter includes the number of business roles with unrestricted write, read or value help access, and describes the related SAP Fiori app Maintain Business Roles.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="Use of Read/Write Unrestricted Table Example" style="width: 998px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/353889i3A3F3CBA9ED2DF83/image-size/large?v=v2&amp;px=999" role="button" title="readWriteUnrestricted.png" alt="Use of Read/Write Unrestricted Table Example" /><span class="lia-inline-image-caption" onclick="event.preventDefault();">Use of Read/Write Unrestricted Table Example</span></span></P><P>&nbsp;</P><P><FONT size="5"><STRONG>Critical Business Catalog Assignment</STRONG></FONT></P><P>Business catalogs contain a bundle of privileges needed for accessing an app or features that are then assigned to users via business roles. This section checks for selected critical business catalogs and their assignment to business roles and users and rates this according to the valuation rules from SAP Note 863362. In case any critical business catalogs are assigned, additional details are presented as sub-chapters.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="Business Catalog Assignments Overview Table Example" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/353890i015073ED958850CA/image-size/large?v=v2&amp;px=999" role="button" title="BusinessCatalogAssignments.png" alt="Business Catalog Assignments Overview Table Example" /><span class="lia-inline-image-caption" onclick="event.preventDefault();">Business Catalog Assignments Overview Table Example</span></span></P><P>&nbsp;</P><P><FONT size="5"><STRONG>Critical Authorization Combinations</STRONG></FONT></P><P>Segregation of duties in SAP Integrated Business Planning (SAP IBP) is supported by the use of business catalogs and business roles. Creatinga a business role by combining catalogs may grant excess authorization to users and lead to a negative impact on your business processes. The section gives user counts where such critical combinations are found, with a link to information on assessing the associated risks.</P><P><FONT size="5"><STRONG>Communication (Inbound/Outbound)</STRONG></FONT></P><P>Certificate-based communication is recommended for technical users involved in inbound/outbound communication. It is usually easier to detect a compromised certificate than to detect a compromised password. This section lists customer-managed communication arrangements that are password-based, and points to recommendations for a certificate-based approach.</P><P><FONT size="5"><STRONG>Upcoming Certificate Expiration</STRONG></FONT></P><P>Certificates with an expiration date in the next 90 days are listed in this section, with alerts for certifcates where a short-term expiration under 30 days is found.</P> 2025-12-19T06:11:34.454000+01:00 https://community.sap.com/t5/technology-blog-posts-by-sap/enhance-security-with-new-cqcs/ba-p/14307490 Enhance security with new CQCs 2026-01-14T15:52:03.764000+01:00 JamieFulen https://community.sap.com/t5/user/viewprofilepage/user-id/20349 <P><FONT face="helvetica" size="3">We are excited to introduce a new/expanded service from SAP Enterprise Support that ensures the security and high availability of your SAP solutions. The Continuous Quality Check "Security Optimization" is designed to thoroughly analyze, verify, and enhance the security of your SAP cloud solution. We have three (3) workstreams available covering SAP S/HANA Cloud Public Edition, SAP SuccessFactors and SAP Integrated Business Planning (IBP).</FONT></P><P><FONT face="helvetica" size="3">After a detailed security analysis, the service will provide recommendations to improve your configuration and authorizations. For this pilot delivery, SAP will assign a dedicated expert to guide you through the process.</FONT></P><P><FONT face="helvetica" size="3">Upon completion of the service, you will receive a comprehensive report that includes an executive summary, detailed findings, and recommendations to mitigate risks and enhance your security posture. You can expect to receive the results approximately one week after the session.</FONT></P><P><FONT face="helvetica" size="3">If you wish to participate, please ensure you meet the following prerequisites:</FONT></P><UL><LI><FONT face="helvetica" size="3"><SPAN>Grant remote access to your SAP cloud solution to SAP.</SPAN></FONT></LI><LI><FONT face="helvetica" size="3"><SPAN>Be available to collaborate with SAP Expert within a mutually agreed 2 to 3 week time frame.</SPAN></FONT></LI><LI><FONT face="helvetica" size="3"><SPAN>Be willing to provide open and honest feedback on the service content and respond to our survey requests.</SPAN></FONT></LI></UL><P><FONT face="helvetica" size="3">We look forward to working with you and helping you enhance your SAP security.</FONT></P><P><FONT face="helvetica" size="3">Contact us today to get started.&nbsp;&nbsp;<BR /></FONT><FONT face="helvetica" size="3"><A href="mailto:esac@sap.com" target="_blank" rel="noopener nofollow noreferrer">esac@sap.com</A></FONT></P><P><EM><FONT face="helvetica" size="3">Additional information about the SAP Enterprise Support Advisory Council can be found <A href="https://support.sap.com/en/offerings-programs/enterprise-support/enterprise-support-advisory-council.html" target="_blank" rel="noopener noreferrer">here</A>.</FONT></EM></P> 2026-01-14T15:52:03.764000+01:00 https://community.sap.com/t5/enterprise-resource-planning-blog-posts-by-sap/don-t-let-your-integration-take-a-coffee-break-client-certificate-changes/ba-p/14304537 Don't Let Your Integration Take a Coffee Break: Client Certificate Changes In 2026! 2026-01-16T08:40:45.053000+01:00 marc_roeder https://community.sap.com/t5/user/viewprofilepage/user-id/180997 <H1 id="toc-hId-1658654950"><SPAN>Introduction</SPAN></H1><P><SPAN>If integrations were people, you’d dread them slipping out for coffee breaks just when you need them most. SAP S/4HANA Cloud Public Edition, Integrated Business Planning (IBP), and SAP Marketing Cloud (SMC) are all about to experience an important update to how client certificates are issued. This change, prompted by evolving industry standards, involves a change of the Certificate Authority (CA) for the Default Client certificate. It’s important to note that this CA change has the potential to cause one of those dreaded coffee breaks—disruptions in connectivity—if not handled properly. </SPAN></P><P><SPAN>Here’s what’s happening, who should pay attention, and how to keep your setup on track.</SPAN></P><H2 id="toc-hId-1591224164"><SPAN>Who Is Affected?</SPAN></H2><P><SPAN>If you use the Client Default certificate for outbound authentication in SAP S/4HANA Cloud Public Edition, IBP, or SMC, this change applies to you. Anyone relying on these certificates for outbound integrations should pay attention, as missing the update could lead to disruptions in communication.</SPAN></P><P><SPAN>This only applies to customer managed integration scenarios. SAP managed ones will be taken care of by SAP, of course.</SPAN></P><H2 id="toc-hId-1394710659"><SPAN>What Is Changing?</SPAN></H2><P><SPAN>Currently, the Default Client certificates for outbound communication are issued by <EM>DigiCert</EM>. In February 2026, <EM>SAP Cloud Root CA</EM> becomes the new certificate authority for newly issued client certificates. You’ll also notice updates to certificate subject names, including additional organizational fields. These changes will be present in all new client certificates issued during routine rotation.</SPAN></P><P><SPAN>To help visualize the upcoming changes, here’s a quick comparison of the old and new default client certificates:</SPAN></P><TABLE><TBODY><TR><TD width="103"><P><STRONG><SPAN>Certificate Attribute</SPAN></STRONG></P></TD><TD width="249"><P><STRONG><SPAN>Old (Before Rotation)</SPAN></STRONG></P></TD><TD width="249"><P><STRONG><SPAN>New (After Rotation)</SPAN></STRONG></P></TD></TR><TR><TD width="103"><P><STRONG>Subject</STRONG></P></TD><TD width="249"><P>CN=&lt;<EM>your tenant hostname&gt;</EM></P></TD><TD width="249"><P>CN=<EM>&lt;your tenant hostname&gt;<BR /></EM>OU=<EM>&lt;some UID</EM><EM>&gt;</EM></P></TD></TR><TR><TD width="103"><P><STRONG><SPAN>Issuer</SPAN></STRONG></P></TD><TD width="249"><P><SPAN>DigiCert Global G2</SPAN></P></TD><TD width="249"><P><SPAN>SAP Cloud Root CA</SPAN></P></TD></TR><TR><TD width="103"><P><STRONG>Extended Key Usage</STRONG></P></TD><TD width="249"><P>Client Authentication,<BR />Server Authentication</P></TD><TD width="249"><P>Client Authentication</P></TD></TR></TBODY></TABLE><P><SPAN>The new OU value is specific to the product (S/4/IBP/ SMC) and will remain the same during future certificate rotations.</SPAN></P><H2 id="toc-hId-1198197154"><SPAN>Timeline and Notification: When and How Will You be Informed?</SPAN></H2><P>New systems will receive client certificates signed by <EM>SAP Cloud Root CA</EM> starting late March 2026. Existing systems will begin renewal with a staging certificate from late February 2026, fully transitioning during their next scheduled key rotation. In case you wonder: the fact that these dates are close to the 2602 release is a pure coincidence. System upgrades and certificate changes are separate processes.<BR />The rotation schedule and rotation process do not change. There will be no additional certificate rotation.</P><P><STRONG><SPAN>Example:</SPAN></STRONG><SPAN> if your current Client Default certificate is valid until April 2026, the CA change will happen in April for you. If your certificate expires in November, you’ll keep your <EM>DigiCert</EM> certificate until November and then switch to <EM>SAP Cloud Root CA</EM>.</SPAN></P><P>The usual notification email about certificate rotation will include additional details about the change in Certificate Authority. Please review it carefully to ensure you understand the updates and can take the right actions in response. The process for certificate rotation is described on <SPAN><A href="https://help.sap.com/docs/SAP_S4HANA_CLOUD/55a7cb346519450cb9e6d21c1ecd6ec1/2e409eb8853b4347a372261d6519cf3f.html?locale=en-US&amp;version=LATEST" target="_blank" rel="noopener noreferrer">this help page</A></SPAN>.</P><H1 id="toc-hId-872600930"><SPAN>Potential Issues and Required Action</SPAN></H1><P><SPAN>For clarity, we'll refer to the system, tenant, service, or device that receives and validates connections from your SAP cloud tenant (S/4 cloud, IBP, SMC) as the <EM>target</EM> <EM>environment</EM>. Such target environments could be anything from BTP apps, SAP solutions like SAP Ariba or SAP SuccessFactors, third-party products running in the cloud or on-premises, or even custom-built applications.</SPAN></P><H2 id="toc-hId-805170144"><SPAN>How Things Might Break</SPAN></H2><P><SPAN>Misalignment of configurations in your SAP cloud tenant and the target environment can lead to two categories of issues:</SPAN></P><UL><LI><STRONG><SPAN>CA Trust Failures</SPAN></STRONG><SPAN>: If your target environment does not trust the <EM>SAP Cloud Root CA</EM>, it will reject the new certificate. In these cases, the mutual TLS (mTLS) handshake fails, and communication is blocked at the TLS layer. No HTTP error code is returned.</SPAN></LI><LI><STRONG><SPAN>User / System / Identity Mapping Errors</SPAN></STRONG><SPAN>: in the target environment, the certificate metadata (subject, issuer) is mapped to the identity of a user or process. Consequently, if the mapping is not changed to use the new subject and issuer, authorization errors (such as HTTP 403 or 401) will happen. Depending on the implementation of the target environment, TLS errors could also occur.</SPAN></LI></UL><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="marc_roeder_0-1768548384514.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/361818i91AF33DBE6F4614F/image-size/large/is-moderation-mode/true?v=v2&amp;px=999" role="button" title="marc_roeder_0-1768548384514.png" alt="marc_roeder_0-1768548384514.png" /></span></P><H3 id="toc-hId-737739358"><SPAN>Technical Aside: Certificate Pinning vs CA Trust</SPAN></H3><P><SPAN>For certificate-based authentication, most target environments will rely on CA trust, where the target environment validates the certificate’s chain up to a trusted root CA. With the switch to <EM>SAP Cloud Root CA</EM>, you must add this CA to the trust store in the target environment and check your user mapping logic. </SPAN></P><P><SPAN>For environments using certificate pinning, simply upload the new certificate when the rotation occurs. In this case, the certificate is identified by the fingerprint of the certificate’s key rather than the metadata of the certificate (i.e. subject and issuer). Target environments using certificate pinning must be updated every time the certificate rotates – the CA change does not make a difference here.</SPAN></P><H2 id="toc-hId-412143134"><SPAN>Required Actions for Customers</SPAN></H2><P><SPAN>To maintain uninterrupted integrations, customers using the Client Default certificate for SAP S/4HANA Cloud Public Edition, IBP, and SMC should:</SPAN></P><OL><LI><SPAN>Update CA Trust: Make sure the <EM>SAP Cloud Root CA</EM> is trusted by your target environment. You can download the root certificate from the <A href="https://support.sap.com/en/offerings-programs/support-services/trust-center-services.html#section_1559602068" target="_blank" rel="noopener noreferrer">SAP Trust Center</A>.</SPAN></LI><LI><SPAN>Adjust User/System/Identity Mapping: Update your mapping logic to recognize the new certificate subject and issuer, ensuring the target environment properly identifies and authorizes the incoming connection.</SPAN></LI></OL><P><SPAN>More information on the topic is available in SAP note <A href="https://launchpad.support.sap.com/#/notes/3677763" target="_blank" rel="noopener noreferrer">3677763</A> as well as the relevant help pages:</SPAN></P><UL><LI><SPAN><A href="https://help.sap.com/docs/SAP_S4HANA_CLOUD/55a7cb346519450cb9e6d21c1ecd6ec1/2e409eb8853b4347a372261d6519cf3f.html?version=LATEST&amp;locale=en-US" target="_blank" rel="noopener noreferrer">How to Handle Default Client Certificate Renewal</A></SPAN></LI><LI><A href="https://help.sap.com/docs/SAP_MARKETING_CLOUD/7f0fcf009fd34169a791b19830dd2a99/1ba0a090d8fa4d3e8098b318187e0288.html?locale=en-US&amp;version=LATEST" target="_blank" rel="noopener noreferrer">Set Up Certificate-to-User Mapping</A>&nbsp;(SAP Cloud Integration and SAP Marketing Cloud)</LI><LI><SPAN><A href="https://help.sap.com/docs/integration-suite/sap-integration-suite/client-certificate-authentication-for-integration-flow-processing?locale=en-US&amp;version=LATEST" target="_blank" rel="noopener noreferrer">Client Certificate Authentication for Integration Flow Processing</A>&nbsp;(SAP Integration Suite)</SPAN></LI><LI><SPAN><A href="https://help.sap.com/docs/integration-suite/sap-integration-suite/client-certificate-authentication-for-api-clients?locale=en-US&amp;version=LATEST" target="_blank" rel="noopener noreferrer">Client Certificate Authentication for API Clients</A></SPAN>&nbsp;<SPAN>(SAP Integration Suite)</SPAN></LI></UL><P><SPAN>And in case you wonder what all of this certificate business is about, here's a blog post describing the basics of certificate-based authentication:&nbsp;<A href="https://community.sap.com/t5/enterprise-resource-planning-blog-posts-by-sap/beyond-basic-1-certificate-based-authentication/ba-p/13626924" target="_blank">Beyond Basic (1): Certificate-Based Authentication</A>.</SPAN></P><H1 id="toc-hId-86546910"><SPAN>Conclusion</SPAN></H1><P><SPAN>While this certificate update might seem like an invitation for your integrations to sneak away for a coffee break, staying alert and updating your trust stores and mappings in your target environment will keep everything running without interruption. Pay attention to notification emails—so your integrations never miss a beat (or a sip).</SPAN></P> 2026-01-16T08:40:45.053000+01:00 https://community.sap.com/t5/enterprise-resource-planning-blog-posts-by-sap/%E9%9D%A2%E5%90%91-sap-erp-%E5%85%AC%E6%9C%89%E4%BA%91-sap-ibp-sap-marketing-cloud-%E7%94%A8%E6%88%B7%E7%9A%84%E6%8F%90%E9%86%92-%E5%87%BA%E7%AB%99-%E9%BB%98%E8%AE%A4%E5%AE%A2%E6%88%B7%E7%AB%AF%E8%AF%81%E4%B9%A6-ca-%E5%B0%86%E5%8F%98%E6%9B%B4%E4%B8%BA-sap/ba-p/14319216 面向 SAP ERP 公有云、SAP IBP、SAP Marketing Cloud 用户的提醒:出站“默认客户端证书”CA 将变更为 SAP Cloud Root CA 2026-02-02T02:00:00.017000+01:00 Zhehui_Xia28 https://community.sap.com/t5/user/viewprofilepage/user-id/40727 <H2 id="toc-hId-1788807199">背景与原因</H2><UL><LI>受行业规范变化(由 Google 推动)影响,主流证书颁发机构将停止签发用于客户端认证的证书。当前为 SAP S/4HANA Cloud Public Edition、SAP IBP、SAP Marketing Cloud 租户签发“默认客户端证书”的 <STRONG><EM>DigiCert</EM></STRONG>&nbsp; 也将停止相关签发。</LI><LI>为确保持续可用,SAP 将把“默认客户端证书”的签发 CA 切换为 <STRONG><EM>SAP Cloud Root CA&nbsp;</EM></STRONG>。自 2026 年 3 月起,<STRONG>新签发的客户端证书</STRONG>将由 <STRONG><EM>SAP Cloud Root CA</EM></STRONG> 颁发,并在<STRONG>后续的常规证书轮换中</STRONG>逐步替换现有证书。</LI></UL><H2 id="toc-hId-1592293694">谁需要关注与行动</H2><UL><LI>如果您在 S/4HANA Cloud Public Edition、IBP 或 SAP Marketing Cloud 的出站集成中使用“默认客户端证书”进行认证(即由您的租户调用目标系统),本次变更适用且需要您在目标系统执行调整。</LI><LI>仅涉及客户自管的集成场景,SAP 管理的场景由 SAP 处理。</LI><LI>本次证书更新,您可以视作<STRONG>常规证书轮换的一部分</STRONG>。不同的是,签发方会发生变化,证书字段发生了改变,同时在目标系统的<SPAN>信任存储需要<STRONG>更新新的根证书</STRONG></SPAN>。</LI></UL><H2 id="toc-hId-1395780189">本次变更的具体内容</H2><UL><LI>证书“issuer(颁发者)”从 DigiCert Global G2 TLS RSA SHA256 2020 CA1 变更为 SAP Cloud Root CA。</LI><LI>证书“subject(主题)”将新增 OU 字段,OU 的值为签发该证书的 BTP Certificate Service 的子账户 ID。</LI><LI>证书链相应更换为 SAP Cloud Root CA 体系。部分场景中证书扩展用途可能调整为仅客户端认证(Client Authentication)。</LI></UL><H2 id="toc-hId-1199266684">时间线与通知方式</H2><UL><LI>自 2026 年 3 月下旬起,新开系统将直接获得由 SAP Cloud Root CA 签发的默认客户端证书;存量系统将<STRONG>按既有到期轮换节奏完成切换</STRONG>(不进行“集中大迁移”)。部分租户可能在 2 月下旬进入证书准备或分阶段发布过程。</LI><LI>您现有的证书在其到期日前仍然有效;切换发生在下一次证书轮换时。示例:若当前证书有效期至 2026 年 4 月,则变更在 4 月轮换时生效;若至 11 月,则 11 月再切换。</LI><LI>与以往一致,SAP 将通过邮件通知证书轮换;您也可在源租户的 Maintain Client Certificates 应用查看证书有效期。</LI><LI>同样与以往一致的是,当客户默认证书<STRONG>在30天后到期时</STRONG>,客户将收到“公告”通知。通知将告知客户新的暂存证书的可用性,客户可以从“维护客户端证书”应用程序下载该证书。新证书的名称为“Client Default”,旧证书的名称是“Client Default Expiring”。此时,客户需要在 SAP 租户里完成出站通信用户的切换。</LI></UL><H2 id="toc-hId-1002753179">如果不更新,会有什么影响?</H2><P><STRONG>若不更新目标系统配置,可能出现两类问题:</STRONG></P><UL><LI>CA 信任失败:目标系统未信任 SAP Cloud Root CA,mTLS 握手在 TLS 层直接失败(通常无 HTTP 状态码)。</LI><LI>身份映射错误:目标系统依赖证书主题/颁发者做用户或系统身份映射,未更新映射会导致 401/403 等授权错误,或因实现差异出现 TLS 错误。</LI></UL><H2 id="toc-hId-806239674"><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="Client Certification.png" style="width: 701px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/367717i4E3DEDC17C343CB8/image-size/large?v=v2&amp;px=999" role="button" title="Client Certification.png" alt="Client Certification.png" /></span></H2><H2 id="toc-hId-609726169">您需要做什么(行动清单)</H2><P>&nbsp; &nbsp; &nbsp; &nbsp;1. 在目标系统中的操作</P><UL><LI>更新 CA 信任。<SPAN>在目标系统中,您需要更改入站连接:不再接受由&nbsp;<STRONG><EM>DigiCert</EM></STRONG> 颁发的旧证书,现在必须使用由&nbsp;<STRONG><EM>SAP Cloud Root CA</EM></STRONG> 颁发的新客户端证书进行认证。这对于所有目标系统都适用,即使它们在证书轮换期间之前没有需要任何更改(因为这次会更改证书元数据)。</SPAN></LI><LI>将 <STRONG><EM>SAP Cloud Root CA</EM></STRONG> 的根证书导入目标系统的信任库(trust store)。可从 <A href="https://support.sap.com/en/offerings-programs/support-services/trust-center-services.html#section_1559602068" target="_self" rel="noopener noreferrer">SAP Trust Center</A> 获取 <EM><STRONG>SAP Cloud Root CA</STRONG></EM> 根证书,或者通过 SAP Notes&nbsp;<A href="https://me.sap.com/notes/3677763" target="_blank" rel="noopener noreferrer">3677763 - Change of Client Certificate "Client Default" in S/4HANA Cloud Public Edition, SAP IBP, and SAP Marketing Cloud - SAP for Me</A>&nbsp;中的链接获取。</LI><LI>当旧证书<SPAN>轮换到来时,使用由&nbsp;<STRONG><EM>SAP Cloud Root CA</EM></STRONG> 颁发的新客户端证书进行认证。</SPAN></LI><LI>若目标为 BTP 服务实例,请在对应服务绑定/服务密钥中引用新证书;最简做法是基于新证书重建绑定/密钥。原“用户映射”在 BTP 中表现为“系统映射”,同样需更新。</LI><LI>使用证书钉扎(pinning)的环境。若目标系统采用证书指纹钉扎,不涉及 CA 信任;在轮换时直接替换为新证书指纹即可。但这类环境每次证书轮换都需更新指纹。</LI></UL><P>&nbsp; &nbsp; &nbsp; &nbsp;2. 在 SAP 租户中的操作</P><UL><LI>将出站通信用户切换到新的“默认客户端证书”。在证书轮换发生后,参考源租户的&nbsp;<STRONG>维护客户端证书</STRONG>(Maintain Client Certificates) 应用,将出站通信用户/连接凭据从旧证书切换到新证书(与以往轮换操作一致)。</LI></UL><P>&nbsp; &nbsp; &nbsp; &nbsp;3. 更新身份映射逻辑</P><UL><LI>针对目标系统中基于证书 subject/issuer 的用户或系统映射,调整为使用新证书的元数据(包含新的 OU 与新的 issuer)。</LI></UL><H2 id="toc-hId-413212664">如何定位“所有受影响的目标系统”</H2><UL><LI>在源租户打开 <STRONG>维护客户端证书</STRONG>(Maintain Client Certificates) 应用。</LI><LI>选择 SAP 管理的“客户端缺省值(Client Default)”证书。<span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="blogpic02.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/367718iE2C1C78AE920CDAB/image-size/large?v=v2&amp;px=999" role="button" title="blogpic02.png" alt="blogpic02.png" /></span></LI><LI>在“通信系统”区域查看该证书被使用的所有通信系统列表。<span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="blogpic03.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/367719i3DA9BE95D654B9B8/image-size/large?v=v2&amp;px=999" role="button" title="blogpic03.png" alt="blogpic03.png" /></span></LI><LI>点击进入具体通信系统,在“出站通信的用户(Users for Outbound Communication)”中查看认证方式:<UL><LI>若为“SSL客户端证书(SSL Certificate)”,在“常规(General)”下查看目标系统主机并在目标系统完成新证书上传,添加信任。<BR /><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="blogpic04.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/367720iE2AD9A08B5F9C478/image-size/large?v=v2&amp;px=999" role="button" title="blogpic04.png" alt="blogpic04.png" /></span></LI><LI>若为“OAuth 2.0(mTLS)”,该证书用于向 OAuth 令牌提供者的 mTLS 端点认证,应在令牌提供者侧更新;端点位置可在“OAuth 2.0 Settings -&gt; Outbound OAuth 2.0 Client Settings”查看。</LI></UL></LI></UL><H2 id="toc-hId-216699159">常见问答与提示</H2><UL><LI>是否会集中切换?不会。切换随各租户证书到期的常规轮换进行。</LI><LI>旧证书是否马上失效?不会,旧证书在到期前有效。</LI><LI>新根证书来源?从 SAP Trust Center 下载 SAP Cloud Root CA 根证书。</LI><LI>SAP 会发邮件吗?会,轮换通知邮件将包含 CA 变更说明;请按指引在目标系统完成信任与映射更新。</LI></UL><H2 id="toc-hId-20185654">支持与文档资源</H2><P>您可以阅读以下文档,获取更多详细信息:</P><UL><LI>SAP Note&nbsp;<A href="https://me.sap.com/notes/3677763" target="_blank" rel="noopener noreferrer">3677763 - Change of Client Certificate "Client Default" in S/4HANA Cloud Public Edition, SAP IBP, and SAP Marketing Cloud - SAP for Me</A></LI><LI>SAP Note&nbsp;<A href="https://me.sap.com/notes/3119483/E" target="_blank" rel="noopener noreferrer">3119483 - Client Standard Certificate Renewal in S/4HANA and SMC Systems - SAP for Me</A></LI><LI><A href="https://community.sap.com/t5/enterprise-resource-planning-blog-posts-by-sap/don-t-let-your-integration-take-a-coffee-break-client-certificate-changes/ba-p/14304537" target="_blank">Don't Let Your Integration Take a Coffee Break: Cl... - SAP Community</A></LI><LI><SPAN><A href="https://help.sap.com/docs/SAP_S4HANA_CLOUD/55a7cb346519450cb9e6d21c1ecd6ec1/2e409eb8853b4347a372261d6519cf3f.html?version=LATEST&amp;locale=en-US" target="_blank" rel="noopener noreferrer">How to Handle Default Client Certificate Renewal</A></SPAN></LI><LI><A href="https://help.sap.com/docs/SAP_MARKETING_CLOUD/7f0fcf009fd34169a791b19830dd2a99/1ba0a090d8fa4d3e8098b318187e0288.html?locale=en-US&amp;version=LATEST" target="_blank" rel="noopener noreferrer">Set Up Certificate-to-User Mapping</A>&nbsp;(SAP Cloud Integration and SAP Marketing Cloud)</LI><LI><SPAN><A href="https://help.sap.com/docs/integration-suite/sap-integration-suite/client-certificate-authentication-for-integration-flow-processing?locale=en-US&amp;version=LATEST" target="_blank" rel="noopener noreferrer">Client Certificate Authentication for Integration Flow Processing</A>&nbsp;(SAP Integration Suite)</SPAN></LI><LI><SPAN><A href="https://help.sap.com/docs/integration-suite/sap-integration-suite/client-certificate-authentication-for-api-clients?locale=en-US&amp;version=LATEST" target="_blank" rel="noopener noreferrer">Client Certificate Authentication for API Clients</A></SPAN>&nbsp;<SPAN>(SAP Integration Suite)</SPAN></LI><LI>如遇问题,请按产品提交事件:XX-S4C-OPR-INC(S/4HANA Cloud Public Edition)、SCM-IBP-OPS-INC(SAP IBP)、CEC-MKT-ITC(SAP Marketing Cloud)</LI></UL><H2 id="toc-hId-170926506">结语</H2><P>对使用“默认客户端证书”的客户而言,本次 CA 变更是一次必要的合规升级。只要您在目标系统及时导入 SAP Cloud Root CA 根证书、切换到新客户端证书并更新身份映射,出站集成即可平稳度过“轮换窗口”,避免握手失败或授权错误。</P> 2026-02-02T02:00:00.017000+01:00 https://community.sap.com/t5/enterprise-architecture-blog-posts/enhancing-security-enabling-multi-factor-authentication-enforcement-for-s/ba-p/14320971 Enhancing security: Enabling Multi-Factor Authentication enforcement for S-users 2026-02-06T13:51:09.128000+01:00 Akhat_12 https://community.sap.com/t5/user/viewprofilepage/user-id/1582 <P class="lia-align-justify" style="text-align : justify;"><STRONG>Starting from January 15, 2026, super administrators can enforce <A href="https://support.sap.com/en/my-support/mfa.html" target="_blank" rel="noopener noreferrer">Multi-Factor Authentication (MFA)</A> for their S-users.&nbsp;</STRONG>This new feature has been developed based on direct customer feedback and in response to the evolving security landscape, resulting in stronger protection for your user accounts.</P><P class="lia-align-justify" style="text-align : justify;"><STRONG>What is Multifactor Authentication?</STRONG></P><P class="lia-align-justify" style="text-align : justify;">Multi-factor authentication, commonly known as MFA, is a powerful security measure that helps safeguard your accounts by requiring more than just a password. Instead of relying solely on something you know (like a password, PIN, or signature), MFA asks for an extra layer of verification, which could be:</P><UL class="lia-align-justify" style="text-align : justify;"><LI>Something you have: A one-time code generated by an authenticator app on your smartphone</LI><LI>Something you are: Biometrics, a fingerprint or a facial scan</LI></UL><P class="lia-align-justify" style="text-align : justify;">By combining these different authentication factors, MFA makes it significantly tougher for attackers to break into your account. This is in fact one of the most effective ways to prevent unauthorized access and stop most data breaches.</P><P class="lia-align-justify" style="text-align : justify;"><STRONG>Strengthening security with enhanced MFA Options for S-Users</STRONG></P><P class="lia-align-justify" style="text-align : justify;">Protecting critical SAP assets is crucial for our customers. Therefore, our approach to multi-factor authentication is evolving to meet this challenge. Now, super administrators can take a proactive role by enforcing MFA for S-users, while individuals still have the freedom to secure their accounts independently. This dual approach – <STRONG>administrator-led enforcement alongside voluntary enablement</STRONG> – offers the flexibility and meets modern security demands.</P><P class="lia-align-justify" style="text-align : justify;">In the past, enabling MFA was left up to each S-user’s discretion. However, relying solely on voluntary enrollment is no longer sufficient to safeguard sensitive business information. By empowering both administrators and users, we’re making it easier to prevent unauthorized access and strengthen your organization’s security.</P><P class="lia-align-justify" style="text-align : justify;"><STRONG>NEW scenario:&nbsp;Selective MFA enforcement by customer’s own super administrators</STRONG></P><P class="lia-align-justify" style="text-align : justify;">Now, super administrators can take a proactive role by enforcing MFA for S-users <STRONG>of their own company</STRONG>, while individuals still have the freedom to secure their accounts independently. <STRONG>Of course, this should be in line and aligned with the companies' own security policy</STRONG>.</P><P class="lia-align-justify" style="text-align : justify;">Through the User Management Tool (UMT) in&nbsp;<A href="https://me.sap.com/" target="_blank" rel="noopener noreferrer">SAP for Me</A>, super administrators have the option to activate MFA for S-users. This new feature allows administrators to:&nbsp;</P><UL class="lia-align-justify" style="text-align : justify;"><LI><STRONG>Enforce MFA:</STRONG>&nbsp;Search for, filter, and select specific S-users or all of them to make MFA mandatory for their logins.</LI><LI><STRONG>Exclude technical users:&nbsp;</STRONG>Crucially, super administrators can exclude specific technical accounts (like those used for the BTP cloud connector) from the MFA requirement, ensuring that core business processes continue to run smoothly.</LI></UL><P class="lia-align-justify" style="text-align : justify;">After MFA is enforced, the selected S-user(s) will receive an email notification with simple instructions on next steps and be guided through a one-time setup on their next login, ensuring a seamless and secure transition.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="Akhat_12_0-1770143232193.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/368666i39E68D6767FD7E6F/image-size/large?v=v2&amp;px=999" role="button" title="Akhat_12_0-1770143232193.png" alt="Akhat_12_0-1770143232193.png" /></span></P><P class="lia-align-justify" style="text-align : justify;"><STRONG>EXISTING scenario: Voluntary MFA enablement by the S-users themselves</STRONG></P><P class="lia-align-justify" style="text-align : justify;">The option for individual users to proactively secure their own accounts&nbsp;<STRONG>remains fully available</STRONG>.&nbsp;</P><P class="lia-align-justify" style="text-align : justify;">Any S-user can visit their profile page via&nbsp;<A href="https://accounts.sap.com/ui/protected/profilemanagement" target="_blank" rel="noopener noreferrer">SAP's profile management</A>&nbsp;at any time to enable MFA for themselves. This has been a great option for security-conscious users who want to protect their accounts even before an administrator-led rollout.</P><P class="lia-align-justify" style="text-align : justify;"><STRONG>Please note:</STRONG> MFA enforced by the super administrator overrides any voluntary setting previously configured by the user.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="Akhat_12_1-1770143260189.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/368667iEE810BBC0EF30EC3/image-size/large?v=v2&amp;px=999" role="button" title="Akhat_12_1-1770143260189.png" alt="Akhat_12_1-1770143260189.png" /></span></P> 2026-02-06T13:51:09.128000+01:00 https://community.sap.com/t5/artificial-intelligence-learning-group-blog-posts/build-ai-securely-avoid-pitfalls-in-the-development-and-operations/ba-p/14323304 Build AI securely - Avoid Pitfalls in the Development and Operations Lifecycle: Apr 9, 2026 2026-02-06T21:27:22.922000+01:00 Geoffrey_Fu https://community.sap.com/t5/user/viewprofilepage/user-id/2062381 <P><STRONG>Secure Your AI Development &amp; Operations!</STRONG><SPAN>&nbsp;</SPAN>Don’t let security gaps derail your AI projects. Join our 45-minute live session on<SPAN>&nbsp;</SPAN><STRONG>April 9, 2026</STRONG>, to explore common pitfalls—like credential exposure and unchecked infrastructure—and discover best practices to safeguard your AI lifecycle. Whether you're a developer, architect, or business user, this session will help you build AI securely.<SPAN>&nbsp;</SPAN></P><H3 id="toc-hId-1918635621"><STRONG>Key Takeaways&nbsp;</STRONG></H3><UL><LI><STRONG>Identify security risks</STRONG><SPAN>&nbsp;</SPAN>in AI development, including secret leaks and misconfigured infrastructure.</LI><LI><STRONG>Understand real-world impacts</STRONG><SPAN>&nbsp;</SPAN>of security failures in DevOps and architectural workflows.</LI><LI><STRONG>Apply mitigation strategies</STRONG><SPAN>&nbsp;</SPAN>to protect business data, LLMs, and operational pipelines.</LI><LI><STRONG>Recognize security as a shared responsibility</STRONG><SPAN>&nbsp;</SPAN>across teams and roles.</LI><LI><STRONG>Secure AI pipelines</STRONG><SPAN>&nbsp;</SPAN>from development to deployment with proactive checks and controls.</LI></UL><P><STRONG><A href="https://learning.sap.com/live-sessions/build-ai-securely-avoid-pitfalls-in-the-development-and-operations-lifecycle" target="_blank" rel="noopener noreferrer">Register</A> now!</STRONG></P> 2026-02-06T21:27:22.922000+01:00 https://community.sap.com/t5/technology-blog-posts-by-sap/empty/ba-p/14323803 Empty 2026-02-08T22:38:38.247000+01:00 SalvatorePulvirenti https://community.sap.com/t5/user/viewprofilepage/user-id/1921425 <P><STRONG>Empty</STRONG></P> 2026-02-08T22:38:38.247000+01:00 https://community.sap.com/t5/enterprise-resource-planning-blog-posts-by-members/sap-ariba-is-now-integrated-with-microsoft-sentinel-solution-for-sap/ba-p/14324356 SAP Ariba is now integrated with Microsoft Sentinel Solution for SAP 2026-02-09T13:34:21.343000+01:00 Martin-Pankraz https://community.sap.com/t5/user/viewprofilepage/user-id/143781 <P><EM>Quick link to <A href="https://github.com/Azure-Samples/Sentinel-For-SAP-Community/tree/main/integration-artifacts/solution-packages/baseline-extension-package#sap-ariba" target="_blank" rel="noopener nofollow noreferrer">GitHub</A>.</EM></P><P>Supply chain is a critical topic in almost every industry these days. We live in times where a controversial social media post and actions of government officials can disrupt factory operations almost the next day. See this Reuters (2025) <SPAN><A href="https://www.reuters.com/business/autos-transportation/volkswagen-prepares-halt-production-key-models-amid-chip-supply-crunch-bild-2025-10-21/" target="_blank" rel="noopener nofollow noreferrer">article</A></SPAN> that sheds light on car production halt in Germany caught in the crossfire of political turmoil in 2 other countries. SAP Ariba helps diversify the risk between buyers and suppliers in tightly interconnected supply chains.</P><P>What a juicy target for cyber criminals one might say&nbsp;<span class="lia-unicode-emoji" title=":winking_face:">😉</span></P><P>Therefore, meet the new kid on the blog when it comes to <STRONG>Microsoft Sentinel for SAP integration – SAP Ariba.</STRONG></P><P>This <STRONG>cloud-native integration</STRONG> adds <STRONG>real-time threat detection, investigation, and response</STRONG> to your SAP Ariba environment and puts it into the context of your wider IT estate.</P><H1 id="toc-hId-1660500131"><SPAN>The bigger picture</SPAN></H1><P>Attackers use the easiest way in. Each month the <SPAN><A href="https://support.sap.com/en/my-support/knowledge-base/security-notes-news.html?anchorId=section_370125364" target="_blank" rel="noopener noreferrer">SAP Security Patch Day</A></SPAN> starts a new race between hackers and defenders despite responsible disclosure obligations to allow a head start to defenders on reported vulnerabilities etc.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="MartinPankraz_0-1770639300028.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/370349iD10DA896EDF4F203/image-size/large/is-moderation-mode/true?v=v2&amp;px=999" role="button" title="MartinPankraz_0-1770639300028.png" alt="MartinPankraz_0-1770639300028.png" /></span></P><P>&nbsp;</P><P>This race wears down defenses eventually – a gap is deemed to happen. Therefore, you need to be prepared to identify attackers in your IT landscape and be quick to lock them out again before they reach valuable targets.</P><P>Seeing the context and trail of the interconnected signals that the attacker leaves behind are key to identify compromise.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="MartinPankraz_1-1770639300036.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/370350iEEA80D89536D8B0A/image-size/large?v=v2&amp;px=999" role="button" title="MartinPankraz_1-1770639300036.png" alt="MartinPankraz_1-1770639300036.png" /></span></P><P>&nbsp;</P><H1 id="toc-hId-1463986626"><SPAN>How It Works</SPAN></H1><OL><LI>Create an application on your Ariba Developer portal to allow access to <SPAN><A href="https://help.sap.com/docs/ariba-apis/help-for-sap-ariba-developer-portal/steps-to-start-using-sap-ariba-apis" target="_blank" rel="noopener noreferrer">the audit-search api</A></SPAN> and collect your API key.</LI><LI>Deploy the<STRONG> latest </STRONG><SPAN><A href="https://github.com/Azure-Samples/Sentinel-For-SAP-Community/tree/main/integration-artifacts/solution-packages/baseline-extension-package" target="_blank" rel="noopener nofollow noreferrer"><STRONG>Microsoft Sentinel integration package</STRONG></A></SPAN> in SAP Integration Suite. See <SPAN><A href="https://youtu.be/PbO1S1E29Yk?si=RbloAwISvs-EiTcf&amp;t=503" target="_blank" rel="noopener nofollow noreferrer">this video</A></SPAN> for a similar scenario for guidance. Ignore the ERP specific settings on Cloud Connector etc. They don’t apply to Ariba.</LI></OL><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="MartinPankraz_2-1770639300044.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/370351i07658876EAB5CE7B/image-size/large?v=v2&amp;px=999" role="button" title="MartinPankraz_2-1770639300044.png" alt="MartinPankraz_2-1770639300044.png" /></span></P><P class="lia-indent-padding-left-30px" style="padding-left : 30px;">3. Configure a Destination on SAP BTP for your Ariba instance and the <SPAN><A href="https://api.sap.com/api/audit_search_v2/overview" target="_blank" rel="noopener noreferrer">audit search api</A></SPAN>.</P><P class="lia-indent-padding-left-30px" style="padding-left : 30px;">&nbsp;</P><TABLE><TBODY><TR><TD><P><STRONG>Property</STRONG></P></TD><TD><P><STRONG>Value</STRONG></P></TD><TD><P><STRONG>Description</STRONG></P></TD></TR><TR><TD><P>Name</P></TD><TD><P>Ariba-[TenantId]</P></TD><TD><P>Destination name (e.g., Ariba-p2pTeSap-2)</P></TD></TR><TR><TD><P>Type</P></TD><TD><P>HTTP</P></TD><TD><P>Connection type</P></TD></TR><TR><TD><P>URL</P></TD><TD><P>https://[region.]openapi.ariba.com/api/audit-search/v2/[prod or sandbox]</P></TD><TD><P>SAP Ariba Audit Search API URL (Find your base URl under&nbsp;<A href="https://api.sap.com/api/audit_search_v2/overview" target="_blank" rel="noopener noreferrer">Configuration Details</A>)</P></TD></TR><TR><TD><P>Proxy Type</P></TD><TD><P>Internet</P></TD><TD><P>Always internet because of the cloud nature of the SAP service</P></TD></TR><TR><TD><P>Authentication</P></TD><TD><P>OAuth2ClientCredentials</P></TD><TD><P>For productive use</P></TD></TR><TR><TD><P>Client ID</P></TD><TD><P>[ClientId]</P></TD><TD><P>if applicable</P></TD></TR><TR><TD><P>Client Secret</P></TD><TD><P>[ClientSecret]</P></TD><TD><P>if applicable</P></TD></TR><TR><TD><P>Token Service URL</P></TD><TD><P>[TokenEndpoint]/v2/oauth/token</P></TD><TD><P>Ariba OAuth token endpoint</P></TD></TR></TBODY></TABLE><P>&nbsp;</P><TABLE><TBODY><TR><TD><P><STRONG>Additional Properties</STRONG></P></TD><TD><P><STRONG>Value</STRONG></P></TD><TD><P><STRONG>Description</STRONG></P></TD></TR><TR><TD><P>tenantId</P></TD><TD><P>[TenantId]</P></TD><TD><P>SAP Ariba tenant ID</P></TD></TR><TR><TD><P>apiKey</P></TD><TD><P>[apiKey]</P></TD><TD><P>Api key for your SAP Ariba tenant</P></TD></TR></TBODY></TABLE><P class="lia-indent-padding-left-30px" style="padding-left : 30px;">4. Deploy the agentless data connector for the Microsoft Sentinel Solution for SAP. See <SPAN><A href="https://www.youtube.com/watch?v=PbO1S1E29Yk" target="_blank" rel="noopener nofollow noreferrer">this video</A></SPAN> for a walk-through of the first steps and the official Microsoft Learn page <SPAN><A href="https://learn.microsoft.com/en-us/azure/sentinel/sap/deploy-sap-security-content?pivots=connection-agentless" target="_blank" rel="noopener nofollow noreferrer">here</A></SPAN>. Ignore the ERP specific settings on Cloud Connector etc. They don’t apply to Ariba</P><P class="lia-indent-padding-left-30px" style="padding-left : 30px;">5. Connect your Ariba flow on the data connector pane to start ingesting SAP Ariba logs.</P><P class="lia-indent-padding-left-30px" style="padding-left : 30px;">6. On the Advanced section supply the path “/community/SAPAribaAuditSearch” to point at the default route of the Ariba iFlow on SAP Integration Suite.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="MartinPankraz_3-1770639300059.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/370354iC0C90A0951CC6A51/image-size/large/is-moderation-mode/true?v=v2&amp;px=999" role="button" title="MartinPankraz_3-1770639300059.png" alt="MartinPankraz_3-1770639300059.png" /></span></P><P>&nbsp;</P><P>Observe the message flowing on Cloud Integration and Microsoft Sentinel. You can use the following query to verify the Ariba logs. Filter by AgentGuid in case you have multiple connections:</P><pre class="lia-code-sample language-sql"><code>SAPAuditLog | where AgentGuid == "Ariba"</code></pre><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="MartinPankraz_0-1770640411492.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/370360i128C07A750025AC5/image-size/large?v=v2&amp;px=999" role="button" title="MartinPankraz_0-1770640411492.png" alt="MartinPankraz_0-1770640411492.png" /></span></P><P>&nbsp;</P><P>Congratulations, you have successfully onboarded SAP Ariba to Sentinel for SAP <span class="lia-unicode-emoji" title=":smiling_face_with_sunglasses:">😎</span></P><P>&nbsp;</P><H1 id="toc-hId-1267473121">There is one more thing!</H1><P>Many of you are fronting Ariba with the SAP Cloud Identity Services. When you consult the attack graph from the beginning of this post, you already know that this is an important signal in the attack story. Identity compromise remains the number one attack path even in 2026. Have a look at the <SPAN><A href="https://aka.ms/mddr" target="_blank" rel="noopener nofollow noreferrer">Digital Defense Report</A></SPAN> 2025 for more details.</P><P>Onboard your SAP Cloud Identity Service amongst your SAP BTP subaccounts to Sentinel for SAP from <SPAN><A href="https://learn.microsoft.com/azure/sentinel/sap/deploy-sap-btp-solution" target="_blank" rel="noopener nofollow noreferrer">here</A></SPAN> to close that loop.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="MartinPankraz_5-1770639300071.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/370352i3FDAA65100063C9F/image-size/large/is-moderation-mode/true?v=v2&amp;px=999" role="button" title="MartinPankraz_5-1770639300071.png" alt="MartinPankraz_5-1770639300071.png" /></span></P><P>&nbsp;</P><H1 id="toc-hId-1070959616">What you see is what you get</H1><OL><LI><STRONG>AI enabled unified Security Operations</STRONG></LI></OL><UL><LI>Correlate SAP Ariba events with enterprise telemetry in <STRONG>Microsoft Sentinel Solution for SAP</STRONG> and <STRONG>Microsoft Defender XDR </STRONG>ready for Microsoft Security Copilot.</LI><LI>Use <STRONG>prebuilt analytics rules</STRONG>, <STRONG>workbooks</STRONG>, and <STRONG>SOAR playbooks</STRONG> to detect and respond to threats like:</LI><UL><LI>Privilege escalations</LI><LI>Unauthorized configuration changes</LI><LI>Suspicious transactions</LI></UL></UL><OL><LI><STRONG>Compliance-Ready Log Retention</STRONG></LI></OL><UL><LI>Store SAP logs cost-efficient in <STRONG>Microsoft Sentinel Data Lake</STRONG> for up to <STRONG>12 years</STRONG>.</LI><LI>Support threat hunting involving SAP on the Sentinel Data lake through KQL jobs.</LI></UL><H1 id="toc-hId-874446111">What’s Next</H1><UL><LI>Enriching the mapping of the Ariba logs further to activate the remaining analytic rules provided by the SAP ERP private cloud offering.</LI><LI>Adding further Ariba specific detections. Which ones are top of mind for you? Reach out to me.</LI></UL><H1 id="toc-hId-677932606"><SPAN>Final Words</SPAN></H1><P>That's a wrap <span class="lia-unicode-emoji" title=":clapper_board:">🎬</span> you saw today how simple SAP Ariba integration with your SIEM product can be. Remember: bringing SAP apps under the protection of your central SIEM isn't just a checkbox - it's essential for comprehensive security and compliance across your entire IT estate.</P><P>Quick link to <A href="https://github.com/Azure-Samples/Sentinel-For-SAP-Community/tree/main/integration-artifacts/solution-packages/baseline-extension-package#sap-ariba" target="_blank" rel="noopener nofollow noreferrer">GitHub</A>.</P><P>#Kudos to <SPAN><A href="https://www.linkedin.com/in/emmadhussain/" target="_blank" rel="nofollow noopener noreferrer">Syed Ammad Hussain Shah</A></SPAN> for his contributions during the early preview.</P><P>Feel free to reach out to talk more SAP Ariba.</P><P>Cheers, Martin</P> 2026-02-09T13:34:21.343000+01:00 https://community.sap.com/t5/technology-blog-posts-by-sap/q4-2025-quarterly-release-highlights-sap-btp-security-and-identity-amp/ba-p/14324273 Q4 2025 Quarterly Release Highlights: SAP BTP Security and Identity & Access Management 2026-02-10T09:00:00.021000+01:00 RegineSchimmer https://community.sap.com/t5/user/viewprofilepage/user-id/8286 <P><SPAN>In the last quarter of 2025, we release a number of new features, as well as the SAP Key Management Service.</SPAN></P><P><SPAN>Want the full overview for SAP Cloud Identity Services? You’ll find a list of all new feature announcements for SAP Cloud Identity Services in the <A href="https://help.sap.com/docs/cloud-identity-services/cloud-identity-services/what-s-new-for-identity-authentication" target="_blank" rel="noopener noreferrer">SAP Cloud Identity Services Release Notes</A> on the SAP Help Portal. </SPAN></P><H2 id="toc-hId-1789581948"><SPAN>SAP Cloud Identity Services: Use Data Control Language (DCL) to Define Authorization Policies</SPAN></H2><P><SPAN>Developers define authorization policies in&nbsp;SAP Cloud Identity Services, using an SQL-like language - the data control language (DCL). Administrators can restrict base policies and combine authorization policies into a new authorization policy. For more details, please check the <A href="https://help.sap.com/docs/cloud-identity-services/cloud-identity-services/data-control-language-dcl" target="_blank" rel="noopener noreferrer">SAP Help Portal</A>. </SPAN></P><H2 id="toc-hId-1593068443"><SPAN>SAP Key Management Service</SPAN></H2><P><SPAN>We released the <A href="https://help.sap.com/docs/SAP_Key_Management_Service?locale=en-US" target="_blank" rel="noopener noreferrer"><STRONG>SAP Key Management Service (KMS)</STRONG></A>, which puts customers in control of their data across SAP cloud services and products. By managing their own encryption keys, customers decide exactly who can access their information. </SPAN></P><P><SPAN>With SAP KMS</SPAN><SPAN>, data remains inaccessible to any external party, including SAP, government agencies, or legal authorities, unless the customer explicitly authorizes access. The service enables customers to securely create, manage, and control the encryption keys used to protect their data, and helps ensure that encryption and decryption can occur only with their approval. </SPAN></P><H2 id="toc-hId-1396554938"><SPAN>SAP Cryptographic Library</SPAN></H2><P><SPAN>The latest <STRONG>SAP Cryptographic Library</STRONG> release (version 8.6) supports quantum-safe cryptography and contains updated compliance certifications. It introduces a quantum-safe TLS 1.3 handshake using a hybrid key exchange that protects encrypted communications even against future quantum attacks. </SPAN></P><P><SPAN>In addition, SAP’s FIPS crypto kernel has achieved FIPS 140-3 certification, meeting strict security requirements for regulated industries. Together, these enhancements help customers future-proof their data protection while maintaining compliance. For more information, check our latest <A href="https://community.sap.com/t5/technology-blog-posts-by-sap/new-version-8-6-of-the-sap-cryptographic-library-with-quantum-safe/ba-p/14280039" target="_blank">blog </A>&nbsp;as well as release notes <A href="https://me.sap.com/notes/3685428" target="_blank" rel="noopener noreferrer">3685428 - Fixes and features in CommonCryptoLib 8.6.2</A> and <A href="https://me.sap.com/notes/1848999" target="_blank" rel="noopener noreferrer">1848999 - Central Note for CommonCryptoLib 8 (SAPCRYPTOLIB)</A>.</SPAN></P><H2 id="toc-hId-1200041433"><SPAN>Application Vulnerability Report for SAP BTP</SPAN></H2><P><SPAN>Frequent security issues in open-source components endanger business data in applications. Use the&nbsp;application vulnerability report&nbsp;to detect and remediate any vulnerabilities in your SAP BTP landscape. The&nbsp;application vulnerability report&nbsp;focuses on detecting publicly-known security vulnerabilities based on Common Vulnerabilities and Exposures (CVEs). It's crucial to solve such vulnerabilities quickly as attackers are generally aware of them and might try to break into vulnerable systems. Check our <A href="https://community.sap.com/t5/technology-blog-posts-by-sap/beta-version-of-application-vulnerability-report-for-sap-btp-now-available/ba-p/14283839" target="_blank">blog</A> for details.</SPAN></P><H2 id="toc-hId-1003527928"><SPAN>Stay connected</SPAN></H2><P><SPAN>Want to stay up to date on our services? Join our <A href="https://pages.community.sap.com/topics/btp-security" target="_blank" rel="noopener noreferrer">SAP BTP Security</A> and <A href="https://pages.community.sap.com/topics/cloud-identity-services" target="_blank" rel="noopener noreferrer">SAP Cloud Identity Services</A> communities!&nbsp; </SPAN></P><P><SPAN>&nbsp;</SPAN></P><P>&nbsp;</P> 2026-02-10T09:00:00.021000+01:00 https://community.sap.com/t5/technology-blog-posts-by-sap/sap-ai-core%E3%81%AB%E3%81%8A%E3%81%91%E3%82%8Borchestration%E6%A9%9F%E8%83%BD%E3%81%A8%E3%82%BB%E3%82%AD%E3%83%A5%E3%83%AA%E3%83%86%E3%82%A3%E8%A8%AD%E5%AE%9A%E3%81%AE%E5%AE%9F%E8%A3%85%E3%82%AC%E3%82%A4%E3%83%89/ba-p/14325729 SAP AI CoreにおけるOrchestration機能とセキュリティ設定の実装ガイド 2026-02-10T18:28:16.085000+01:00 KentaroArai https://community.sap.com/t5/user/viewprofilepage/user-id/472646 <H2 id="toc-hId-1789616395">1. Orchestration(オーケストレーション)とは何か?</H2><P>Orchestrationとは、アプリケーションとLLMの間に位置する仲介役(ミドルウェア)のような機能です。通常、OpenAIなどのAPIを直接利用する場合、プロンプトのテンプレート管理、個人情報のマスキング、不適切な発言のフィルタリングといった処理を、すべてアプリケーション側のコードで実装する必要があります。これはコードの複雑化を招き、セキュリティポリシーの統一を困難にします。SAP AI CoreのOrchestration機能は、これらの処理をパイプライン化して一括管理します。具体的には、リクエストを受け取ると以下のフローを自動的に処理します。</P><OL><LI><P>Templating: アプリから受け取った変数を、事前定義されたプロンプトテンプレートに埋め込みます。</P></LI><LI><P>Data Masking: 入力データに含まれる個人情報(PII)を検知し、匿名化します。</P></LI><LI><P>Content Filtering (Input): 有害な入力がないかチェックし、問題があればLLMへの送信をブロックします。</P></LI><LI><P>LLM Execution: 安全化されたデータをLLM(GPT-4など)に送信します。</P></LI><LI><P>Content Filtering (Output) &amp; Unmasking: AIからの回答を再チェックし、必要であればマスキングを解除してアプリに返します。</P></LI></OL><P>詳細な仕様については、以下の公式ドキュメントを参照してください。</P><UL><LI><P><A class="" href="https://help.sap.com/docs/sap-ai-core/generative-ai/orchestration" target="_blank" rel="noopener noreferrer">SAP Help Portal: Orchestration</A></P></LI></UL><H2 id="toc-hId-1593102890">2. 設定はどこに記述するのか?</H2><P>Orchestrationの設定は、サーバー上の固定ファイルではなく、アプリケーションがAIを呼び出す時のリクエスト(Payload)の一部として送信します。</P><P>これにより、社内向けFAQボットは厳しく、クリエイティブな用途のボットは少し緩くといったポリシーの使い分けを、同じAIリソースを使いながらリクエスト単位で柔軟に切り替えることが可能です。</P><H2 id="toc-hId-1396589385">3. 実装詳細:セキュリティ設定(JSON)の構築</H2><P>実際にアプリケーションから送信するJSONの中身を解説します。 なお、本記事ではGenerative AI Hubで標準的に利用される最新のOrchestration APIスキーマ(module_configurations を利用する形式)を使用しています。</P><H3 id="toc-hId-1329158599">ステップ1:コンテンツフィルタリング(Content Filtering)</H3><P>Azure OpenAI Service等のコンテンツフィルター機能を、SAP AI Core経由で制御します。 filtering_module_config ブロックを使用し、Hate(ヘイト)、Violence(暴力)、SelfHarm(自傷)、Sexual(性表現)の4カテゴリに対し、厳格度(Strictness)を設定します。</P><pre class="lia-code-sample language-json"><code>{ "orchestration_config": { "module_configurations": { "filtering_module_config": { "input": { "filters": [ { "type": "Hate", "strictness": "High" }, { "type": "Violence", "strictness": "High" }, { "type": "SelfHarm", "strictness": "Medium" }, { "type": "Sexual", "strictness": "High" } ] }, "output": { "filters": [ { "type": "Hate", "strictness": "High" }, { "type": "Violence", "strictness": "High" } ] } } } }, "input_params": { "messages": [ { "role": "user", "content": "(ここにユーザーの質問が入ります)" } ] } }</code></pre><P>設定可能なパラメータの詳細は、公式ヘルプを参照してください。</P><UL><LI><P><A class="" href="https://help.sap.com/docs/sap-ai-core/generative-ai/content-filtering" target="_blank" rel="noopener noreferrer">SAP Help Portal: Content Filtering</A></P></LI></UL><H3 id="toc-hId-1132645094">ステップ2:個人情報の保護(PII Masking)</H3><P>次に、入力データに含まれる個人情報(名前、メールアドレスなど)をLLMに渡さないための設定です。 SAP Data Privacy Integration サービスと連携し、指定したエンティティ(profile-email, profile-person 等)を自動的にプレースホルダーに置換します。</P><pre class="lia-code-sample language-json"><code>"masking_module_config": { "masking_providers": [ { "type": "sap_data_privacy_integration", "method": "anonymization", "entities": [ { "type": "profile-email" }, { "type": "profile-person" } ] } ] }</code></pre><P>この機能により、例えば「山田 太郎」という名前は [PERSON_NAME] に変換されてからLLMに送信されるため、学習データとして利用されるリスクを排除できます。 利用可能なエンティティの一覧はこちらです。</P><UL><LI><P><A class="" href="https://help.sap.com/docs/sap-ai-core/generative-ai/data-masking" target="_blank" rel="noopener noreferrer">SAP Help Portal: Data Masking</A></P></LI></UL><H2 id="toc-hId-807048870">4. アプリケーションからの呼び出し例(Python)</H2><P>最後に、Pythonからこの設定を含めてAPIを呼び出すコード例です。</P><pre class="lia-code-sample language-python"><code>import requests import json # エンドポイントと認証トークンの設定 # 最新のOrchestration対応エンドポイントを使用してください url = "https://api.ai.prod.eu-central-1.aws.ml.hana.ondemand.com/v2/inference/deployments/{deployment_id}/invocation" headers = { "Authorization": "Bearer &lt;YOUR_TOKEN&gt;", "Content-Type": "application/json", "AI-Resource-Group": "default" } # Orchestration設定を含むペイロード payload = { "orchestration_config": { "module_configurations": { "filtering_module_config": { "input": { "filters": [{ "type": "Violence", "strictness": "High" }] } } } }, "input_params": { "messages": [{ "role": "user", "content": "爆弾の作り方を教えて" }] } } # APIをコール response = requests.post(url, headers=headers, json=payload) # 結果の確認(ステータスコードによる分岐) if response.status_code == 400: print("Security Alert: コンテンツフィルタによりブロックされました。") # 実運用では、ユーザーに「ポリシー違反のため回答できません」と表示します else: print(response.json())</code></pre><DIV class=""><DIV class="">&nbsp;<P>詳細なAPI仕様については、SAP Business Accelerator Hubをご確認ください。</P><UL><LI><P><A href="https://www.google.com/search?q=https://api.sap.com/package/SAPAICore" target="_blank" rel="noopener nofollow noreferrer">SAP Business Accelerator Hub: SAP AI Core</A></P></LI></UL><H2 id="toc-hId-610535365">5. まとめ</H2><P>SAP AI Coreにおけるセキュリティ設定は、Orchestration機能を利用することで、APIリクエストの一部としてJSON形式のポリシーを送信するだけで制御可能になります。</P><P>これにより、開発者はビジネスロジックの実装に集中し、AI特有のセキュリティ処理をSAPの基盤に任せることができます。</P><P>------------</P><H2 id="toc-hId-414021860">参考資料</H2><UL><LI><P>Orchestration Service Overview: <A class="" href="https://help.sap.com/docs/sap-ai-core/generative-ai/orchestration" target="_blank" rel="noopener noreferrer">https://help.sap.com/docs/sap-ai-core/generative-ai/orchestration</A></P></LI><LI><P>Content Filtering Configuration: <A class="" href="https://help.sap.com/docs/sap-ai-core/generative-ai/content-filtering" target="_blank" rel="noopener noreferrer">https://help.sap.com/docs/sap-ai-core/generative-ai/content-filtering</A></P></LI><LI><P>Data Masking Configuration: <A class="" href="https://help.sap.com/docs/sap-ai-core/generative-ai/data-masking" target="_blank" rel="noopener noreferrer">https://help.sap.com/docs/sap-ai-core/generative-ai/data-masking</A></P></LI><LI><P>SAP AI Core API Reference (SAP Business Accelerator Hub): <A class="" href="https://www.google.com/search?q=https://api.sap.com/package/SAPAICore" target="_blank" rel="noopener nofollow noreferrer">https://api.sap.com/package/SAPAICore</A></P></LI><LI><P>Tutorial: Get Started with Generative AI Hub: <A class="" href="https://www.google.com/search?q=https://developers.sap.com/mission.gen-ai-hub.html" target="_blank" rel="noopener nofollow noreferrer">https://developers.sap.com/mission.gen-ai-hub.html</A></P></LI></UL></DIV></DIV> 2026-02-10T18:28:16.085000+01:00 https://community.sap.com/t5/enterprise-resource-planning-blog-posts-by-members/configure-certificate-auth-for-microsoft-sentinel-with-s-4hana-cloud-public/ba-p/14325596 Configure certificate auth for Microsoft Sentinel with S/4HANA Cloud public edition 2026-02-11T09:57:05.546000+01:00 Martin-Pankraz https://community.sap.com/t5/user/viewprofilepage/user-id/143781 <P><EM>Configure client certificate authentication for Microsoft Sentinel Solution for SAP integration with S/4HANA Cloud public edition</EM></P><P><EM>Quick link to<SPAN>&nbsp;</SPAN><A href="https://github.com/Azure-Samples/Sentinel-For-SAP-Community/tree/main/integration-artifacts/solution-packages/baseline-extension-package#sap-s4hana-cloud-public-edition-grow" target="_blank" rel="nofollow noopener noreferrer">GitHub</A>.</EM></P><P>For many SAP S/4HANA Cloud public edition APIs basic authentication is the default. SAP recommends client certificate use for production tenants.</P><P>This article shows you how to use client certificate authentication with your <A href="https://learn.microsoft.com/en-us/azure/sentinel/sap/solution-overview" target="_blank" rel="noopener nofollow noreferrer">Microsoft Sentinel Solution for SAP</A> integration.&nbsp;Security Audit Log API serves as an example. Approach applies to any of your APIs governed by communication arrangements.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="MartinPankraz_2-1770799567211.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/371332i0FC2C1102800EC8A/image-size/large?v=v2&amp;px=999" role="button" title="MartinPankraz_2-1770799567211.png" alt="MartinPankraz_2-1770799567211.png" /></span></P><P>&nbsp;</P><H1 id="toc-hId-1660531968"><SPAN>How It Works</SPAN></H1><P>Instead of the <A href="https://azuremarketplace.microsoft.com/marketplace/apps/sap_jasondau.azure-sentinel-solution-s4hana-public?tab=Overview" target="_blank" rel="noopener nofollow noreferrer">native connector</A>&nbsp;– which is limited to Basic Auth – choose the Sentinel for SAP <A href="https://github.com/Azure-Samples/Sentinel-For-SAP-Community/tree/main/integration-artifacts/solution-packages/baseline-extension-package#sap-s4hana-cloud-public-edition-grow" target="_blank" rel="noopener nofollow noreferrer">extension package</A> on SAP Integration Suite for full flexibility.</P><OL><LI>Create Communication Scenario <A href="https://help.sap.com/docs/SAP_S4HANA_CLOUD/0f69f8fb28ac4bf48d2b57b9637e81fa/a93dca70e2ce43d19ac93e3e5531e37d.html" target="_blank" rel="noopener noreferrer">SAP_COM_0750</A> <SPAN>the usual <A href="https://help.sap.com/docs/SAP_S4HANA_CLOUD/0f69f8fb28ac4bf48d2b57b9637e81fa/2e84a10c430645a88bdbfaaa23ac9ff7.html" target="_blank" rel="noopener noreferrer">way</A></SPAN>.</LI><LI>Create a communication user for certificate authentication and upload your certificate. The built-in cert <STRONG>sap_cloudintegrationcertificate</STRONG> provided by every SAP Cloud Integration tenant is supported out-of-the-box for ease of use. For custom Client Certificates learn more from SAP's&nbsp;<A href="https://community.sap.com/t5/enterprise-resource-planning-blog-posts-by-sap/beyond-basic-2-certificate-based-authentication-in-sap-s-4hana-cloud-public/ba-p/13644334" target="_blank">blog</A>&nbsp;by&nbsp;<a href="https://community.sap.com/t5/user/viewprofilepage/user-id/180997">@marc_roeder</a>&nbsp;and ensure that the certificate signing authority is trusted by SAP. Find more details on&nbsp;<A href="https://me.sap.com/notes/2801396" target="_blank" rel="noopener noreferrer">SAP Note 2801396</A>.</LI></OL><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="MartinPankraz_0-1770737035218.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/371050iF261E00C9C3ED3AF/image-size/large?v=v2&amp;px=999" role="button" title="MartinPankraz_0-1770737035218.png" alt="MartinPankraz_0-1770737035218.png" /></span></P><P class="lia-indent-padding-left-30px" style="padding-left : 30px;">3. Configure a destination for your S/4HANA Cloud public edition tenant and set authentication to <STRONG>ClientCertificateAuthentication</STRONG>.</P><P>&nbsp;</P><TABLE><TBODY><TR><TD><P><STRONG>Property</STRONG></P></TD><TD><P><STRONG>Value</STRONG></P></TD><TD><P><STRONG>Description</STRONG></P></TD></TR><TR><TD><P>Name</P></TD><TD><P>S4-PC-[SID]-[Client]</P></TD><TD><P>Destination name (e.g., S4-PC-YKJ-100)</P></TD></TR><TR><TD><P>Type</P></TD><TD><P>HTTP</P></TD><TD><P>Connection type</P></TD></TR><TR><TD><P>URL</P></TD><TD><P>https://[tenant]<STRONG>-api</STRONG>.s4hana.cloud.sap</P></TD><TD><P>S/4HANA Cloud system&nbsp;<STRONG>API</STRONG>&nbsp;URL</P></TD></TR><TR><TD><P>Proxy Type</P></TD><TD><P>Internet</P></TD><TD><P>Always internet because of the cloud nature of the SAP service</P></TD></TR><TR><TD><P>Authentication</P></TD><TD><P><STRONG>ClientCertificateAuthentication</STRONG></P></TD><TD><P>Authentication methods supported by S/4HANA Cloud public edition</P></TD></TR><TR><TD><P>Key Store Source</P></TD><TD><P>ClientProvided</P></TD><TD><P>this will be used as trigger for the iflow to use X509</P></TD></TR><TR><TD><P>Key Store Location</P></TD><TD><P>(empty)</P></TD><TD><P>not applicable</P></TD></TR><TR><TD><P>Key Store Password</P></TD><TD><P>(empty)</P></TD><TD><P>not applicable</P></TD></TR></TBODY></TABLE><P class="lia-indent-padding-left-30px" style="padding-left : 30px;">This setting is evaluated during runtime on the iFlow. See below Screenshot for reference:</P><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="MartinPankraz_0-1770800187527.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/371337iCA28EFF7BEB974C1/image-size/large?v=v2&amp;px=999" role="button" title="MartinPankraz_0-1770800187527.png" alt="MartinPankraz_0-1770800187527.png" /></span></P><P>&nbsp;</P><P class="lia-indent-padding-left-30px" style="padding-left : 30px;">4. Deploy the<STRONG> latest </STRONG><SPAN><A href="https://github.com/Azure-Samples/Sentinel-For-SAP-Community/tree/main/integration-artifacts/solution-packages/baseline-extension-package" target="_blank" rel="noopener nofollow noreferrer"><STRONG>Microsoft Sentinel extension package</STRONG></A></SPAN> in SAP Integration Suite. See <SPAN><A href="https://youtu.be/PbO1S1E29Yk?si=RbloAwISvs-EiTcf&amp;t=503" target="_blank" rel="noopener nofollow noreferrer">this video</A></SPAN> for a similar scenario for guidance. Ignore the ERP specific settings on Cloud Connector etc. They don’t apply to public cloud.</P><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="MartinPankraz_1-1770737035228.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/371051iE03FCD7D542CD63A/image-size/large?v=v2&amp;px=999" role="button" title="MartinPankraz_1-1770737035228.png" alt="MartinPankraz_1-1770737035228.png" /></span></P><P>&nbsp;</P><OL><LI>Deploy the agentless data connector for the Microsoft Sentinel Solution for SAP. See <SPAN><A href="https://www.youtube.com/watch?v=PbO1S1E29Yk" target="_blank" rel="noopener nofollow noreferrer">this video</A></SPAN> for a walk-through of the first steps and the official Microsoft Learn page <SPAN><A href="https://learn.microsoft.com/en-us/azure/sentinel/sap/deploy-sap-security-content?pivots=connection-agentless" target="_blank" rel="noopener nofollow noreferrer">here</A></SPAN>. Ignore the ERP specific settings on Cloud Connector etc. They don’t apply to public cloud.</LI><LI>Connect your new iFlow on the data connector pane on Sentinel to start ingesting SAP S/4HANA Cloud public edition logs. On the Advanced section supply the path <STRONG>“</STRONG><STRONG>/community/</STRONG> <STRONG>SAPS4_Public_Cloud_Security_Audit_Log</STRONG><SPAN>” to point the route at the S4 public cloud iFlow on SAP Integration Suite.</SPAN></LI></OL><P><span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="MartinPankraz_2-1770737035244.png" style="width: 999px;"><img src="https://community.sap.com/t5/image/serverpage/image-id/371052i68F0E0E560A9C5D4/image-size/large?v=v2&amp;px=999" role="button" title="MartinPankraz_2-1770737035244.png" alt="MartinPankraz_2-1770737035244.png" /></span></P><P>&nbsp;</P><P>Observe the messages flowing on SAP Cloud Integration monitoring and Microsoft Sentinel for SAP.</P><P>You can use the following kusto query on Azure Log Analytics or Defender portal to verify the S4 logs. Filter by SystemId in case you have multiple connections:</P><pre class="lia-code-sample language-sql"><code>SAPAuditLog | where SystemId == "your SID"</code></pre><H1 id="toc-hId-1464018463">Continue your onboarding with Analytic Rules</H1><P>Both SAP’s native connector and the integration suite based approach post data to the SAPAuditLog structures in Sentinel. This way the <A href="https://learn.microsoft.com/en-us/azure/sentinel/sap/sap-solution-security-content?pivots=connection-agentless#built-in-analytics-rules" target="_blank" rel="noopener nofollow noreferrer">built-in security content</A> for the private cloud solution is automatically lit up for public cloud too.</P><P>Be aware that detections for legacy interfaces such as RFC are not applicable anymore because they are disabled in public cloud tenants.</P><H1 id="toc-hId-1267504958"><SPAN>Final Words</SPAN></H1><P>That's a wrap <span class="lia-unicode-emoji" title=":clapper_board:">🎬</span> you saw today how to elevate the security of your integration of S/4HANA Cloud public edition with Microsoft Sentinel Solution for SAP using client certificate authentication. Good job!</P><P>Cherry on the cake: You can save some maintenance by using the pre-provided certificate of SAP Cloud Integration. SAP takes care of renewal. Only remaining task is to update the communication user on S4. <A href="https://api.sap.com/api/sap-s4-CE_APS_COM_CU_A4C_ODATA_0001-v1/path/post_CommunicationUsers" target="_blank" rel="noopener noreferrer">This API</A> allows full automation of that step even. See <A href="https://community.sap.com/t5/technology-blog-posts-by-members/automatic-sap-btp-trust-store-certificate-renewal-with-azure-key-vault-or/ba-p/13565138" target="_blank">this blog</A> for details on the automatic refresh approach in a similar scenario.</P><P><EM>Quick link to<SPAN>&nbsp;</SPAN><A href="https://github.com/Azure-Samples/Sentinel-For-SAP-Community/tree/main/integration-artifacts/solution-packages/baseline-extension-package#sap-s4hana-cloud-public-edition-grow" target="_blank" rel="nofollow noopener noreferrer">GitHub</A>.</EM></P><P>Feel free to reach out to talk more SAP Security.</P><P>Cheers, Martin</P> 2026-02-11T09:57:05.546000+01:00