SlideShare a Scribd company logo
1 of 34
Download to read offline
SAP Single Sign-On 2.0 
Overview Presentation 
June 2014 Public
Legal disclaimer 
This presentation is not subject to your license agreement or any other agreement with SAP. SAP has 
no obligation to pursue any course of business outlined in this presentation or to develop or release 
any functionality mentioned in this presentation. This presentation and SAP's strategy and possible 
future developments are subject to change and may be changed by SAP at any time for any reason 
without notice. This document is provided without a warranty of any kind, either express or implied, 
including but not limited to, the implied warranties of merchantability, fitness for a particular purpose, or 
non-infringement. SAP assumes no responsibility for errors or omissions in this document, except if 
such damages were caused by SAP intentionally or grossly negligent. 
© 2014 SAP AG or an SAP affiliate company. All rights reserved. Public 2
Agenda 
SAP Portfolio 
Overview SAP Single Sign-On 
Single Sign-On Scenarios 
Architecture 
What’s New in Support Package 03 
Recommendations 
Summary 
© 2014 SAP AG or an SAP affiliate company. All rights reserved. Public 3
SAP Portfolio
SAP Identity and Access Management Solutions 
Compliant Identity and Access Management 
Simplify and secure 
access 
SAP 
Single Sign-On 
Manage identities and 
permissions 
SAP 
Identity Management 
Identify and mitigate 
risks 
SAP Access Control 
© 2014 SAP AG or an SAP affiliate company. All rights reserved. Public 5
Overview SAP Single Sign-On
SAP Single Sign-On – What is it about? 
Authenticate once and subsequently access SAP and 
non-SAP applications in a secure and user-friendly way. 
Meet company and regulatory requirements. 
Improve security measures and protect your company. 
© 2014 SAP AG or an SAP affiliate company. All rights reserved. Public 7
SAP Single Sign-On – Benefits 
Security 
Reduce Costs 
Simplicity 
© 2014 SAP AG or an SAP affiliate company. All rights reserved. Public 8
SAP Single Sign-On – Benefits in Detail 
Solve security and compliance 
issues caused by 
• Re-use of passwords 
• Password patterns 
• Trivial passwords 
• Passwords on post-it notes 
• Leaked passwords 
Solve productivity issues 
caused by 
y Large number of 
manual logins 
y Forgotten passwords 
y Help desk calls 
Only one secure (!) password 
to remember 
Only one password to store 
and protect 
Automated login while you 
work 
© 2014 SAP AG or an SAP affiliate company. All rights reserved. Public 9
Single Sign-On Scenarios
Business User Expectations 
SAP GUI 
SAP NetWeaver 
Business Client 
SAP Business 
Explorer 
Web 
Browser 
… 
Easy and secure access 
© 2014 SAP AG or an SAP affiliate company. All rights reserved. Public 11
SAP Single Sign-On 2.0 
Key Capabilities 
• Single sign-on for SAP and non-SAP applications 
• Support of proprietary SAP clients (e.g. SAP GUI) 
• Secure network communication (SNC) 
• SSO for cloud-based applications 
• Based on standards like X.509 certificates, 
SPNEGO, Kerberos, SAML 
• Password Manager 
SAP HANA and 
SAP NetWeaver 
SAP Business Suite 
SAP and non-SAP applications 
Cloud and 
cross-company 
SAP Single Sign-On 
Password Manager 
© 2014 SAP AG or an SAP affiliate company. All rights reserved. Public 12
SAP Business Suite 
Single Sign-On Based on Kerberos / SPNEGO 
SAP Business Suite 
Secure Login Client 
Secure Login Library 
SPNEGO for ABAP 
Microsoft Active 
Directory 
Token: Kerberos 
SPNEGO only 
available in newer 
SAP NetWeaver 
releases 
SAP Business Suite 
SAP NetWeaver 
SAP client (native) 
Web client 
© 2014 SAP AG or an SAP affiliate company. All rights reserved. Public 13
SAP and Non-SAP Applications 
Single Sign-On Based on X.509 Certificates 
SAP and non- 
SAP applications 
Secure Login Client 
Secure Login Server 
Secure Login Library 
Microsoft Active 
Directory, LDAP, 
other login modules 
Token: X.509 
certificate 
This option supports 
most platforms and 
clients. 
Recommended for 
heterogeneous and 
intranet scenarios 
SAP Business Suite 
SAP NetWeaver 
SAP client (native) 
Web client 
Non-SAP 
Legacy systems 
© 2014 SAP AG or an SAP affiliate company. All rights reserved. Public 14
Cloud and Cross-Company 
Single Sign-On and Identity Federation Based on SAML 
SAP and non-SAP 
applications 
SAML identity 
provider 
Microsoft Active 
Directory, LDAP, 
other login modules 
Token: SAML 
SAML is a public 
standard for Web 
applications. The 
application server has 
to support the 
standard. 
Recommended for 
extranet scenarios, 
partner integration 
SAP / non-SAP 
Web applications 
Cloud applications 
Web client 
Web client 
© 2014 SAP AG or an SAP affiliate company. All rights reserved. Public 15
Secure Storage of Remaining Passwords 
Password Manager 
SAP and non- 
SAP applications 
Password Manager 
Stand-alone 
Based on user name 
and password 
Secure storage of 
remaining passwords 
in a local client. 
Provides automatic 
capture of login 
credentials 
© 2014 SAP AG or an SAP affiliate company. All rights reserved. Public 16
Architecture
SAP Single Sign-On – Components 
Secure Login Client 
y Client application 
y Manages security tokens (Kerberos tokens, X.509 certificates) 
Secure Login Server 
y Central service on SAP NetWeaver AS Java 
y Provides X.509 certificates to users and application servers 
Secure Login Library 
y Cryptography and security library for SAP NetWeaver AS ABAP 
Identity Provider 
y Central service on SAP NetWeaver AS Java 
y Provides SAML 2.0 assertions for Web-based SSO 
© 2014 SAP AG or an SAP affiliate company. All rights reserved. Public 18
Single Sign-On Based on Kerberos / SPNEGO 
Start SAP GUI or Browser 
1 
2 
Client 
SAP GUI / NWBC / 
Browser 
Secure Login Client 
Windows HTTPS (SPNEGO) 
Authentication 
3 
User Desktop 
SAP NetWeaver 
AS ABAP 
Secure Login Library 
NW AS JAVA 
DIAG, RFC (SNC) 
HTTPS (SPNEGO) 
Single Sign-On and 
Secure Communication 
Kerberos 
Token 
In a Nutshell 
• Relies on „Integrated Windows 
Authentication“ 
• Kerberos Security Token 
created by Microsoft Active 
Directory (AD) 
• No additional server required, 
low TCO 
• SAP backend needs to trust 
the AD 
• SPNEGO requires ABAP 
version 7.02 or higher 
• Kerberos/SPNEGO SSO 
supported by e.g. AS ABAP, 
AS Java, HANA DB, … 
Microsoft 
Active 
Directory (AD) 
SAP NetWeaver 
AS Java 
© 2014 SAP AG or an SAP affiliate company. All rights reserved. Public 19
Single Sign-On Based on X.509 Certificates 
Client 
SAP GUI / NWBC / 
Secure Login Client 
User Desktop 
Sign into Secure Login Client profile 
1 
2 
3 
SAP GUI / Browser / 
Browser 
NWBC 
Secure Login Client 
6 
Authenticate 
5 
Provide X.509 
Certificate 
Authentication 
Server 
4 
Verify User 
Credentials 
NW AS JAVA 
DIAG, RFC (SNC) 
HTTPS 
HTTPS 
Single Sign-On and 
Secure Communication 
In a Nutshell 
• Relies on X.509 certificate, a 
very mature standard security 
token 
• Certificates created by Secure 
Login Server (or other PKI) 
• SLS provides short-lived 
certificates, no overhead for 
revocation management 
• Multiple ways of user credential 
verification (SPNEGO, LDAP, 
ABAP, UME,...) 
• Support for SAP backends, but 
also for legacy systems, 3rd 
party Web applications,… 
• Secure Login Server requires 
AS Java 
SAP NetWeaver 
AS Java 
Secure Login Server 
(SLS) 
SAP NetWeaver 
AS ABAP 
Secure Login Library 
NW AS JAVA 
SAP NetWeaver 
AS Java 
© 2014 SAP AG or an SAP affiliate company. All rights reserved. Public 20
Single Sign-On Based on SAML 
2 
Authenticate 
Return SAML 
Assertion 
4 
Authentication 
SAP NetWeaver 
AS Java 
Identity Provider 
(IDP) 
HTTPS Service 
HTTPS 
NW AS JAVA 
Service Provider 
(SP) 
Provider (SP) 
Service 
Provider (SP) 
In a Nutshell 
• Relies on Security Assertion 
Markup Language (SAML) 
assertions as security token 
• Industry standard for cloud 
and cross-company scenarios 
• Assertions created by Identity 
Provider, running on AS Java 
• Authentication initiated by 
IDP or SP 
• Multiple ways of user 
credential verification 
(SPNEGO, LDAP, 
ABAP, UME,..) 
Client 
Browser 
5 Single Sign-On and 
Secure Communication 
1 User Desktop 
Server 
3 
Verify User 
Credentials 
Service Provider 
(SP) 
© 2014 SAP AG or an SAP affiliate company. All rights reserved. Public 21
What’s New in Support 
Package 03
Two-Factor Authentication with SAP Authenticator 
Two-Factor Authentication 
Authentication with One-Time Passwords (OTP) 
Provide two means of identification 
y OTP required for login in addition to password or security token 
y Second factor for high security scenarios 
Based on SAP Authenticator iOS Application 
y OTP (6-digit code) created on mobile device 
Usage Scenarios 
Integrated with Secure Login Server (X.509) and Identity Provider (SAML) 
y Administrator configures SAP NetWeaver AS Java system to require two-factor authentication 
For Web and SAP GUI scenarios 
© 2014 SAP AG or an SAP affiliate company. All rights reserved. Public 23
SSO for SAP GUI for Java on Mac OS X 
Secure Login Client for Mac Client Computers 
Mac OS X 10.7 or higher 
Usage Scenarios 
Kerberos-based authentication 
X.509 certificates 
For SAP GUI scenarios 
© 2014 SAP AG or an SAP affiliate company. All rights reserved. Public 24
RFID-Based User Identification 
Identify Users with RFID Token (Radio Frequency 
Identification) 
Only privileged persons have physical access 
Instant user identification with RFID token 
Based on X.509 certificates 
Usage Scenarios 
Warehouse and production scenarios 
Kiosk/terminal computers 
© 2014 SAP AG or an SAP affiliate company. All rights reserved. Public 25
Hardware Security Module Support 
Hardware Security Module Support for Digital Signatures 
Store Private Keys in Hardware 
y Protect Secure Login Server Certificate Authority 
y Protect private keys for digital signatures (Secure Store and Forward, SSF) 
y Performance acceleration 
Thales SafeNet 
© 2014 SAP AG or an SAP affiliate company. All rights reserved. Public 26
Recommendations
Recommendations 
9 Identify the most critical systems. Which systems contain your most sensitive business information? 
How many people have access to them? Define your overall single sign-on strategy and start with 
these critical business systems. 
Understand the different modules of SAP Single Sign-On and analyze your system landscape to 
determine which SSO standards can be used. If your organization does not have the appropriate 
resources and know-how, involve SAP Consulting or SAP partners. 
Passwords are often the weakest link in enterprises. Prevent the usage of passwords by relying on 
standards such as SAML, X.509 certificates, or Kerberos. SAP Single Sign-On offers solutions for 
all of these standards. 
Once you have implemented single sign-on, start enforcing strong passwords in the related systems. 
Mid-term strategy: Consider disabling user name/password authentication in critical business 
systems. 
Provide a tool to store remaining passwords (such as the Password Manager component of SAP 
Single Sign-On). 
9 
9 
9 
9 
© 2014 SAP AG or an SAP affiliate company. All rights reserved. Public 28
Summary
Extensible Technology – Ready for the Future 
SAP 
Business Suite 
SAP and non-SAP 
applications 
Cloud and 
cross-company 
© 2014 SAP AG or an SAP affiliate company. All rights reserved. Public 30
Summary 
SAP Single Sign-On is a “Single Sign-On Suite” that 
supports SAP as well as non-SAP applications. 
It offers 
• Investment protection 
• Flexibility 
• Single sign-on for heterogeneous system landscapes 
What are the main business drivers? 
• Protect business, reputation and trust 
• Lower password related costs 
• Simplicity and agility 
© 2014 SAP AG or an SAP affiliate company. All rights reserved. Public 31
Get More Information 
Community Network 
Get more information, videos and updates 
http://scn.sap.com/community/sso 
© 2014 SAP AG or an SAP affiliate company. All rights reserved. Public 32
Thank you 
Contact information: 
Product Management 
SAP AG 
© 2014 SAP AG or an SAP affiliate company. All rights reserved.
© 2014 SAP AG or an SAP affiliate company. All rights reserved. 
No part of this publication may be reproduced or transmitted in any form or for any purpose without the express permission of SAP AG or an SAP affiliate company. 
SAP and other SAP products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of SAP AG (or an SAP affiliate 
company) in Germany and other countries. Please see http://global12.sap.com/corporate-en/legal/copyright/index.epx for additional trademark information and notices. 
Some software products marketed by SAP AG and its distributors contain proprietary software components of other software vendors. 
National product specifications may vary. 
These materials are provided by SAP AG or an SAP affiliate company for informational purposes only, without representation or warranty of any kind, and SAP AG or its 
affiliated companies shall not be liable for errors or omissions with respect to the materials. The only warranties for SAP AG or SAP affiliate company products and services 
are those that are set forth in the express warranty statements accompanying such products and services, if any. Nothing herein should be construed as constituting an 
additional warranty. 
In particular, SAP AG or its affiliated companies have no obligation to pursue any course of business outlined in this document or any related presentation, or to develop or 
release any functionality mentioned therein. This document, or any related presentation, and SAP AG’s or its affiliated companies’ strategy and possible future 
developments, products, and/or platform directions and functionality are all subject to change and may be changed by SAP AG or its affiliated companies at any time for 
any reason without notice. The information in this document is not a commitment, promise, or legal obligation to deliver any material, code, or functionality. All forward-looking 
statements are subject to various risks and uncertainties that could cause actual results to differ materially from expectations. Readers are cautioned not to place 
undue reliance on these forward-looking statements, which speak only as of their dates, and they should not be relied upon in making purchasing decisions. 
© 2014 SAP AG or an SAP affiliate company. All rights reserved. Public 34

More Related Content

What's hot

SAP Identity Management Overview
SAP Identity Management OverviewSAP Identity Management Overview
SAP Identity Management OverviewSAP Technology
 
sap hana|sap hana database| Introduction to sap hana
sap hana|sap hana database| Introduction to sap hanasap hana|sap hana database| Introduction to sap hana
sap hana|sap hana database| Introduction to sap hanaJames L. Lee
 
SAP HANA SPS08 Scale-Out, High Availability and Disaster Recovery
SAP HANA SPS08 Scale-Out, High Availability and Disaster RecoverySAP HANA SPS08 Scale-Out, High Availability and Disaster Recovery
SAP HANA SPS08 Scale-Out, High Availability and Disaster Recovery SAP Technology
 
S4 HANA presentation.pptx
S4 HANA presentation.pptxS4 HANA presentation.pptx
S4 HANA presentation.pptxNiranjanPatro2
 
Take the Next Step to S/4HANA with "RISE with SAP"
Take the Next Step to S/4HANA with "RISE with SAP"Take the Next Step to S/4HANA with "RISE with SAP"
Take the Next Step to S/4HANA with "RISE with SAP"panayaofficial
 
SAP HANA SPS10- Backup/Recovery
SAP HANA SPS10- Backup/RecoverySAP HANA SPS10- Backup/Recovery
SAP HANA SPS10- Backup/RecoverySAP Technology
 
Migrating Critical Workloads at Scale: Best Practice for SAP Migration - AWS ...
Migrating Critical Workloads at Scale: Best Practice for SAP Migration - AWS ...Migrating Critical Workloads at Scale: Best Practice for SAP Migration - AWS ...
Migrating Critical Workloads at Scale: Best Practice for SAP Migration - AWS ...Amazon Web Services
 
Sap s 4 hana client strategy
Sap s 4 hana client strategySap s 4 hana client strategy
Sap s 4 hana client strategyssuser017e8f
 
BW Migration to HANA Part 3 - Post-processing on the Migrated System
BW Migration to HANA Part 3 - Post-processing on the Migrated SystemBW Migration to HANA Part 3 - Post-processing on the Migrated System
BW Migration to HANA Part 3 - Post-processing on the Migrated SystemLinh Nguyen
 
Decoding SAP S/4HANA System Conversion
Decoding SAP S/4HANA System ConversionDecoding SAP S/4HANA System Conversion
Decoding SAP S/4HANA System ConversionAkilesh Kumaran
 

What's hot (20)

SAP Identity Management Overview
SAP Identity Management OverviewSAP Identity Management Overview
SAP Identity Management Overview
 
Apple Captive Network Assistant Bypass with ClearPass Guest
Apple Captive Network Assistant Bypass with ClearPass GuestApple Captive Network Assistant Bypass with ClearPass Guest
Apple Captive Network Assistant Bypass with ClearPass Guest
 
sap hana|sap hana database| Introduction to sap hana
sap hana|sap hana database| Introduction to sap hanasap hana|sap hana database| Introduction to sap hana
sap hana|sap hana database| Introduction to sap hana
 
SAP HANA SPS08 Scale-Out, High Availability and Disaster Recovery
SAP HANA SPS08 Scale-Out, High Availability and Disaster RecoverySAP HANA SPS08 Scale-Out, High Availability and Disaster Recovery
SAP HANA SPS08 Scale-Out, High Availability and Disaster Recovery
 
SAP Fiori ppt
SAP Fiori pptSAP Fiori ppt
SAP Fiori ppt
 
S4 HANA presentation.pptx
S4 HANA presentation.pptxS4 HANA presentation.pptx
S4 HANA presentation.pptx
 
Migrating to SAP S/4HANA
Migrating to SAP S/4HANAMigrating to SAP S/4HANA
Migrating to SAP S/4HANA
 
Take the Next Step to S/4HANA with "RISE with SAP"
Take the Next Step to S/4HANA with "RISE with SAP"Take the Next Step to S/4HANA with "RISE with SAP"
Take the Next Step to S/4HANA with "RISE with SAP"
 
SAP ECC to S/4HANA Move
SAP ECC to S/4HANA MoveSAP ECC to S/4HANA Move
SAP ECC to S/4HANA Move
 
SAP HANA Platform
SAP HANA Platform SAP HANA Platform
SAP HANA Platform
 
SAP - SOLUTION MANAGER
SAP - SOLUTION MANAGER SAP - SOLUTION MANAGER
SAP - SOLUTION MANAGER
 
SAP HANA SPS10- Backup/Recovery
SAP HANA SPS10- Backup/RecoverySAP HANA SPS10- Backup/Recovery
SAP HANA SPS10- Backup/Recovery
 
Migrating Critical Workloads at Scale: Best Practice for SAP Migration - AWS ...
Migrating Critical Workloads at Scale: Best Practice for SAP Migration - AWS ...Migrating Critical Workloads at Scale: Best Practice for SAP Migration - AWS ...
Migrating Critical Workloads at Scale: Best Practice for SAP Migration - AWS ...
 
SAP Cloud Strategy
SAP Cloud StrategySAP Cloud Strategy
SAP Cloud Strategy
 
Sap s 4 hana client strategy
Sap s 4 hana client strategySap s 4 hana client strategy
Sap s 4 hana client strategy
 
SAP S/4 HANA Technical assessment before migration
SAP S/4 HANA Technical assessment before migrationSAP S/4 HANA Technical assessment before migration
SAP S/4 HANA Technical assessment before migration
 
BW Migration to HANA Part 3 - Post-processing on the Migrated System
BW Migration to HANA Part 3 - Post-processing on the Migrated SystemBW Migration to HANA Part 3 - Post-processing on the Migrated System
BW Migration to HANA Part 3 - Post-processing on the Migrated System
 
Azure: PaaS or IaaS
Azure: PaaS or IaaSAzure: PaaS or IaaS
Azure: PaaS or IaaS
 
Decoding SAP S/4HANA System Conversion
Decoding SAP S/4HANA System ConversionDecoding SAP S/4HANA System Conversion
Decoding SAP S/4HANA System Conversion
 
Sap basis made easy
Sap basis made easySap basis made easy
Sap basis made easy
 

Similar to SAP Single Sign-On 2.0 Overview Presentation

SAP HANA Cloud Platform: The void between your Datacenter and the Cloud
SAP HANA Cloud Platform: The void between your Datacenter and the CloudSAP HANA Cloud Platform: The void between your Datacenter and the Cloud
SAP HANA Cloud Platform: The void between your Datacenter and the CloudSAP HANA Cloud Platform
 
SAP HANA Cloud Platform - Overview
SAP HANA Cloud Platform - OverviewSAP HANA Cloud Platform - Overview
SAP HANA Cloud Platform - OverviewMatthias Steiner
 
Desenvolvimento JAVA orientado à SAP HANA Cloud Platform
Desenvolvimento JAVA orientado à SAP HANA Cloud PlatformDesenvolvimento JAVA orientado à SAP HANA Cloud Platform
Desenvolvimento JAVA orientado à SAP HANA Cloud PlatformRui Nogueira
 
Breeze overview
Breeze overviewBreeze overview
Breeze overviewYang Cheng
 
SAP HANA Cloud: From Your Datacenter to the Cloud and Back
SAP HANA Cloud: From Your Datacenter to the Cloud and Back  SAP HANA Cloud: From Your Datacenter to the Cloud and Back
SAP HANA Cloud: From Your Datacenter to the Cloud and Back SAP HANA Cloud Platform
 
Accelerate2022-Solving the SAP Security Gap through Application-aware Network...
Accelerate2022-Solving the SAP Security Gap through Application-aware Network...Accelerate2022-Solving the SAP Security Gap through Application-aware Network...
Accelerate2022-Solving the SAP Security Gap through Application-aware Network...PeterSmetny1
 
Gateway Deployment Options
Gateway Deployment OptionsGateway Deployment Options
Gateway Deployment OptionsGaurav Ahluwalia
 
160d74ec 597c-0010-82c7-eda71af511fa
160d74ec 597c-0010-82c7-eda71af511fa160d74ec 597c-0010-82c7-eda71af511fa
160d74ec 597c-0010-82c7-eda71af511faNagendra Babu
 
Exploiting Critical Attack Vectors to Gain Control of SAP Systems
Exploiting Critical Attack Vectors to Gain Control of SAP SystemsExploiting Critical Attack Vectors to Gain Control of SAP Systems
Exploiting Critical Attack Vectors to Gain Control of SAP SystemsOnapsis Inc.
 
SAP TechEd 2013: CD105: Extending SuccessFactors EmployeeCentral with apps on...
SAP TechEd 2013: CD105: Extending SuccessFactors EmployeeCentral with apps on...SAP TechEd 2013: CD105: Extending SuccessFactors EmployeeCentral with apps on...
SAP TechEd 2013: CD105: Extending SuccessFactors EmployeeCentral with apps on...SAP HANA Cloud Platform
 
Penetration Testing SAP Systems
Penetration Testing SAP SystemsPenetration Testing SAP Systems
Penetration Testing SAP SystemsOnapsis Inc.
 
2017 sitNL Cloud Foundry Masterclass
2017 sitNL Cloud Foundry Masterclass2017 sitNL Cloud Foundry Masterclass
2017 sitNL Cloud Foundry MasterclassTed Castelijns
 
What is SAP API Management_.pdf
What is SAP API Management_.pdfWhat is SAP API Management_.pdf
What is SAP API Management_.pdfBilawalAmeen
 
SAP HANA Cloud Portal
SAP HANA Cloud PortalSAP HANA Cloud Portal
SAP HANA Cloud PortalAmir Blich
 
SAP HANA Cloud Portal - Overview Presentation
SAP HANA Cloud Portal - Overview PresentationSAP HANA Cloud Portal - Overview Presentation
SAP HANA Cloud Portal - Overview PresentationSAP Portal
 
Dissecting and Attacking RMI Frameworks
Dissecting and Attacking RMI FrameworksDissecting and Attacking RMI Frameworks
Dissecting and Attacking RMI FrameworksOnapsis Inc.
 

Similar to SAP Single Sign-On 2.0 Overview Presentation (20)

SAP HANA Cloud Platform: The void between your Datacenter and the Cloud
SAP HANA Cloud Platform: The void between your Datacenter and the CloudSAP HANA Cloud Platform: The void between your Datacenter and the Cloud
SAP HANA Cloud Platform: The void between your Datacenter and the Cloud
 
SAP HANA Cloud Platform - Overview
SAP HANA Cloud Platform - OverviewSAP HANA Cloud Platform - Overview
SAP HANA Cloud Platform - Overview
 
Desenvolvimento JAVA orientado à SAP HANA Cloud Platform
Desenvolvimento JAVA orientado à SAP HANA Cloud PlatformDesenvolvimento JAVA orientado à SAP HANA Cloud Platform
Desenvolvimento JAVA orientado à SAP HANA Cloud Platform
 
SUSE Technical Webinar: Build HANA Apps in the Framework of the SAP and SUSE ...
SUSE Technical Webinar: Build HANA Apps in the Framework of the SAP and SUSE ...SUSE Technical Webinar: Build HANA Apps in the Framework of the SAP and SUSE ...
SUSE Technical Webinar: Build HANA Apps in the Framework of the SAP and SUSE ...
 
Breeze overview
Breeze overviewBreeze overview
Breeze overview
 
SAP HANA Cloud – Virtual Bootcamp Securing SAP HANA Cloud Applications
SAP HANA Cloud – Virtual BootcampSecuring SAP HANA Cloud Applications SAP HANA Cloud – Virtual BootcampSecuring SAP HANA Cloud Applications
SAP HANA Cloud – Virtual Bootcamp Securing SAP HANA Cloud Applications
 
SAP HANA Cloud: From Your Datacenter to the Cloud and Back
SAP HANA Cloud: From Your Datacenter to the Cloud and Back  SAP HANA Cloud: From Your Datacenter to the Cloud and Back
SAP HANA Cloud: From Your Datacenter to the Cloud and Back
 
Google Technical Webinar - Building Mashups with Google Apps and SAP, using S...
Google Technical Webinar - Building Mashups with Google Apps and SAP, using S...Google Technical Webinar - Building Mashups with Google Apps and SAP, using S...
Google Technical Webinar - Building Mashups with Google Apps and SAP, using S...
 
Accelerate2022-Solving the SAP Security Gap through Application-aware Network...
Accelerate2022-Solving the SAP Security Gap through Application-aware Network...Accelerate2022-Solving the SAP Security Gap through Application-aware Network...
Accelerate2022-Solving the SAP Security Gap through Application-aware Network...
 
Gateway Deployment Options
Gateway Deployment OptionsGateway Deployment Options
Gateway Deployment Options
 
Notes
NotesNotes
Notes
 
160d74ec 597c-0010-82c7-eda71af511fa
160d74ec 597c-0010-82c7-eda71af511fa160d74ec 597c-0010-82c7-eda71af511fa
160d74ec 597c-0010-82c7-eda71af511fa
 
Exploiting Critical Attack Vectors to Gain Control of SAP Systems
Exploiting Critical Attack Vectors to Gain Control of SAP SystemsExploiting Critical Attack Vectors to Gain Control of SAP Systems
Exploiting Critical Attack Vectors to Gain Control of SAP Systems
 
SAP TechEd 2013: CD105: Extending SuccessFactors EmployeeCentral with apps on...
SAP TechEd 2013: CD105: Extending SuccessFactors EmployeeCentral with apps on...SAP TechEd 2013: CD105: Extending SuccessFactors EmployeeCentral with apps on...
SAP TechEd 2013: CD105: Extending SuccessFactors EmployeeCentral with apps on...
 
Penetration Testing SAP Systems
Penetration Testing SAP SystemsPenetration Testing SAP Systems
Penetration Testing SAP Systems
 
2017 sitNL Cloud Foundry Masterclass
2017 sitNL Cloud Foundry Masterclass2017 sitNL Cloud Foundry Masterclass
2017 sitNL Cloud Foundry Masterclass
 
What is SAP API Management_.pdf
What is SAP API Management_.pdfWhat is SAP API Management_.pdf
What is SAP API Management_.pdf
 
SAP HANA Cloud Portal
SAP HANA Cloud PortalSAP HANA Cloud Portal
SAP HANA Cloud Portal
 
SAP HANA Cloud Portal - Overview Presentation
SAP HANA Cloud Portal - Overview PresentationSAP HANA Cloud Portal - Overview Presentation
SAP HANA Cloud Portal - Overview Presentation
 
Dissecting and Attacking RMI Frameworks
Dissecting and Attacking RMI FrameworksDissecting and Attacking RMI Frameworks
Dissecting and Attacking RMI Frameworks
 

More from SAP Technology

SAP Integration Suite L1
SAP Integration Suite L1SAP Integration Suite L1
SAP Integration Suite L1SAP Technology
 
Future-Proof Your Business Processes by Automating SAP S/4HANA processes with...
Future-Proof Your Business Processes by Automating SAP S/4HANA processes with...Future-Proof Your Business Processes by Automating SAP S/4HANA processes with...
Future-Proof Your Business Processes by Automating SAP S/4HANA processes with...SAP Technology
 
7 Top Reasons to Automate Processes with SAP Intelligent Robotic Processes Au...
7 Top Reasons to Automate Processes with SAP Intelligent Robotic Processes Au...7 Top Reasons to Automate Processes with SAP Intelligent Robotic Processes Au...
7 Top Reasons to Automate Processes with SAP Intelligent Robotic Processes Au...SAP Technology
 
Extend SAP S/4HANA to deliver real-time intelligent processes
Extend SAP S/4HANA to deliver real-time intelligent processesExtend SAP S/4HANA to deliver real-time intelligent processes
Extend SAP S/4HANA to deliver real-time intelligent processesSAP Technology
 
Process optimization and automation for SAP S/4HANA with SAP’s Business Techn...
Process optimization and automation for SAP S/4HANA with SAP’s Business Techn...Process optimization and automation for SAP S/4HANA with SAP’s Business Techn...
Process optimization and automation for SAP S/4HANA with SAP’s Business Techn...SAP Technology
 
Accelerate your journey to SAP S/4HANA with SAP’s Business Technology Platform
Accelerate your journey to SAP S/4HANA with SAP’s Business Technology PlatformAccelerate your journey to SAP S/4HANA with SAP’s Business Technology Platform
Accelerate your journey to SAP S/4HANA with SAP’s Business Technology PlatformSAP Technology
 
Accelerate Your Move to an Intelligent Enterprise with SAP Cloud Platform and...
Accelerate Your Move to an Intelligent Enterprise with SAP Cloud Platform and...Accelerate Your Move to an Intelligent Enterprise with SAP Cloud Platform and...
Accelerate Your Move to an Intelligent Enterprise with SAP Cloud Platform and...SAP Technology
 
Transform your business with intelligent insights and SAP S/4HANA
Transform your business with intelligent insights and SAP S/4HANATransform your business with intelligent insights and SAP S/4HANA
Transform your business with intelligent insights and SAP S/4HANASAP Technology
 
SAP Cloud Platform for SAP S/4HANA: Accelerate your move to an Intelligent En...
SAP Cloud Platform for SAP S/4HANA: Accelerate your move to an Intelligent En...SAP Cloud Platform for SAP S/4HANA: Accelerate your move to an Intelligent En...
SAP Cloud Platform for SAP S/4HANA: Accelerate your move to an Intelligent En...SAP Technology
 
Innovate collaborative applications with SAP Jam Collaboration & SAP Cloud Pl...
Innovate collaborative applications with SAP Jam Collaboration & SAP Cloud Pl...Innovate collaborative applications with SAP Jam Collaboration & SAP Cloud Pl...
Innovate collaborative applications with SAP Jam Collaboration & SAP Cloud Pl...SAP Technology
 
The IoT Imperative for Consumer Products
The IoT Imperative for Consumer ProductsThe IoT Imperative for Consumer Products
The IoT Imperative for Consumer ProductsSAP Technology
 
The IoT Imperative for Discrete Manufacturers - Automotive, Aerospace & Defen...
The IoT Imperative for Discrete Manufacturers - Automotive, Aerospace & Defen...The IoT Imperative for Discrete Manufacturers - Automotive, Aerospace & Defen...
The IoT Imperative for Discrete Manufacturers - Automotive, Aerospace & Defen...SAP Technology
 
IoT is Enabling a New Era of Shareholder Value in Energy and Natural Resource...
IoT is Enabling a New Era of Shareholder Value in Energy and Natural Resource...IoT is Enabling a New Era of Shareholder Value in Energy and Natural Resource...
IoT is Enabling a New Era of Shareholder Value in Energy and Natural Resource...SAP Technology
 
The IoT Imperative in Government and Healthcare
The IoT Imperative in Government and HealthcareThe IoT Imperative in Government and Healthcare
The IoT Imperative in Government and HealthcareSAP Technology
 
SAP S/4HANA Finance and the Digital Core
SAP S/4HANA Finance and the Digital CoreSAP S/4HANA Finance and the Digital Core
SAP S/4HANA Finance and the Digital CoreSAP Technology
 
Five Reasons To Skip SAP Suite on HANA and Go Directly to SAP S/4HANA
Five Reasons To Skip SAP Suite on HANA and Go Directly to SAP S/4HANAFive Reasons To Skip SAP Suite on HANA and Go Directly to SAP S/4HANA
Five Reasons To Skip SAP Suite on HANA and Go Directly to SAP S/4HANASAP Technology
 
SAP Helps Reduce Silos Between Business and Spatial Data
SAP Helps Reduce Silos Between Business and Spatial DataSAP Helps Reduce Silos Between Business and Spatial Data
SAP Helps Reduce Silos Between Business and Spatial DataSAP Technology
 
Spotlight on Financial Services with Calypso and SAP ASE
Spotlight on Financial Services with Calypso and SAP ASESpotlight on Financial Services with Calypso and SAP ASE
Spotlight on Financial Services with Calypso and SAP ASESAP Technology
 
SAP ASE 16 SP02 Performance Features
SAP ASE 16 SP02 Performance FeaturesSAP ASE 16 SP02 Performance Features
SAP ASE 16 SP02 Performance FeaturesSAP Technology
 

More from SAP Technology (20)

SAP Integration Suite L1
SAP Integration Suite L1SAP Integration Suite L1
SAP Integration Suite L1
 
Future-Proof Your Business Processes by Automating SAP S/4HANA processes with...
Future-Proof Your Business Processes by Automating SAP S/4HANA processes with...Future-Proof Your Business Processes by Automating SAP S/4HANA processes with...
Future-Proof Your Business Processes by Automating SAP S/4HANA processes with...
 
7 Top Reasons to Automate Processes with SAP Intelligent Robotic Processes Au...
7 Top Reasons to Automate Processes with SAP Intelligent Robotic Processes Au...7 Top Reasons to Automate Processes with SAP Intelligent Robotic Processes Au...
7 Top Reasons to Automate Processes with SAP Intelligent Robotic Processes Au...
 
Extend SAP S/4HANA to deliver real-time intelligent processes
Extend SAP S/4HANA to deliver real-time intelligent processesExtend SAP S/4HANA to deliver real-time intelligent processes
Extend SAP S/4HANA to deliver real-time intelligent processes
 
Process optimization and automation for SAP S/4HANA with SAP’s Business Techn...
Process optimization and automation for SAP S/4HANA with SAP’s Business Techn...Process optimization and automation for SAP S/4HANA with SAP’s Business Techn...
Process optimization and automation for SAP S/4HANA with SAP’s Business Techn...
 
Accelerate your journey to SAP S/4HANA with SAP’s Business Technology Platform
Accelerate your journey to SAP S/4HANA with SAP’s Business Technology PlatformAccelerate your journey to SAP S/4HANA with SAP’s Business Technology Platform
Accelerate your journey to SAP S/4HANA with SAP’s Business Technology Platform
 
Accelerate Your Move to an Intelligent Enterprise with SAP Cloud Platform and...
Accelerate Your Move to an Intelligent Enterprise with SAP Cloud Platform and...Accelerate Your Move to an Intelligent Enterprise with SAP Cloud Platform and...
Accelerate Your Move to an Intelligent Enterprise with SAP Cloud Platform and...
 
Transform your business with intelligent insights and SAP S/4HANA
Transform your business with intelligent insights and SAP S/4HANATransform your business with intelligent insights and SAP S/4HANA
Transform your business with intelligent insights and SAP S/4HANA
 
SAP Cloud Platform for SAP S/4HANA: Accelerate your move to an Intelligent En...
SAP Cloud Platform for SAP S/4HANA: Accelerate your move to an Intelligent En...SAP Cloud Platform for SAP S/4HANA: Accelerate your move to an Intelligent En...
SAP Cloud Platform for SAP S/4HANA: Accelerate your move to an Intelligent En...
 
Innovate collaborative applications with SAP Jam Collaboration & SAP Cloud Pl...
Innovate collaborative applications with SAP Jam Collaboration & SAP Cloud Pl...Innovate collaborative applications with SAP Jam Collaboration & SAP Cloud Pl...
Innovate collaborative applications with SAP Jam Collaboration & SAP Cloud Pl...
 
The IoT Imperative for Consumer Products
The IoT Imperative for Consumer ProductsThe IoT Imperative for Consumer Products
The IoT Imperative for Consumer Products
 
The IoT Imperative for Discrete Manufacturers - Automotive, Aerospace & Defen...
The IoT Imperative for Discrete Manufacturers - Automotive, Aerospace & Defen...The IoT Imperative for Discrete Manufacturers - Automotive, Aerospace & Defen...
The IoT Imperative for Discrete Manufacturers - Automotive, Aerospace & Defen...
 
IoT is Enabling a New Era of Shareholder Value in Energy and Natural Resource...
IoT is Enabling a New Era of Shareholder Value in Energy and Natural Resource...IoT is Enabling a New Era of Shareholder Value in Energy and Natural Resource...
IoT is Enabling a New Era of Shareholder Value in Energy and Natural Resource...
 
The IoT Imperative in Government and Healthcare
The IoT Imperative in Government and HealthcareThe IoT Imperative in Government and Healthcare
The IoT Imperative in Government and Healthcare
 
SAP S/4HANA Finance and the Digital Core
SAP S/4HANA Finance and the Digital CoreSAP S/4HANA Finance and the Digital Core
SAP S/4HANA Finance and the Digital Core
 
Five Reasons To Skip SAP Suite on HANA and Go Directly to SAP S/4HANA
Five Reasons To Skip SAP Suite on HANA and Go Directly to SAP S/4HANAFive Reasons To Skip SAP Suite on HANA and Go Directly to SAP S/4HANA
Five Reasons To Skip SAP Suite on HANA and Go Directly to SAP S/4HANA
 
SAP Helps Reduce Silos Between Business and Spatial Data
SAP Helps Reduce Silos Between Business and Spatial DataSAP Helps Reduce Silos Between Business and Spatial Data
SAP Helps Reduce Silos Between Business and Spatial Data
 
Why SAP HANA?
Why SAP HANA?Why SAP HANA?
Why SAP HANA?
 
Spotlight on Financial Services with Calypso and SAP ASE
Spotlight on Financial Services with Calypso and SAP ASESpotlight on Financial Services with Calypso and SAP ASE
Spotlight on Financial Services with Calypso and SAP ASE
 
SAP ASE 16 SP02 Performance Features
SAP ASE 16 SP02 Performance FeaturesSAP ASE 16 SP02 Performance Features
SAP ASE 16 SP02 Performance Features
 

Recently uploaded

Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 

Recently uploaded (20)

DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 

SAP Single Sign-On 2.0 Overview Presentation

  • 1. SAP Single Sign-On 2.0 Overview Presentation June 2014 Public
  • 2. Legal disclaimer This presentation is not subject to your license agreement or any other agreement with SAP. SAP has no obligation to pursue any course of business outlined in this presentation or to develop or release any functionality mentioned in this presentation. This presentation and SAP's strategy and possible future developments are subject to change and may be changed by SAP at any time for any reason without notice. This document is provided without a warranty of any kind, either express or implied, including but not limited to, the implied warranties of merchantability, fitness for a particular purpose, or non-infringement. SAP assumes no responsibility for errors or omissions in this document, except if such damages were caused by SAP intentionally or grossly negligent. © 2014 SAP AG or an SAP affiliate company. All rights reserved. Public 2
  • 3. Agenda SAP Portfolio Overview SAP Single Sign-On Single Sign-On Scenarios Architecture What’s New in Support Package 03 Recommendations Summary © 2014 SAP AG or an SAP affiliate company. All rights reserved. Public 3
  • 5. SAP Identity and Access Management Solutions Compliant Identity and Access Management Simplify and secure access SAP Single Sign-On Manage identities and permissions SAP Identity Management Identify and mitigate risks SAP Access Control © 2014 SAP AG or an SAP affiliate company. All rights reserved. Public 5
  • 7. SAP Single Sign-On – What is it about? Authenticate once and subsequently access SAP and non-SAP applications in a secure and user-friendly way. Meet company and regulatory requirements. Improve security measures and protect your company. © 2014 SAP AG or an SAP affiliate company. All rights reserved. Public 7
  • 8. SAP Single Sign-On – Benefits Security Reduce Costs Simplicity © 2014 SAP AG or an SAP affiliate company. All rights reserved. Public 8
  • 9. SAP Single Sign-On – Benefits in Detail Solve security and compliance issues caused by • Re-use of passwords • Password patterns • Trivial passwords • Passwords on post-it notes • Leaked passwords Solve productivity issues caused by y Large number of manual logins y Forgotten passwords y Help desk calls Only one secure (!) password to remember Only one password to store and protect Automated login while you work © 2014 SAP AG or an SAP affiliate company. All rights reserved. Public 9
  • 11. Business User Expectations SAP GUI SAP NetWeaver Business Client SAP Business Explorer Web Browser … Easy and secure access © 2014 SAP AG or an SAP affiliate company. All rights reserved. Public 11
  • 12. SAP Single Sign-On 2.0 Key Capabilities • Single sign-on for SAP and non-SAP applications • Support of proprietary SAP clients (e.g. SAP GUI) • Secure network communication (SNC) • SSO for cloud-based applications • Based on standards like X.509 certificates, SPNEGO, Kerberos, SAML • Password Manager SAP HANA and SAP NetWeaver SAP Business Suite SAP and non-SAP applications Cloud and cross-company SAP Single Sign-On Password Manager © 2014 SAP AG or an SAP affiliate company. All rights reserved. Public 12
  • 13. SAP Business Suite Single Sign-On Based on Kerberos / SPNEGO SAP Business Suite Secure Login Client Secure Login Library SPNEGO for ABAP Microsoft Active Directory Token: Kerberos SPNEGO only available in newer SAP NetWeaver releases SAP Business Suite SAP NetWeaver SAP client (native) Web client © 2014 SAP AG or an SAP affiliate company. All rights reserved. Public 13
  • 14. SAP and Non-SAP Applications Single Sign-On Based on X.509 Certificates SAP and non- SAP applications Secure Login Client Secure Login Server Secure Login Library Microsoft Active Directory, LDAP, other login modules Token: X.509 certificate This option supports most platforms and clients. Recommended for heterogeneous and intranet scenarios SAP Business Suite SAP NetWeaver SAP client (native) Web client Non-SAP Legacy systems © 2014 SAP AG or an SAP affiliate company. All rights reserved. Public 14
  • 15. Cloud and Cross-Company Single Sign-On and Identity Federation Based on SAML SAP and non-SAP applications SAML identity provider Microsoft Active Directory, LDAP, other login modules Token: SAML SAML is a public standard for Web applications. The application server has to support the standard. Recommended for extranet scenarios, partner integration SAP / non-SAP Web applications Cloud applications Web client Web client © 2014 SAP AG or an SAP affiliate company. All rights reserved. Public 15
  • 16. Secure Storage of Remaining Passwords Password Manager SAP and non- SAP applications Password Manager Stand-alone Based on user name and password Secure storage of remaining passwords in a local client. Provides automatic capture of login credentials © 2014 SAP AG or an SAP affiliate company. All rights reserved. Public 16
  • 18. SAP Single Sign-On – Components Secure Login Client y Client application y Manages security tokens (Kerberos tokens, X.509 certificates) Secure Login Server y Central service on SAP NetWeaver AS Java y Provides X.509 certificates to users and application servers Secure Login Library y Cryptography and security library for SAP NetWeaver AS ABAP Identity Provider y Central service on SAP NetWeaver AS Java y Provides SAML 2.0 assertions for Web-based SSO © 2014 SAP AG or an SAP affiliate company. All rights reserved. Public 18
  • 19. Single Sign-On Based on Kerberos / SPNEGO Start SAP GUI or Browser 1 2 Client SAP GUI / NWBC / Browser Secure Login Client Windows HTTPS (SPNEGO) Authentication 3 User Desktop SAP NetWeaver AS ABAP Secure Login Library NW AS JAVA DIAG, RFC (SNC) HTTPS (SPNEGO) Single Sign-On and Secure Communication Kerberos Token In a Nutshell • Relies on „Integrated Windows Authentication“ • Kerberos Security Token created by Microsoft Active Directory (AD) • No additional server required, low TCO • SAP backend needs to trust the AD • SPNEGO requires ABAP version 7.02 or higher • Kerberos/SPNEGO SSO supported by e.g. AS ABAP, AS Java, HANA DB, … Microsoft Active Directory (AD) SAP NetWeaver AS Java © 2014 SAP AG or an SAP affiliate company. All rights reserved. Public 19
  • 20. Single Sign-On Based on X.509 Certificates Client SAP GUI / NWBC / Secure Login Client User Desktop Sign into Secure Login Client profile 1 2 3 SAP GUI / Browser / Browser NWBC Secure Login Client 6 Authenticate 5 Provide X.509 Certificate Authentication Server 4 Verify User Credentials NW AS JAVA DIAG, RFC (SNC) HTTPS HTTPS Single Sign-On and Secure Communication In a Nutshell • Relies on X.509 certificate, a very mature standard security token • Certificates created by Secure Login Server (or other PKI) • SLS provides short-lived certificates, no overhead for revocation management • Multiple ways of user credential verification (SPNEGO, LDAP, ABAP, UME,...) • Support for SAP backends, but also for legacy systems, 3rd party Web applications,… • Secure Login Server requires AS Java SAP NetWeaver AS Java Secure Login Server (SLS) SAP NetWeaver AS ABAP Secure Login Library NW AS JAVA SAP NetWeaver AS Java © 2014 SAP AG or an SAP affiliate company. All rights reserved. Public 20
  • 21. Single Sign-On Based on SAML 2 Authenticate Return SAML Assertion 4 Authentication SAP NetWeaver AS Java Identity Provider (IDP) HTTPS Service HTTPS NW AS JAVA Service Provider (SP) Provider (SP) Service Provider (SP) In a Nutshell • Relies on Security Assertion Markup Language (SAML) assertions as security token • Industry standard for cloud and cross-company scenarios • Assertions created by Identity Provider, running on AS Java • Authentication initiated by IDP or SP • Multiple ways of user credential verification (SPNEGO, LDAP, ABAP, UME,..) Client Browser 5 Single Sign-On and Secure Communication 1 User Desktop Server 3 Verify User Credentials Service Provider (SP) © 2014 SAP AG or an SAP affiliate company. All rights reserved. Public 21
  • 22. What’s New in Support Package 03
  • 23. Two-Factor Authentication with SAP Authenticator Two-Factor Authentication Authentication with One-Time Passwords (OTP) Provide two means of identification y OTP required for login in addition to password or security token y Second factor for high security scenarios Based on SAP Authenticator iOS Application y OTP (6-digit code) created on mobile device Usage Scenarios Integrated with Secure Login Server (X.509) and Identity Provider (SAML) y Administrator configures SAP NetWeaver AS Java system to require two-factor authentication For Web and SAP GUI scenarios © 2014 SAP AG or an SAP affiliate company. All rights reserved. Public 23
  • 24. SSO for SAP GUI for Java on Mac OS X Secure Login Client for Mac Client Computers Mac OS X 10.7 or higher Usage Scenarios Kerberos-based authentication X.509 certificates For SAP GUI scenarios © 2014 SAP AG or an SAP affiliate company. All rights reserved. Public 24
  • 25. RFID-Based User Identification Identify Users with RFID Token (Radio Frequency Identification) Only privileged persons have physical access Instant user identification with RFID token Based on X.509 certificates Usage Scenarios Warehouse and production scenarios Kiosk/terminal computers © 2014 SAP AG or an SAP affiliate company. All rights reserved. Public 25
  • 26. Hardware Security Module Support Hardware Security Module Support for Digital Signatures Store Private Keys in Hardware y Protect Secure Login Server Certificate Authority y Protect private keys for digital signatures (Secure Store and Forward, SSF) y Performance acceleration Thales SafeNet © 2014 SAP AG or an SAP affiliate company. All rights reserved. Public 26
  • 28. Recommendations 9 Identify the most critical systems. Which systems contain your most sensitive business information? How many people have access to them? Define your overall single sign-on strategy and start with these critical business systems. Understand the different modules of SAP Single Sign-On and analyze your system landscape to determine which SSO standards can be used. If your organization does not have the appropriate resources and know-how, involve SAP Consulting or SAP partners. Passwords are often the weakest link in enterprises. Prevent the usage of passwords by relying on standards such as SAML, X.509 certificates, or Kerberos. SAP Single Sign-On offers solutions for all of these standards. Once you have implemented single sign-on, start enforcing strong passwords in the related systems. Mid-term strategy: Consider disabling user name/password authentication in critical business systems. Provide a tool to store remaining passwords (such as the Password Manager component of SAP Single Sign-On). 9 9 9 9 © 2014 SAP AG or an SAP affiliate company. All rights reserved. Public 28
  • 30. Extensible Technology – Ready for the Future SAP Business Suite SAP and non-SAP applications Cloud and cross-company © 2014 SAP AG or an SAP affiliate company. All rights reserved. Public 30
  • 31. Summary SAP Single Sign-On is a “Single Sign-On Suite” that supports SAP as well as non-SAP applications. It offers • Investment protection • Flexibility • Single sign-on for heterogeneous system landscapes What are the main business drivers? • Protect business, reputation and trust • Lower password related costs • Simplicity and agility © 2014 SAP AG or an SAP affiliate company. All rights reserved. Public 31
  • 32. Get More Information Community Network Get more information, videos and updates http://scn.sap.com/community/sso © 2014 SAP AG or an SAP affiliate company. All rights reserved. Public 32
  • 33. Thank you Contact information: Product Management SAP AG © 2014 SAP AG or an SAP affiliate company. All rights reserved.
  • 34. © 2014 SAP AG or an SAP affiliate company. All rights reserved. No part of this publication may be reproduced or transmitted in any form or for any purpose without the express permission of SAP AG or an SAP affiliate company. SAP and other SAP products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of SAP AG (or an SAP affiliate company) in Germany and other countries. Please see http://global12.sap.com/corporate-en/legal/copyright/index.epx for additional trademark information and notices. Some software products marketed by SAP AG and its distributors contain proprietary software components of other software vendors. National product specifications may vary. These materials are provided by SAP AG or an SAP affiliate company for informational purposes only, without representation or warranty of any kind, and SAP AG or its affiliated companies shall not be liable for errors or omissions with respect to the materials. The only warranties for SAP AG or SAP affiliate company products and services are those that are set forth in the express warranty statements accompanying such products and services, if any. Nothing herein should be construed as constituting an additional warranty. In particular, SAP AG or its affiliated companies have no obligation to pursue any course of business outlined in this document or any related presentation, or to develop or release any functionality mentioned therein. This document, or any related presentation, and SAP AG’s or its affiliated companies’ strategy and possible future developments, products, and/or platform directions and functionality are all subject to change and may be changed by SAP AG or its affiliated companies at any time for any reason without notice. The information in this document is not a commitment, promise, or legal obligation to deliver any material, code, or functionality. All forward-looking statements are subject to various risks and uncertainties that could cause actual results to differ materially from expectations. Readers are cautioned not to place undue reliance on these forward-looking statements, which speak only as of their dates, and they should not be relied upon in making purchasing decisions. © 2014 SAP AG or an SAP affiliate company. All rights reserved. Public 34