SlideShare ist ein Scribd-Unternehmen logo
1 von 40
Downloaden Sie, um offline zu lesen
Unified Connectivity (UCON) 
Overview 
July 2014 Public
Disclaimer 
This presentation outlines our general product direction and should not be relied on in making a 
purchase decision. This presentation is not subject to your license agreement or any other agreement 
with SAP. SAP has no obligation to pursue any course of business outlined in this presentation or to 
develop or release any functionality mentioned in this presentation. This presentation and SAP's 
strategy and possible future developments are subject to change and may be changed by SAP at any 
time for any reason without notice. This document is provided without a warranty of any kind, either 
express or implied, including but not limited to, the implied warranties of merchantability, fitness for a 
particular purpose, or non-infringement. SAP assumes no responsibility for errors or omissions in this 
document, except if such damages were caused by SAP intentionally or grossly negligent. 
© 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 2
Agenda - UCON RFC Security Basic Scenario 
Motivation and Scope 
Basic Concepts 
Coverage of New RFMs 
How to Cope With the Restrictions of Productive Systems 
Summary 
© 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 3
UCON RFC Security Basic Scenario 
Motivation and Scope
The Scope of UCON RFC Basic Connectivity 
C 
High-performing, 
for local high load scenarios, 
across all ABAP Releases, 
close integration into ABAP 
RFC-Based Connectivity 
© 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 5
UCON - A Simple Approach to Make RFC More Secure 
Reduce the Overall Attack Surface of Your Remote-Enabled 
Function Modules. Enhance RFC security by blocking the 
access to a large number of RFMs ! 
Facts: 
y Most SAP ERP customers run just a limited number of the business 
scenarios for which they need to expose some RFMs 
y A lot of RFMs are only used to parallelize within a system. 
Solution 
y Find out which RFMs need to be exposed for the scenarios of a 
customer. 
y Block the access to all other RFMs. 
© 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 6
The Basic Strategy of UCON to Solve These Problems 
Reduce the number of RFMs exposed to the outside world. 
Expose only and exactly those RFMs a customer needs to run their business scenarios. 
38000 RFMs in 
SAP ERP (incl. 
SAP NetWeaver) 
A typical SAP 
customer only needs 
to expose a few 
hundred RFMs for 
their business 
scenarios 
© 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 7
UCON RFC Security Basic Scenario 
Basic Concepts
The UCON Way to Security: Expose Only Those 
Function Modules You Need to the Outside World 
… 
RF 
M1 
RF 
M2 
RF 
M3 
RF 
M4 
RF 
M5 
RF 
M6 
RF 
M7 
RF 
M8 
RF 
M9 
RF 
M 
RF 
M. 
10 11 
Default Communication Assembly (CA) 
© 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 9
UCON Checks Do not Interfere with Calls Within the Same Client and System 
RF 
M3 
RF 
M5 
RF 
M7 
SAP Business Suite 
Blocked for access 
from outside – 
Open for use in 
parallel RFC inside 
the same client in the 
… 
RF 
M1 
RF 
M. 
… 
same system 
© 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 10
UCON - An Additional Role/User-Independent Layer of Security Checks 
User trying to access a RFM 
no No Access 
RFM in 
CA? 
yes 
no 
User has 
authorization? 
User has authorization 
for the relevant CA? No Access 
yes Access to 
RFM 
© 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 11
UCON Setup and Configuration 
It is simple to set up and configure Unified Connectivity (UCON): 
1. Set the UCON profile parameter UCON/RFC/ACTIVE to 1 to enable UCON runtime checks for RFMs in the 
final phase. 
2. Run the UCON setup to generate a default communication assembly (CA) and other required entities. 
3. Choose a suitable duration of the logging and evaluation phase. 
4. Schedule the batch job SAP_UCON_MANAGEMENT that selects and persists the RFC statistic records 
required by the UCON phase tool on the database. 
© 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 12
UCON RFC Security 
Easy Customer Adoption in Three Steps 
Logging of RFMs 
called from 
outside 
Evaluation/ 
Simulation 
Runtime checks 
active 
© 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 13
UCON RFC Security 
Easy Customer Adoption in Three Steps 
Logging of RFMs 
called from 
outside 
Runtime check 
Runtime Checks 
active 
Evaluation/ 
Simulation 
active 
© 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 14
Phase 1 
Logging of RFC Connectivity Data 
Tool support to use solid information instead of unreliable data 
• Use a dedicated tool set to collect the information you need 
Identify the RFMs you need to expose to run your business 
scenarios 
• Collect aggregated statistic data on which RFMs are called in 
your system from outside 
• Over a time period you can choose 
At the end of phase 1, choose the RFMs you need and assign them 
to the Default CA: 
• Based on the statistical records, you decide which RFMs 
should be accessed from outside and assign them to the CA 
© 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 15
UCON RFC Security 
Easy Customer Adoption in Three Steps 
Logging of RFMs 
Logging of RFMs 
called from 
from 
outside 
outside 
Evaluation/ 
simulation 
Runtime check 
Runtime checks 
active 
Simulation 
Checks 
active 
© 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 16
Phase 2 
Evaluation of the Data Logged 
UCON should not interfere with productive customer scenarios: 
• Use the evaluation phase (phase 2) to simulate UCON 
runtime checks 
• Check completeness of RFMs you need to expose 
• Put required RFMs into Default CA 
Customizable duration of evaluation phase: 
• Duration of evaluation phase depends on in-house experience 
and knowledge 
Check whether you have protected the right RFMs and make 
necessary corrections 
© 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 17
UCON RFC Security 
Easy Customer Adoption in Three Steps 
Logging of RFMs 
Logging of RFMs 
called from 
from 
outside 
outside 
Evaluation/ 
Simulation 
simulation 
Runtime check 
Runtime checks 
active 
Checks 
active 
© 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 18
Phase 3 
The RFMs in the System Are Protected by UCON 
UCON runtime checks are now active: 
• Only RFMs in the default CA are accessible from outside 
• RFM that are not in the Default CA are now protected 
against any outside access 
Less than 5% of all RFMs need to be exposed in a typical 
customer system: 
• Out of a total of 38,000 RFMs in an SAP ERP system, only 
a few hundred are required and exposed for productive 
customer connectivity 
Massive reduction of RFC attack surface for the average 
customer system 
© 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 19
Prerequisites for the Different Security Layers 
Access to RFMs 
UCON 
runtime 
checks 
S_RFC 
checks 
Access to RFMs 
© 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 20
Efforts Required for the Different Security Layers 
Access to RFMs 
UCON 
runtime 
checks 
S_RFC 
checks 
Access to RFMs 
© 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 21
UCON Protection After the Initial UCON Security Classification 
Check-Active Phase 
Blocked RFMs from initial UCON set-up 
100 ++ 
Default CA 
37,000++ 
SAP Business Suite 
Blocked RFMs/ UCON-protected 
RFMs from 
other, new transports or 
installations 
© 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 22
UCON RFC Security Basic Scenario 
Coverage of New Remote-Enabled Function Modules
UCON Protection After Initial Security Classification 
Check-active Phase 
Development 
Protected/ 
blocked 
RFMs 
Default Communication 
Assembly 
Exposed RFMs 
© 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 24
New RFMs Arrive at a UCON-Protected System 
Check-active phase 
Development 
Over time: New RFMs in 
transports, SPs, EhPs … 
© 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 25
New RFMs on Their Way to UCON Protection – Logging Phase 
Logging phase 
Evaluation phase Access allowed 
Access blocked 
UCON protection 
Check-active phase 
Access allowed 
New RFMs are 
automatically 
assigned to the 
logging phase 
© 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 26
New RFMs on Their Way to UCON Protection – Evaluation Phase 
Logging phase 
Access allowed 
Access blocked 
UCON protection 
Evaluation phase 
Check-active phase 
Access allowed 
© 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 27
New RFMs Have Achieved UCON Protection – Check-Active Phase 
Logging phase 
Evaluation phase 
Access blocked 
UCON protection 
Check-active phase 
Access allowed 
© 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 28
The Ever-Growing Scope of UCON Protection 
Blocked RFMs from initial UCON set-up 
Default CA 
SAP Business Suite 
Blocked RFMs 
from other, new 
transports or 
installations 
© 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 29
UCON RFC Security Basic Scenario 
How to Cope With the Restrictions of Productive Systems
UCON and the Restrictions in a Productive System 
Challenges 
PROD 
Assignment of relevant RFMs 
to default CA and UCON 
UCON 
Phase 
Tool 
phases 
Collection 
of RFC call 
statistics 
and UCON 
protection 
Authorizations and system change options in 
Productive Systems are not sufficient for UCON 
Operations 
© 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 31
UCON and the Restrictions in a Productive System 
Solution 
DEV PROD 
UCON 
Phase 
Tool 
Assignment of 
relevant RFMs 
to default CA 
and UCON 
UCON 
Phase 
Tool 
phases 
Collection 
of RFC call 
statistics 
and UCON 
protection 
Delegate 
UCON 
operations 
to DEV 
Slide 32 
© 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 32
UCON and the Restrictions in a Productive System 
How to Delegate UCON Operations to DEV - Step 1 
DEV PROD 
UCON 
Phase Tool 
Import RFC call statistics from 
PROD to DEV 
UCON 
Phase Tool RFC call 
statistics 
.csv 
1 
© 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 33
UCON and the Restrictions in a Productive System 
How to Delegate UCON Operations to DEV - Step 2 
DEV PROD 
UCON 
Phase Tool 
Import RFC call statistics from 
PROD to DEV 
UCON 
Phase Tool RFC call 
statistics 
.csv 
Assign relevant RFMs to 
default CA and to next phase 
1 
2 
© 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 34
UCON and the Restrictions in a Productive System 
How to Delegate UCON Operations to DEV - Step 3 
DEV PROD 
UCON 
Phase Tool 
UCON 
Phase Tool 
Import RFC call statistics from 
PROD to DEV 
UCON 
Phase Tool RFC call 
Assign relevant RFMs to 
default CA and to next phase 
UCON 
Phase Tool 
statistics 
.csv 
Phase and CA assignment 
of RFMs 
R3Trans 
1 
2 
3 
© 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 35
UCON and the Restrictions in a Productive System 
How to Delegate UCON Operations to DEV in a Nutshell 
DEV PROD 
UCON 
Phase 
Tool 
Assignment of 
relevant RFMs 
to default CA 
and UCON 
UCON 
Phase 
Tool 
RFC call 
statistics 
phases 
Phase and CA 
assignment of RFMs 
Collection 
of RFC call 
statistics 
and UCON 
protection 
© 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 36
UCON RFC Security Basic Scenario 
Summary
UCON - Summary 
It is simple to set up and configure Unified Connectivity (UCON) 
• The UCON framework offers a simple, straightforward approach for enhancing the security of 
your RFCs. It allows you to minimize the number of RFMs on ABAP-based servers exposed 
to other clients and systems, reducing the available attack surface in your RFC 
communications. 
• The UCON phase tool guides and supports the administrator in the three-step setup and the 
three-phased process. 
• UCON covers new function modules entering the system via Support Packages, 
Enhancement Packages, transports, or new developments. 
• UCON is fully enabled for life-cycle management to ensure consistent RFC security 
across your system landscape. 
© 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 38
Get More Information 
Community Network 
Get more information, videos and updates 
Unified Connectivity (UCON) 
http://scn.sap.com/docs/DOC-53844 
SAP NetWeaver Security Community 
http://scn.sap.com/community/security 
© 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 39
© 2014 SAP SE or an SAP affiliate company. All rights reserved. 
No part of this publication may be reproduced or transmitted in any form or for any purpose without the express permission of SAP SE or an 
SAP affiliate company. 
SAP and other SAP products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of SAP SE 
(or an SAP affiliate company) in Germany and other countries. Please see http://global12.sap.com/corporate-en/legal/copyright/index.epx for additional trademark 
information and notices. 
Some software products marketed by SAP SE and its distributors contain proprietary software components of other software vendors. 
National product specifications may vary. 
These materials are provided by SAP SE or an SAP affiliate company for informational purposes only, without representation or warranty of any kind, and SAP SE or its 
affiliated companies shall not be liable for errors or omissions with respect to the materials. The only warranties for SAP SE or 
SAP affiliate company products and services are those that are set forth in the express warranty statements accompanying such products and services, if any. Nothing 
herein should be construed as constituting an additional warranty. 
In particular, SAP SE or its affiliated companies have no obligation to pursue any course of business outlined in this document or any related presentation, or to develop or 
release any functionality mentioned therein. This document, or any related presentation, and SAP SE’s or its affiliated companies’ strategy and possible future 
developments, products, and/or platform directions and functionality are all subject to change and may be changed by SAP SE or its affiliated companies at any time for any 
reason without notice. The information in this document is not a commitment, promise, or legal obligation to deliver any material, code, or functionality. All forward-looking 
statements are subject to various risks and uncertainties that could cause actual results to differ materially from expectations. Readers are cautioned not to place undue 
reliance on these forward-looking statements, which speak only as of their dates, and they should not be relied upon in making purchasing decisions. 
© 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 40

Weitere ähnliche Inhalte

Was ist angesagt?

SAP HANA Migration Deck.pptx
SAP HANA Migration Deck.pptxSAP HANA Migration Deck.pptx
SAP HANA Migration Deck.pptx
SingbBablu
 
Migration scenarios RISE with SAP S4HANA Cloud, Private Edition - Version #1....
Migration scenarios RISE with SAP S4HANA Cloud, Private Edition - Version #1....Migration scenarios RISE with SAP S4HANA Cloud, Private Edition - Version #1....
Migration scenarios RISE with SAP S4HANA Cloud, Private Edition - Version #1....
Yevilina Rizka
 

Was ist angesagt? (20)

SAP S/4HANA Migration Cockpit
SAP S/4HANA Migration CockpitSAP S/4HANA Migration Cockpit
SAP S/4HANA Migration Cockpit
 
SAP Smart Business Cockpit for Suite on HANA (SoH)
SAP Smart Business Cockpit for Suite on HANA (SoH)SAP Smart Business Cockpit for Suite on HANA (SoH)
SAP Smart Business Cockpit for Suite on HANA (SoH)
 
SAP HANA Migration Deck.pptx
SAP HANA Migration Deck.pptxSAP HANA Migration Deck.pptx
SAP HANA Migration Deck.pptx
 
Mastering SAP Monitoring - SAP SLT & RFC Connection Monitoring
Mastering SAP Monitoring - SAP SLT & RFC Connection MonitoringMastering SAP Monitoring - SAP SLT & RFC Connection Monitoring
Mastering SAP Monitoring - SAP SLT & RFC Connection Monitoring
 
BestPractices_SoftwareChangeMgmt
BestPractices_SoftwareChangeMgmtBestPractices_SoftwareChangeMgmt
BestPractices_SoftwareChangeMgmt
 
SAP S4HANA Migration Cockpit.pdf
SAP S4HANA Migration Cockpit.pdfSAP S4HANA Migration Cockpit.pdf
SAP S4HANA Migration Cockpit.pdf
 
Sap s 4 hana client strategy
Sap s 4 hana client strategySap s 4 hana client strategy
Sap s 4 hana client strategy
 
Sap s4 hana sourcing and procurement
Sap s4 hana sourcing and procurementSap s4 hana sourcing and procurement
Sap s4 hana sourcing and procurement
 
Sizing sap s 4 hana using the quick sizer tool
Sizing sap s 4 hana using the quick sizer toolSizing sap s 4 hana using the quick sizer tool
Sizing sap s 4 hana using the quick sizer tool
 
Migration scenarios RISE with SAP S4HANA Cloud, Private Edition - Version #1....
Migration scenarios RISE with SAP S4HANA Cloud, Private Edition - Version #1....Migration scenarios RISE with SAP S4HANA Cloud, Private Edition - Version #1....
Migration scenarios RISE with SAP S4HANA Cloud, Private Edition - Version #1....
 
Building the Business Case for SAP S/4HANA
Building the Business Case for SAP S/4HANABuilding the Business Case for SAP S/4HANA
Building the Business Case for SAP S/4HANA
 
SAP Cloud Platform API Management Technical Brief
SAP Cloud Platform API Management Technical BriefSAP Cloud Platform API Management Technical Brief
SAP Cloud Platform API Management Technical Brief
 
Migrating to SAP S/4HANA
Migrating to SAP S/4HANAMigrating to SAP S/4HANA
Migrating to SAP S/4HANA
 
Sap activate overview
Sap activate overviewSap activate overview
Sap activate overview
 
Technical Walkthrough of SAP S/4HANA System Conversion
Technical Walkthrough of SAP S/4HANA System ConversionTechnical Walkthrough of SAP S/4HANA System Conversion
Technical Walkthrough of SAP S/4HANA System Conversion
 
AWS Webcast - Implementing SAP Solutions on the AWS Cloud
AWS Webcast - Implementing SAP Solutions on the AWS CloudAWS Webcast - Implementing SAP Solutions on the AWS Cloud
AWS Webcast - Implementing SAP Solutions on the AWS Cloud
 
L1_RISE_with_SAP_NNN_V3.4.pptx
L1_RISE_with_SAP_NNN_V3.4.pptxL1_RISE_with_SAP_NNN_V3.4.pptx
L1_RISE_with_SAP_NNN_V3.4.pptx
 
SAP S_4HANA Migration Cockpit - Migrate your Data to SAP S_4HANA.pdf
SAP S_4HANA Migration Cockpit - Migrate your Data to SAP S_4HANA.pdfSAP S_4HANA Migration Cockpit - Migrate your Data to SAP S_4HANA.pdf
SAP S_4HANA Migration Cockpit - Migrate your Data to SAP S_4HANA.pdf
 
S4 HANA presentation.pptx
S4 HANA presentation.pptxS4 HANA presentation.pptx
S4 HANA presentation.pptx
 
Sap grc process control 10.0
Sap grc process control 10.0Sap grc process control 10.0
Sap grc process control 10.0
 

Andere mochten auch

Andere mochten auch (8)

Read Access Logging (RAL) for SAP NetWeaver Overview
Read Access Logging (RAL) for SAP NetWeaver OverviewRead Access Logging (RAL) for SAP NetWeaver Overview
Read Access Logging (RAL) for SAP NetWeaver Overview
 
Materializing dataprivacy in sap .. how?
Materializing dataprivacy in sap .. how?Materializing dataprivacy in sap .. how?
Materializing dataprivacy in sap .. how?
 
Sap Product Lifecycle Costing solution in detail
Sap Product Lifecycle Costing solution in detailSap Product Lifecycle Costing solution in detail
Sap Product Lifecycle Costing solution in detail
 
SAP PLM Online Training Complete Hand Book
SAP PLM Online Training Complete Hand BookSAP PLM Online Training Complete Hand Book
SAP PLM Online Training Complete Hand Book
 
A comprehensive guide to SAP PLM 7.01
A comprehensive guide to SAP PLM 7.01A comprehensive guide to SAP PLM 7.01
A comprehensive guide to SAP PLM 7.01
 
SAP HANA – A Technical Snapshot
SAP HANA – A Technical SnapshotSAP HANA – A Technical Snapshot
SAP HANA – A Technical Snapshot
 
PLM Introduction
PLM IntroductionPLM Introduction
PLM Introduction
 
Five Reasons To Skip SAP Suite on HANA and Go Directly to SAP S/4HANA
Five Reasons To Skip SAP Suite on HANA and Go Directly to SAP S/4HANAFive Reasons To Skip SAP Suite on HANA and Go Directly to SAP S/4HANA
Five Reasons To Skip SAP Suite on HANA and Go Directly to SAP S/4HANA
 

Ähnlich wie Unified Connectivity (UCON) for SAP NetWeaver Overview

Accelerate2022-Solving the SAP Security Gap through Application-aware Network...
Accelerate2022-Solving the SAP Security Gap through Application-aware Network...Accelerate2022-Solving the SAP Security Gap through Application-aware Network...
Accelerate2022-Solving the SAP Security Gap through Application-aware Network...
PeterSmetny1
 
Pulse 2014 APM Panel with Brian Fisher
Pulse 2014 APM Panel with Brian FisherPulse 2014 APM Panel with Brian Fisher
Pulse 2014 APM Panel with Brian Fisher
Prolifics
 
Managed Service Provider Deployment Options for SolarWinds Network & Server M...
Managed Service Provider Deployment Options for SolarWinds Network & Server M...Managed Service Provider Deployment Options for SolarWinds Network & Server M...
Managed Service Provider Deployment Options for SolarWinds Network & Server M...
SolarWinds
 

Ähnlich wie Unified Connectivity (UCON) for SAP NetWeaver Overview (20)

Pre-Con Education on APM 9.7
Pre-Con Education on APM 9.7Pre-Con Education on APM 9.7
Pre-Con Education on APM 9.7
 
Platform Encryption for ISVs (February 23, 2016)
Platform Encryption for ISVs (February 23, 2016)Platform Encryption for ISVs (February 23, 2016)
Platform Encryption for ISVs (February 23, 2016)
 
Testing a Microservices Architecture
Testing a Microservices ArchitectureTesting a Microservices Architecture
Testing a Microservices Architecture
 
Mainframe vug july 30 2015
Mainframe vug july 30 2015Mainframe vug july 30 2015
Mainframe vug july 30 2015
 
Penetration Testing SAP Systems
Penetration Testing SAP SystemsPenetration Testing SAP Systems
Penetration Testing SAP Systems
 
EAS-SEC: Framework for securing business applications
EAS-SEC: Framework for securing business applicationsEAS-SEC: Framework for securing business applications
EAS-SEC: Framework for securing business applications
 
Accelerate2022-Solving the SAP Security Gap through Application-aware Network...
Accelerate2022-Solving the SAP Security Gap through Application-aware Network...Accelerate2022-Solving the SAP Security Gap through Application-aware Network...
Accelerate2022-Solving the SAP Security Gap through Application-aware Network...
 
Hands-On Lab: Smart Instrumentation
Hands-On Lab: Smart InstrumentationHands-On Lab: Smart Instrumentation
Hands-On Lab: Smart Instrumentation
 
Consistent Regions in Specialized Toolkits for IBM InfoSphere Streams V4.0
Consistent Regions in Specialized Toolkits for IBM InfoSphere Streams V4.0Consistent Regions in Specialized Toolkits for IBM InfoSphere Streams V4.0
Consistent Regions in Specialized Toolkits for IBM InfoSphere Streams V4.0
 
Mavenir: OpenRAN – What It Is and What It Means for Rural Operators
Mavenir: OpenRAN – What It Is and What It Means for Rural OperatorsMavenir: OpenRAN – What It Is and What It Means for Rural Operators
Mavenir: OpenRAN – What It Is and What It Means for Rural Operators
 
SAP Cloud Platform SLAs and ITSM Process
SAP Cloud Platform SLAs and ITSM ProcessSAP Cloud Platform SLAs and ITSM Process
SAP Cloud Platform SLAs and ITSM Process
 
Upgrading Em13c Collaborate 2016
Upgrading Em13c Collaborate 2016Upgrading Em13c Collaborate 2016
Upgrading Em13c Collaborate 2016
 
Best Practices for Optimizing Mainframe Application Performance with CA Cross...
Best Practices for Optimizing Mainframe Application Performance with CA Cross...Best Practices for Optimizing Mainframe Application Performance with CA Cross...
Best Practices for Optimizing Mainframe Application Performance with CA Cross...
 
Pulse 2014 APM Panel with Brian Fisher
Pulse 2014 APM Panel with Brian FisherPulse 2014 APM Panel with Brian Fisher
Pulse 2014 APM Panel with Brian Fisher
 
How Verizon Uses Automation to Accelerate SAP Projects
How Verizon Uses Automation to Accelerate SAP ProjectsHow Verizon Uses Automation to Accelerate SAP Projects
How Verizon Uses Automation to Accelerate SAP Projects
 
Managed Service Provider Deployment Options for SolarWinds Network & Server M...
Managed Service Provider Deployment Options for SolarWinds Network & Server M...Managed Service Provider Deployment Options for SolarWinds Network & Server M...
Managed Service Provider Deployment Options for SolarWinds Network & Server M...
 
How to Leverage IBM Technology and Custom Portal Dashboards to Monitor the He...
How to Leverage IBM Technology and Custom Portal Dashboards to Monitor the He...How to Leverage IBM Technology and Custom Portal Dashboards to Monitor the He...
How to Leverage IBM Technology and Custom Portal Dashboards to Monitor the He...
 
Automating your ms world part 3 a brand new way to monitor with am ps web
Automating your ms world part 3 a brand new way to monitor with am ps   webAutomating your ms world part 3 a brand new way to monitor with am ps   web
Automating your ms world part 3 a brand new way to monitor with am ps web
 
SAP NetWeaver Application Server Add-On for Code Vulnerability Analysis Overview
SAP NetWeaver Application Server Add-On for Code Vulnerability Analysis OverviewSAP NetWeaver Application Server Add-On for Code Vulnerability Analysis Overview
SAP NetWeaver Application Server Add-On for Code Vulnerability Analysis Overview
 
Pre-Con Education: What Is CA Unified Infrastructure Management and what's ne...
Pre-Con Education: What Is CA Unified Infrastructure Management and what's ne...Pre-Con Education: What Is CA Unified Infrastructure Management and what's ne...
Pre-Con Education: What Is CA Unified Infrastructure Management and what's ne...
 

Mehr von SAP Technology

Mehr von SAP Technology (20)

SAP Integration Suite L1
SAP Integration Suite L1SAP Integration Suite L1
SAP Integration Suite L1
 
Future-Proof Your Business Processes by Automating SAP S/4HANA processes with...
Future-Proof Your Business Processes by Automating SAP S/4HANA processes with...Future-Proof Your Business Processes by Automating SAP S/4HANA processes with...
Future-Proof Your Business Processes by Automating SAP S/4HANA processes with...
 
7 Top Reasons to Automate Processes with SAP Intelligent Robotic Processes Au...
7 Top Reasons to Automate Processes with SAP Intelligent Robotic Processes Au...7 Top Reasons to Automate Processes with SAP Intelligent Robotic Processes Au...
7 Top Reasons to Automate Processes with SAP Intelligent Robotic Processes Au...
 
Extend SAP S/4HANA to deliver real-time intelligent processes
Extend SAP S/4HANA to deliver real-time intelligent processesExtend SAP S/4HANA to deliver real-time intelligent processes
Extend SAP S/4HANA to deliver real-time intelligent processes
 
Process optimization and automation for SAP S/4HANA with SAP’s Business Techn...
Process optimization and automation for SAP S/4HANA with SAP’s Business Techn...Process optimization and automation for SAP S/4HANA with SAP’s Business Techn...
Process optimization and automation for SAP S/4HANA with SAP’s Business Techn...
 
Accelerate your journey to SAP S/4HANA with SAP’s Business Technology Platform
Accelerate your journey to SAP S/4HANA with SAP’s Business Technology PlatformAccelerate your journey to SAP S/4HANA with SAP’s Business Technology Platform
Accelerate your journey to SAP S/4HANA with SAP’s Business Technology Platform
 
Accelerate Your Move to an Intelligent Enterprise with SAP Cloud Platform and...
Accelerate Your Move to an Intelligent Enterprise with SAP Cloud Platform and...Accelerate Your Move to an Intelligent Enterprise with SAP Cloud Platform and...
Accelerate Your Move to an Intelligent Enterprise with SAP Cloud Platform and...
 
Transform your business with intelligent insights and SAP S/4HANA
Transform your business with intelligent insights and SAP S/4HANATransform your business with intelligent insights and SAP S/4HANA
Transform your business with intelligent insights and SAP S/4HANA
 
SAP Cloud Platform for SAP S/4HANA: Accelerate your move to an Intelligent En...
SAP Cloud Platform for SAP S/4HANA: Accelerate your move to an Intelligent En...SAP Cloud Platform for SAP S/4HANA: Accelerate your move to an Intelligent En...
SAP Cloud Platform for SAP S/4HANA: Accelerate your move to an Intelligent En...
 
Innovate collaborative applications with SAP Jam Collaboration & SAP Cloud Pl...
Innovate collaborative applications with SAP Jam Collaboration & SAP Cloud Pl...Innovate collaborative applications with SAP Jam Collaboration & SAP Cloud Pl...
Innovate collaborative applications with SAP Jam Collaboration & SAP Cloud Pl...
 
The IoT Imperative for Consumer Products
The IoT Imperative for Consumer ProductsThe IoT Imperative for Consumer Products
The IoT Imperative for Consumer Products
 
The IoT Imperative for Discrete Manufacturers - Automotive, Aerospace & Defen...
The IoT Imperative for Discrete Manufacturers - Automotive, Aerospace & Defen...The IoT Imperative for Discrete Manufacturers - Automotive, Aerospace & Defen...
The IoT Imperative for Discrete Manufacturers - Automotive, Aerospace & Defen...
 
IoT is Enabling a New Era of Shareholder Value in Energy and Natural Resource...
IoT is Enabling a New Era of Shareholder Value in Energy and Natural Resource...IoT is Enabling a New Era of Shareholder Value in Energy and Natural Resource...
IoT is Enabling a New Era of Shareholder Value in Energy and Natural Resource...
 
The IoT Imperative in Government and Healthcare
The IoT Imperative in Government and HealthcareThe IoT Imperative in Government and Healthcare
The IoT Imperative in Government and Healthcare
 
SAP S/4HANA Finance and the Digital Core
SAP S/4HANA Finance and the Digital CoreSAP S/4HANA Finance and the Digital Core
SAP S/4HANA Finance and the Digital Core
 
SAP Helps Reduce Silos Between Business and Spatial Data
SAP Helps Reduce Silos Between Business and Spatial DataSAP Helps Reduce Silos Between Business and Spatial Data
SAP Helps Reduce Silos Between Business and Spatial Data
 
Why SAP HANA?
Why SAP HANA?Why SAP HANA?
Why SAP HANA?
 
Spotlight on Financial Services with Calypso and SAP ASE
Spotlight on Financial Services with Calypso and SAP ASESpotlight on Financial Services with Calypso and SAP ASE
Spotlight on Financial Services with Calypso and SAP ASE
 
SAP ASE 16 SP02 Performance Features
SAP ASE 16 SP02 Performance FeaturesSAP ASE 16 SP02 Performance Features
SAP ASE 16 SP02 Performance Features
 
Spark Usage in Enterprise Business Operations
Spark Usage in Enterprise Business OperationsSpark Usage in Enterprise Business Operations
Spark Usage in Enterprise Business Operations
 

Kürzlich hochgeladen

Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Kürzlich hochgeladen (20)

Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 

Unified Connectivity (UCON) for SAP NetWeaver Overview

  • 1. Unified Connectivity (UCON) Overview July 2014 Public
  • 2. Disclaimer This presentation outlines our general product direction and should not be relied on in making a purchase decision. This presentation is not subject to your license agreement or any other agreement with SAP. SAP has no obligation to pursue any course of business outlined in this presentation or to develop or release any functionality mentioned in this presentation. This presentation and SAP's strategy and possible future developments are subject to change and may be changed by SAP at any time for any reason without notice. This document is provided without a warranty of any kind, either express or implied, including but not limited to, the implied warranties of merchantability, fitness for a particular purpose, or non-infringement. SAP assumes no responsibility for errors or omissions in this document, except if such damages were caused by SAP intentionally or grossly negligent. © 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 2
  • 3. Agenda - UCON RFC Security Basic Scenario Motivation and Scope Basic Concepts Coverage of New RFMs How to Cope With the Restrictions of Productive Systems Summary © 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 3
  • 4. UCON RFC Security Basic Scenario Motivation and Scope
  • 5. The Scope of UCON RFC Basic Connectivity C High-performing, for local high load scenarios, across all ABAP Releases, close integration into ABAP RFC-Based Connectivity © 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 5
  • 6. UCON - A Simple Approach to Make RFC More Secure Reduce the Overall Attack Surface of Your Remote-Enabled Function Modules. Enhance RFC security by blocking the access to a large number of RFMs ! Facts: y Most SAP ERP customers run just a limited number of the business scenarios for which they need to expose some RFMs y A lot of RFMs are only used to parallelize within a system. Solution y Find out which RFMs need to be exposed for the scenarios of a customer. y Block the access to all other RFMs. © 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 6
  • 7. The Basic Strategy of UCON to Solve These Problems Reduce the number of RFMs exposed to the outside world. Expose only and exactly those RFMs a customer needs to run their business scenarios. 38000 RFMs in SAP ERP (incl. SAP NetWeaver) A typical SAP customer only needs to expose a few hundred RFMs for their business scenarios © 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 7
  • 8. UCON RFC Security Basic Scenario Basic Concepts
  • 9. The UCON Way to Security: Expose Only Those Function Modules You Need to the Outside World … RF M1 RF M2 RF M3 RF M4 RF M5 RF M6 RF M7 RF M8 RF M9 RF M RF M. 10 11 Default Communication Assembly (CA) © 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 9
  • 10. UCON Checks Do not Interfere with Calls Within the Same Client and System RF M3 RF M5 RF M7 SAP Business Suite Blocked for access from outside – Open for use in parallel RFC inside the same client in the … RF M1 RF M. … same system © 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 10
  • 11. UCON - An Additional Role/User-Independent Layer of Security Checks User trying to access a RFM no No Access RFM in CA? yes no User has authorization? User has authorization for the relevant CA? No Access yes Access to RFM © 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 11
  • 12. UCON Setup and Configuration It is simple to set up and configure Unified Connectivity (UCON): 1. Set the UCON profile parameter UCON/RFC/ACTIVE to 1 to enable UCON runtime checks for RFMs in the final phase. 2. Run the UCON setup to generate a default communication assembly (CA) and other required entities. 3. Choose a suitable duration of the logging and evaluation phase. 4. Schedule the batch job SAP_UCON_MANAGEMENT that selects and persists the RFC statistic records required by the UCON phase tool on the database. © 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 12
  • 13. UCON RFC Security Easy Customer Adoption in Three Steps Logging of RFMs called from outside Evaluation/ Simulation Runtime checks active © 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 13
  • 14. UCON RFC Security Easy Customer Adoption in Three Steps Logging of RFMs called from outside Runtime check Runtime Checks active Evaluation/ Simulation active © 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 14
  • 15. Phase 1 Logging of RFC Connectivity Data Tool support to use solid information instead of unreliable data • Use a dedicated tool set to collect the information you need Identify the RFMs you need to expose to run your business scenarios • Collect aggregated statistic data on which RFMs are called in your system from outside • Over a time period you can choose At the end of phase 1, choose the RFMs you need and assign them to the Default CA: • Based on the statistical records, you decide which RFMs should be accessed from outside and assign them to the CA © 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 15
  • 16. UCON RFC Security Easy Customer Adoption in Three Steps Logging of RFMs Logging of RFMs called from from outside outside Evaluation/ simulation Runtime check Runtime checks active Simulation Checks active © 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 16
  • 17. Phase 2 Evaluation of the Data Logged UCON should not interfere with productive customer scenarios: • Use the evaluation phase (phase 2) to simulate UCON runtime checks • Check completeness of RFMs you need to expose • Put required RFMs into Default CA Customizable duration of evaluation phase: • Duration of evaluation phase depends on in-house experience and knowledge Check whether you have protected the right RFMs and make necessary corrections © 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 17
  • 18. UCON RFC Security Easy Customer Adoption in Three Steps Logging of RFMs Logging of RFMs called from from outside outside Evaluation/ Simulation simulation Runtime check Runtime checks active Checks active © 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 18
  • 19. Phase 3 The RFMs in the System Are Protected by UCON UCON runtime checks are now active: • Only RFMs in the default CA are accessible from outside • RFM that are not in the Default CA are now protected against any outside access Less than 5% of all RFMs need to be exposed in a typical customer system: • Out of a total of 38,000 RFMs in an SAP ERP system, only a few hundred are required and exposed for productive customer connectivity Massive reduction of RFC attack surface for the average customer system © 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 19
  • 20. Prerequisites for the Different Security Layers Access to RFMs UCON runtime checks S_RFC checks Access to RFMs © 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 20
  • 21. Efforts Required for the Different Security Layers Access to RFMs UCON runtime checks S_RFC checks Access to RFMs © 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 21
  • 22. UCON Protection After the Initial UCON Security Classification Check-Active Phase Blocked RFMs from initial UCON set-up 100 ++ Default CA 37,000++ SAP Business Suite Blocked RFMs/ UCON-protected RFMs from other, new transports or installations © 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 22
  • 23. UCON RFC Security Basic Scenario Coverage of New Remote-Enabled Function Modules
  • 24. UCON Protection After Initial Security Classification Check-active Phase Development Protected/ blocked RFMs Default Communication Assembly Exposed RFMs © 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 24
  • 25. New RFMs Arrive at a UCON-Protected System Check-active phase Development Over time: New RFMs in transports, SPs, EhPs … © 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 25
  • 26. New RFMs on Their Way to UCON Protection – Logging Phase Logging phase Evaluation phase Access allowed Access blocked UCON protection Check-active phase Access allowed New RFMs are automatically assigned to the logging phase © 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 26
  • 27. New RFMs on Their Way to UCON Protection – Evaluation Phase Logging phase Access allowed Access blocked UCON protection Evaluation phase Check-active phase Access allowed © 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 27
  • 28. New RFMs Have Achieved UCON Protection – Check-Active Phase Logging phase Evaluation phase Access blocked UCON protection Check-active phase Access allowed © 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 28
  • 29. The Ever-Growing Scope of UCON Protection Blocked RFMs from initial UCON set-up Default CA SAP Business Suite Blocked RFMs from other, new transports or installations © 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 29
  • 30. UCON RFC Security Basic Scenario How to Cope With the Restrictions of Productive Systems
  • 31. UCON and the Restrictions in a Productive System Challenges PROD Assignment of relevant RFMs to default CA and UCON UCON Phase Tool phases Collection of RFC call statistics and UCON protection Authorizations and system change options in Productive Systems are not sufficient for UCON Operations © 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 31
  • 32. UCON and the Restrictions in a Productive System Solution DEV PROD UCON Phase Tool Assignment of relevant RFMs to default CA and UCON UCON Phase Tool phases Collection of RFC call statistics and UCON protection Delegate UCON operations to DEV Slide 32 © 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 32
  • 33. UCON and the Restrictions in a Productive System How to Delegate UCON Operations to DEV - Step 1 DEV PROD UCON Phase Tool Import RFC call statistics from PROD to DEV UCON Phase Tool RFC call statistics .csv 1 © 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 33
  • 34. UCON and the Restrictions in a Productive System How to Delegate UCON Operations to DEV - Step 2 DEV PROD UCON Phase Tool Import RFC call statistics from PROD to DEV UCON Phase Tool RFC call statistics .csv Assign relevant RFMs to default CA and to next phase 1 2 © 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 34
  • 35. UCON and the Restrictions in a Productive System How to Delegate UCON Operations to DEV - Step 3 DEV PROD UCON Phase Tool UCON Phase Tool Import RFC call statistics from PROD to DEV UCON Phase Tool RFC call Assign relevant RFMs to default CA and to next phase UCON Phase Tool statistics .csv Phase and CA assignment of RFMs R3Trans 1 2 3 © 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 35
  • 36. UCON and the Restrictions in a Productive System How to Delegate UCON Operations to DEV in a Nutshell DEV PROD UCON Phase Tool Assignment of relevant RFMs to default CA and UCON UCON Phase Tool RFC call statistics phases Phase and CA assignment of RFMs Collection of RFC call statistics and UCON protection © 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 36
  • 37. UCON RFC Security Basic Scenario Summary
  • 38. UCON - Summary It is simple to set up and configure Unified Connectivity (UCON) • The UCON framework offers a simple, straightforward approach for enhancing the security of your RFCs. It allows you to minimize the number of RFMs on ABAP-based servers exposed to other clients and systems, reducing the available attack surface in your RFC communications. • The UCON phase tool guides and supports the administrator in the three-step setup and the three-phased process. • UCON covers new function modules entering the system via Support Packages, Enhancement Packages, transports, or new developments. • UCON is fully enabled for life-cycle management to ensure consistent RFC security across your system landscape. © 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 38
  • 39. Get More Information Community Network Get more information, videos and updates Unified Connectivity (UCON) http://scn.sap.com/docs/DOC-53844 SAP NetWeaver Security Community http://scn.sap.com/community/security © 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 39
  • 40. © 2014 SAP SE or an SAP affiliate company. All rights reserved. No part of this publication may be reproduced or transmitted in any form or for any purpose without the express permission of SAP SE or an SAP affiliate company. SAP and other SAP products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of SAP SE (or an SAP affiliate company) in Germany and other countries. Please see http://global12.sap.com/corporate-en/legal/copyright/index.epx for additional trademark information and notices. Some software products marketed by SAP SE and its distributors contain proprietary software components of other software vendors. National product specifications may vary. These materials are provided by SAP SE or an SAP affiliate company for informational purposes only, without representation or warranty of any kind, and SAP SE or its affiliated companies shall not be liable for errors or omissions with respect to the materials. The only warranties for SAP SE or SAP affiliate company products and services are those that are set forth in the express warranty statements accompanying such products and services, if any. Nothing herein should be construed as constituting an additional warranty. In particular, SAP SE or its affiliated companies have no obligation to pursue any course of business outlined in this document or any related presentation, or to develop or release any functionality mentioned therein. This document, or any related presentation, and SAP SE’s or its affiliated companies’ strategy and possible future developments, products, and/or platform directions and functionality are all subject to change and may be changed by SAP SE or its affiliated companies at any time for any reason without notice. The information in this document is not a commitment, promise, or legal obligation to deliver any material, code, or functionality. All forward-looking statements are subject to various risks and uncertainties that could cause actual results to differ materially from expectations. Readers are cautioned not to place undue reliance on these forward-looking statements, which speak only as of their dates, and they should not be relied upon in making purchasing decisions. © 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 40