Skip to content

Commit b9e659f

Browse files
authored
Merge pull request MicrosoftDocs#85206 from v-nagta/usapnetweaver
Product Backlog Item 790067: SaaS App Tutorial: SAP NetWeaver Update
2 parents 77b8628 + f59158a commit b9e659f

File tree

1 file changed

+17
-15
lines changed

1 file changed

+17
-15
lines changed

articles/active-directory/saas-apps/sap-netweaver-tutorial.md

Lines changed: 17 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: 'Tutorial: Azure Active Directory integration with SAP NetWeaver | Microsoft Docs'
2+
title: 'Tutorial: Tutorial: Azure Active Directory Single sign-on (SSO) integration with SAP NetWeaver | Microsoft Docs'
33
description: Learn how to configure single sign-on between Azure Active Directory and SAP NetWeaver.
44
services: active-directory
55
documentationCenter: na
@@ -14,13 +14,13 @@ ms.workload: identity
1414
ms.tgt_pltfrm: na
1515
ms.devlang: na
1616
ms.topic: tutorial
17-
ms.date: 08/08/2019
17+
ms.date: 08/14/2019
1818
ms.author: jeedes
1919

2020
ms.collection: M365-identity-device-management
2121
---
2222

23-
# Tutorial: Integrate SAP NetWeaver with Azure Active Directory
23+
# Tutorial: Azure Active Directory Single sign-on (SSO) integration with SAP NetWeaver
2424

2525
In this tutorial, you'll learn how to integrate SAP NetWeaver with Azure Active Directory (Azure AD). When you integrate SAP NetWeaver with Azure AD, you can:
2626

@@ -78,9 +78,9 @@ To configure Azure AD single sign-on with SAP NetWeaver, perform the following s
7878

7979
1. Open a new web browser window and sign into your SAP NetWeaver company site as an administrator
8080

81-
2. Make sure that **http** and **https** services are active and appropriate ports are assigned in **SMICM** T-Code.
81+
1. Make sure that **http** and **https** services are active and appropriate ports are assigned in **SMICM** T-Code.
8282

83-
3. Sign on to business client of SAP System (T01), where SSO is required and activate HTTP Security session Management.
83+
1. Sign on to business client of SAP System (T01), where SSO is required and activate HTTP Security session Management.
8484

8585
a. Go to Transaction code **SICF_SESSIONS**. It displays all relevant profile parameters with current values. They look like below:-
8686
```
@@ -110,22 +110,22 @@ To configure Azure AD single sign-on with SAP NetWeaver, perform the following s
110110
/sap/bc/webdynpro/sap/saml2
111111
/sap/bc/webdynpro/sap/sec_diag_tool (This is only to enable / disable trace)
112112
```
113-
4. Go to Transaction code **SAML2** in business client of SAP system [T01/122]. It will open a user interface in a browser. In this example, we assumed 122 as SAP business client.
113+
1. Go to Transaction code **SAML2** in business client of SAP system [T01/122]. It will open a user interface in a browser. In this example, we assumed 122 as SAP business client.
114114

115115
![The Certificate download link](./media/sapnetweaver-tutorial/tutorial_sapnetweaver_sapbusinessclient.png)
116116

117-
5. Provide your username and password to enter in user interface and click **Edit**.
117+
1. Provide your username and password to enter in user interface and click **Edit**.
118118

119119
![The Certificate download link](./media/sapnetweaver-tutorial/tutorial_sapnetweaver_userpwd.png)
120120

121-
6. Replace **Provider Name** from T01122 to `http://T01122` and click on **Save**.
121+
1. Replace **Provider Name** from T01122 to `http://T01122` and click on **Save**.
122122

123123
> [!NOTE]
124124
> By default provider name come as `<sid><client>` format but Azure AD expects name in the format of `<protocol>://<name>`, recommending to maintain provider name as `https://<sid><client>` to allow multiple SAP NetWeaver ABAP engines to configure in Azure AD.
125125

126126
![The Certificate download link](./media/sapnetweaver-tutorial/tutorial_sapnetweaver_providername.png)
127127

128-
7. **Generating Service Provider Metadata**:- Once we are done with configuring the **Local Provider** and **Trusted Providers** settings on SAML 2.0 User Interface, the next step would be to generate the service provider’s metadata file (which would contain all the settings, authentication contexts and other configurations in SAP). Once this file is generated we need to upload this in Azure AD.
128+
1. **Generating Service Provider Metadata**:- Once we are done with configuring the **Local Provider** and **Trusted Providers** settings on SAML 2.0 User Interface, the next step would be to generate the service provider’s metadata file (which would contain all the settings, authentication contexts and other configurations in SAP). Once this file is generated we need to upload this in Azure AD.
129129

130130
![The Certificate download link](./media/sapnetweaver-tutorial/tutorial_sapnetweaver_generatesp.png)
131131

@@ -143,7 +143,7 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
143143

144144
![Edit Basic SAML Configuration](common/edit-urls.png)
145145

146-
4. On the **Basic SAML Configuration** section, if you wish to configure the application in **IDP** initiated mode, perform the following step:
146+
1. On the **Basic SAML Configuration** section, if you wish to configure the application in **IDP** initiated mode, perform the following step:
147147

148148
a. Click **Upload metadata file** to upload the **Service Provider metadata file**, which you have obtained earlier.
149149

@@ -165,7 +165,7 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
165165

166166
![image](common/edit-attribute.png)
167167

168-
13. In the **User Claims** section on the **User Attributes** dialog, configure SAML token attribute as shown in the image above and perform the following steps:
168+
1. In the **User Claims** section on the **User Attributes** dialog, configure SAML token attribute as shown in the image above and perform the following steps:
169169

170170
a. Click **Edit icon** to open the **Manage user claims** dialog.
171171

@@ -269,7 +269,7 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
269269

270270
![Configure Single Sign-On](./media/sapnetweaver-tutorial/tutorial_sapnetweaver_nameid.png)
271271

272-
14. Note that **user ID Source** and **user id mapping mode** values determine the link between SAP user and Azure AD claim.
272+
14. Note that **user ID Source** and **user ID mapping mode** values determine the link between SAP user and Azure AD claim.
273273

274274
#### Scenario: SAP User to Azure AD user mapping.
275275

@@ -281,7 +281,7 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
281281

282282
![Configure Single Sign-On](./media/sapnetweaver-tutorial/claimsaad1.png)
283283

284-
#### Scenario: Select SAP user id based on configured email address in SU01. In this case email id should be configured in su01 for each user who requires SSO.
284+
#### Scenario: Select SAP user ID based on configured email address in SU01. In this case email ID should be configured in su01 for each user who requires SSO.
285285

286286
a. NameID details screenshot from SAP.
287287

@@ -382,10 +382,12 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
382382

383383
5. Click **finish**.
384384

385-
## Additional Resources
385+
## Additional resources
386386

387387
- [List of Tutorials on How to Integrate SaaS Apps with Azure Active Directory](https://docs.microsoft.com/azure/active-directory/active-directory-saas-tutorial-list)
388388

389389
- [What is application access and single sign-on with Azure Active Directory?](https://docs.microsoft.com/azure/active-directory/active-directory-appssoaccess-whatis)
390390

391-
- [What is conditional access in Azure Active Directory?](https://docs.microsoft.com/azure/active-directory/conditional-access/overview)
391+
- [What is conditional access in Azure Active Directory?](https://docs.microsoft.com/azure/active-directory/conditional-access/overview)
392+
393+
- [Try SAP NetWeaver with Azure AD](https://aad.portal.azure.com/)

0 commit comments

Comments
 (0)