You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/saas-apps/sap-netweaver-tutorial.md
+17-15Lines changed: 17 additions & 15 deletions
Original file line number
Diff line number
Diff line change
@@ -1,5 +1,5 @@
1
1
---
2
-
title: 'Tutorial: Azure Active Directory integration with SAP NetWeaver | Microsoft Docs'
2
+
title: 'Tutorial: Tutorial: Azure Active Directory Single sign-on (SSO) integration with SAP NetWeaver | Microsoft Docs'
3
3
description: Learn how to configure single sign-on between Azure Active Directory and SAP NetWeaver.
4
4
services: active-directory
5
5
documentationCenter: na
@@ -14,13 +14,13 @@ ms.workload: identity
14
14
ms.tgt_pltfrm: na
15
15
ms.devlang: na
16
16
ms.topic: tutorial
17
-
ms.date: 08/08/2019
17
+
ms.date: 08/14/2019
18
18
ms.author: jeedes
19
19
20
20
ms.collection: M365-identity-device-management
21
21
---
22
22
23
-
# Tutorial: Integrate SAP NetWeaver with Azure Active Directory
23
+
# Tutorial: Azure Active Directory Single sign-on (SSO) integration with SAP NetWeaver
24
24
25
25
In this tutorial, you'll learn how to integrate SAP NetWeaver with Azure Active Directory (Azure AD). When you integrate SAP NetWeaver with Azure AD, you can:
26
26
@@ -78,9 +78,9 @@ To configure Azure AD single sign-on with SAP NetWeaver, perform the following s
78
78
79
79
1. Open a new web browser window and sign into your SAP NetWeaver company site as an administrator
80
80
81
-
2. Make sure that **http** and **https** services are active and appropriate ports are assigned in **SMICM** T-Code.
81
+
1. Make sure that **http** and **https** services are active and appropriate ports are assigned in **SMICM** T-Code.
82
82
83
-
3. Sign on to business client of SAP System (T01), where SSO is required and activate HTTP Security session Management.
83
+
1. Sign on to business client of SAP System (T01), where SSO is required and activate HTTP Security session Management.
84
84
85
85
a. Go to Transaction code **SICF_SESSIONS**. It displays all relevant profile parameters with current values. They look like below:-
86
86
```
@@ -110,22 +110,22 @@ To configure Azure AD single sign-on with SAP NetWeaver, perform the following s
110
110
/sap/bc/webdynpro/sap/saml2
111
111
/sap/bc/webdynpro/sap/sec_diag_tool (This is only to enable / disable trace)
112
112
```
113
-
4. Go to Transaction code **SAML2** in business client of SAP system [T01/122]. It will open a user interface in a browser. In this example, we assumed 122 as SAP business client.
113
+
1. Go to Transaction code **SAML2** in business client of SAP system [T01/122]. It will open a user interface in a browser. In this example, we assumed 122 as SAP business client.
6. Replace **Provider Name** from T01122 to `http://T01122` and click on **Save**.
121
+
1. Replace **Provider Name** from T01122 to `http://T01122` and click on **Save**.
122
122
123
123
> [!NOTE]
124
124
> By default provider name come as `<sid><client>` format but Azure AD expects name in the format of `<protocol>://<name>`, recommending to maintain provider name as `https://<sid><client>` to allow multiple SAP NetWeaver ABAP engines to configure in Azure AD.
7.**Generating Service Provider Metadata**:- Once we are done with configuring the **Local Provider** and **Trusted Providers** settings on SAML 2.0 User Interface, the next step would be to generate the service provider’s metadata file (which would contain all the settings, authentication contexts and other configurations in SAP). Once this file is generated we need to upload this in Azure AD.
128
+
1.**Generating Service Provider Metadata**:- Once we are done with configuring the **Local Provider** and **Trusted Providers** settings on SAML 2.0 User Interface, the next step would be to generate the service provider’s metadata file (which would contain all the settings, authentication contexts and other configurations in SAP). Once this file is generated we need to upload this in Azure AD.
4. On the **Basic SAML Configuration** section, if you wish to configure the application in **IDP** initiated mode, perform the following step:
146
+
1. On the **Basic SAML Configuration** section, if you wish to configure the application in **IDP** initiated mode, perform the following step:
147
147
148
148
a. Click **Upload metadata file** to upload the **Service Provider metadata file**, which you have obtained earlier.
149
149
@@ -165,7 +165,7 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
165
165
166
166

167
167
168
-
13. In the **User Claims** section on the **User Attributes** dialog, configure SAML token attribute as shown in the image above and perform the following steps:
168
+
1. In the **User Claims** section on the **User Attributes** dialog, configure SAML token attribute as shown in the image above and perform the following steps:
169
169
170
170
a. Click **Edit icon** to open the **Manage user claims** dialog.
171
171
@@ -269,7 +269,7 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
269
269
270
270

271
271
272
-
14. Note that **user ID Source** and **user id mapping mode** values determine the link between SAP user and Azure AD claim.
272
+
14. Note that **user ID Source** and **user ID mapping mode** values determine the link between SAP user and Azure AD claim.
273
273
274
274
#### Scenario: SAP User to Azure AD user mapping.
275
275
@@ -281,7 +281,7 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
281
281
282
282

283
283
284
-
#### Scenario: Select SAP user id based on configured email address in SU01. In this case email id should be configured in su01 for each user who requires SSO.
284
+
#### Scenario: Select SAP user ID based on configured email address in SU01. In this case email ID should be configured in su01 for each user who requires SSO.
285
285
286
286
a. NameID details screenshot from SAP.
287
287
@@ -382,10 +382,12 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
382
382
383
383
5. Click **finish**.
384
384
385
-
## Additional Resources
385
+
## Additional resources
386
386
387
387
-[List of Tutorials on How to Integrate SaaS Apps with Azure Active Directory](https://docs.microsoft.com/azure/active-directory/active-directory-saas-tutorial-list)
388
388
389
389
-[What is application access and single sign-on with Azure Active Directory?](https://docs.microsoft.com/azure/active-directory/active-directory-appssoaccess-whatis)
390
390
391
-
-[What is conditional access in Azure Active Directory?](https://docs.microsoft.com/azure/active-directory/conditional-access/overview)
391
+
-[What is conditional access in Azure Active Directory?](https://docs.microsoft.com/azure/active-directory/conditional-access/overview)
392
+
393
+
-[Try SAP NetWeaver with Azure AD](https://aad.portal.azure.com/)
0 commit comments