SAP Single Sign-On 3.0 Product Overview
SAP Single Sign-On 3.0 Product Overview
SAP Single Sign-On 3.0 Product Overview
Product Overview
August 2020
PUBLIC
Agenda
Introduction
Hybrid landscapes
Summary
Simplicity
▪ Lean product, fast implementation project, quick ROI
▪ No more need to provision, protect, and reset passwords across many systems
▪ No longer requires management of password policies across many systems
Security
▪ Secure authentication with one strong password, optionally with additional factors
▪ Eliminates need for password reminders on post-it notes
▪ All passwords kept in one protected, central place
Cost efficiency
▪ Efficiency gains as users only need to remember one password
▪ Higher productivity due to reduced efforts for manual authentication, password reset, and
helpdesk interaction
▪ Low TCO of running a secure landscape through management of server-side certificates
Single sign-on
▪ Authenticate once to an authentication server (Microsoft Active Directory, AS ABAP,..)
▪ The returned security token confirms your identity for each subsequent login to business
applications
Multiple sign-on
▪ Authenticate each time you access a business application
▪ Authentication against a central authentication server, not the business application itself
▪ Common scenario to require the Windows credentials for each system logon
Multi-factor authentication
▪ In addition to knowledge of information (password), authentication requires a physical
element (possession of mobile phone, RSA SecurID card, etc.)
▪ Implementation option for both single sign-on and multiple sign-on
Security capabilities must be easy to implement and use. Customers should not have to weigh the
implementation efforts against the benefits of running a secure landscape.
Simple configuration
▪ Configuration with standard ABAP transactions SPNEGO and
SNCWIZARD
▪ No need to work on the server command line
Simple operations
▪ Tightly integrated into the SAP NetWeaver stack, re-using its existing,
proven infrastructure and security framework
Suggested playlist:
All SAP Single Sign-On videos on YouTube
Existing certificate
▪ SAP Single Sign-On can use an existing certificate for authentication
▪ Certificate could for example come from a smart card
▪ Advantage: No additional server component required
▪ Disadvantage: Some added-value scenarios of Secure Login Server are not available
Scenario
▪ Customers that already have an
Provision user enterprise PKI do not want to
certificates establish a second one
Business user ▪ Secure Login Server (SLS)
integrates with existing
Forward request enterprise PKI for both user and
server certificates
▪ Benefits
Return certificate − Certificate signing based on
established PKI and security
Secure Login Server Enterprise PKI
(ADCS* or CMC** compatible) policy
NW AS JAVA − Storage and revocation processes
Renew server certificates
unchanged
− SAP system integration decoupled
from PKI, managed by SLS
SAP NetWeaver *Active Directory Certificate Services
** Certificate management over CMS, RFC 5272
SAP NetWeaver uses server-side X.509 certificates for a number of security functions. Depending on the certificate validity,
certificates need to be renewed on a regular basis. Certificate lifecycle management manages the renewal of certificates,
reduces manual efforts, and prevents downtimes.
Process steps
▪ Establish and configure a trust relationship between
SAP NetWeaver and the Secure Login Server
▪ Schedule a job that identifies expiring certificates
and automatically renews them
Benefits
▪ Prevent downtimes caused by expired certificates
▪ Replace error-prone manual steps with a robust
automated process
Additional capabilities
▪ Automated central roll-out of trusted root certificates to the
landscape
▪ Option for integration with existing enterprise PKI
The process steps of certificate lifecycle management are triggered from the business system.
5 SAML-based
and redirect back authentication Service Provider (SP),
even based on multiple
to Service Provider e.g. SAP NetWeaver factors
ASNW AS or
ABAP JAVA
Java 4. IdP establishes a security
session, returns a SAML
assertion, and redirects the
browser back to the SP
SAP Identity Provider
(IdP) on AS Java 5. User is authenticated
Usage scenarios
▪ Recommended for systems with high security requirements
▪ Configurable per system or even user
▪ Seamless integration into Secure Login Client for certificate-
based scenarios
Microsoft Authenticator SAP Authenticator
© 2020 SAP SE or an SAP affiliate company. All rights reserved. ǀ PUBLIC 25
Risk-based authentication
Risk-based authentication
▪ Dynamic adjustment of required authentication process during logon
▪ Based on contextual information and configurable rules
▪ Takes a risk-based approach to balance between security and usability
Sample scenarios
▪ Allow access only from certain IP ranges
▪ Request 2nd authentication factor if the first authentication step is based
on a password instead of an X.509 certificate
▪ Enforce two-factor authentication for administrators
Benefit
▪ Client-side digital signatures can be triggered from web applications
▪ The JavaScript interface is supported by all modern web browsers
▪ Based on the Secure Login Client, available on Windows and macOS
Secure Login Client (SLC) for macOS brings single sign-on based on
X.509 certificates to the macOS platform.
Multi-factor authentication
▪ Advanced authentication capabilities such as multi-factor authentication and
risk-based authentication are available on macOS
Browser integration
▪ Customers can enroll certificates from Safari on macOS, using the Secure
Login Web Client
▪ Customers can perform digital signatures on the desktop, triggered from a
UI5 web application running in Safari on macOS
The Federal Information Processing Standard (FIPS) 140-2 is defined by the National Institute of Standards
and Technology (NIST) and specifies quality requirements for cryptographic modules.
SAP Single Sign-On and SAP Cloud Identity Services, Identity Authentication both support secure
authentication and single sign-on. While SAP Single Sign-On focuses on employee scenarios, and on-
premise, the Identity Authentication service targets cloud applications beyond the corporate user base.
Technical implications
Security
▪ Secure authentication and FIPS-certified cryptographic functions
▪ Risk-based authentication and two-factor authentication
▪ Digital signatures
Productivity
▪ Single sign-on to SAP and non-SAP applications
▪ Fast return on investment
Security software
https://community.sap.com/topics/security
www.sap.com/contactsap