You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/sap/workloads/rise-integration.md
+10-8Lines changed: 10 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -30,18 +30,20 @@ For customers with SAP solutions such as RISE with SAP Enterprise Cloud Services
30
30
31
31
It's important to distinguish the responsibility between SAP and customer when enabling certain Azure scenarios. The following diagram illustrates most common situations.
> |Customer acts in own Azure Subscription| No | No | Shared | Yes | Yes | Yes | Yes |
37
-
> |Customer acts within their SAP RISE managed application | No | Yes | Shared | Yes | Yes | Yes | Yes |
38
-
> |Customer requests SAP ECS to act in their SAP landscape | Yes | Yes | Shared | No | No | No | No |
39
-
> |Example scenario |Deploy SAP system in Azure, software release upgrade | Setup transport route, SAP user management |[Setup network peering](./rise-integration-network.md#virtual-network-peering-with-sap-riseecs), adjust NSG rule |[Enable Power App to consume SAP interfaces](./rise-integration-services.md#on-premises-data-gateway)|[Enable PowerBI](./rise-integration-services.md#on-premises-data-gateway), Fabric, [Synapse](./rise-integration-services.md#integration-with-self-hosted-integration-runtime) to consume SAP data |[Enable MS Entra ID as SSO provider for Fiori](./rise-integration-security.md#single-sign-on-for-sap), OData APIs |[Defend SAP with Sentinel](./rise-integration-security.md#microsoft-sentinel-with-sap-rise) to block compromised users during attacks |
40
-
41
33
[](./media/sap-rise-integration/sap-rise-integration-table.png)
42
34
43
35
There might be some circumstances when an initial request needs to be placed with SAP RISE for enablement. However, most Azure scenarios depend on open network communication to available SAP interfaces and activities entirely within customer's responsibility. Diagram shown doesn't replace or extends an existing responsibility matrix between the customer and SAP RISE/ECS.
44
36
37
+
## First steps
38
+
39
+
Review the specifics within this document and then jump to individual documents for your scenario. From the integration table, some examples are listed.
-[Enable Power App to consume SAP interfaces](./rise-integration-services.md#on-premises-data-gateway)
43
+
-[Enable PowerBI](./rise-integration-services.md#on-premises-data-gateway), Fabric, [Synapse](./rise-integration-services.md#integration-with-self-hosted-integration-runtime) to consume SAP data.
44
+
-[Enable MS Entra ID as SSO provider](./rise-integration-security.md#single-sign-on-for-sap)
45
+
-[Defend SAP at machine speed with Sentinel](./rise-integration-security.md#microsoft-sentinel-with-sap-rise) to block compromised users during attacks.
46
+
45
47
## Azure support
46
48
47
49
SAP RISE customers in Azure have the SAP landscape run by SAP in an Azure subscription owned by SAP. The subscription and all Azure resources of your SAP environment are visible to and managed by SAP only. In turn, the customer's own Azure environment contains applications that interact with the SAP systems. Elements such as virtual networks, network security groups, firewalls, routing, Azure services such as Azure Data Factory and others running inside the customer subscription access the SAP managed landscape. When you engage with Azure support, only resources in your own subscriptions are in scope. Contact SAP for issues with any resources operated in SAP's Azure subscriptions for your RISE workload.
0 commit comments