Skip to content

Commit 8f8e1ae

Browse files
committed
SSO table update
1 parent ab40d76 commit 8f8e1ae

File tree

1 file changed

+3
-3
lines changed

1 file changed

+3
-3
lines changed

articles/virtual-machines/workloads/sap/sap-rise-integration.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -183,9 +183,9 @@ Single Sign-On (SSO) is configured for many SAP environments. With SAP workloads
183183

184184
| SSO method | Identity Provider | Typical use case | Implementation |
185185
| :--------- | :---------------: | :------------------------------- | :----------------------- |
186-
| SAML/OAuth | AAD | SAP Fiori, Web GUI, Portal, HANA | Customer configuration |
187-
| SNC | AD | SAP GUI | Configure with SAP |
188-
| SPNEGO | AD | Web GUI, Portal | Configure with SAP |
186+
| SAML/OAuth | AAD | SAP Fiori, Web GUI, Portal, HANA | Customer configuration |
187+
| SNC | AD | SAP GUI | Configure with ECS team |
188+
| SPNEGO | AD | Web GUI, Portal | Configure with ECS team |
189189

190190
SSO against Active Directory (AD) of your Windows domain for ECS/RISE managed SAP environment, needs to be planned in detail with SAP. SSO methods such as Kerberos/SPNEGO and Kerberos/SNC are used often for SSO with SAP GUI, Web GUI and SAP Portal and require an AD domain for the Kerberos protocol. Active directory integration is typically done on OS level, either Windows domain registration or Linux utilities such as kutil and keytab. With ECS/RISE managed workload this would mean having your domain objects in Azure tenant and subscription of SAP, as SAP does not provide a new AD domain for integration. Consider such implementation with your compliance team and SAP.
191191

0 commit comments

Comments
 (0)