You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/fundamentals/scenario-azure-first-sap-identity-integration.md
+6-6Lines changed: 6 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -35,7 +35,7 @@ This document provides advice on the technical design and configuration of SAP p
35
35
36
36
There are many services and components in the SAP and Microsoft technology stack that play a role in user authentication and authorization scenarios. The main services are listed in the diagram below.
Since there are many permutations of possible scenarios to be configured, we focus on one scenario that is in-line with an Azure AD identity first strategy. We'll make the following assumptions:
41
41
@@ -46,7 +46,7 @@ Since there are many permutations of possible scenarios to be configured, we foc
46
46
47
47
Based on these assumptions, we focus mostly on the products and services presented in the diagram below. These are the various components that are most relevant to authentication and authorization in a cloud-based environment.
48
48
49
-

49
+

50
50
51
51
## Recommendations
52
52
@@ -71,7 +71,7 @@ For SAP SaaS applications IAS is provisioned and pre-configured for easy onboard
71
71
72
72
When your authoritative user directory is Azure AD, we recommend setting up a trust configuration in BTP towards IAS. IAS in turn is set up to federate with Azure AD as a Corporate Identity Provider.
On the trust configuration in BTP, we recommend that "Create Shadow Users During Logon" is enabled. This way, users who haven't yet been created in BTP, automatically get an account when they sign in through IAS/Azure AD for the first time. If this setting would be disabled, only pre-provisioned users would be allowed to sign in.
77
77
@@ -138,7 +138,7 @@ If you want to use Azure AD as the authoritative source for fine-grained authori
138
138
139
139
With this configuration, we recommend using the Azure AD group's Group ID (Object ID) as the unique identifier of the group, not the display name ("sAMAccountName"). This means you must use the Group ID as the "Groups" assertion in the SAML token issued by Azure AD. In addition the Group ID is used for the assignment to the Role Collection in BTP.
140
140
141
-

141
+

142
142
143
143
#### Why this recommendation?
144
144
@@ -158,7 +158,7 @@ In Azure AD:
158
158
- Further, in order to keep claims payloads small and to avoid running into the limitation whereby Azure AD will limit the number of group claims to 150 in SAML assertions, we highly recommend limiting the groups returned in the claims to only those groups that explicitly were assigned:
159
159
- Under "Which groups associated with the user should be returned in the claim?" answer with "Groups assigned to the application". Then for the groups you want to include as claims, assign them to the Enterprise Application using the "Users and Groups" section and selecting "Add user/group".
160
160
161
-

161
+

162
162
163
163
In IAS:
164
164
@@ -226,7 +226,7 @@ As discussed before, we recommend setting up a trust configuration in BTP toward
226
226
- The tenant certificate in IAS: when this changes, both the Enterprise Application's SAML 2.0 Configuration in Azure AD and the Trust Configuration in BTP must be updated.
227
227
- The Enterprise Application certificate in Azure AD: when this changes, the Corporate Identity Provider's SAML 2.0 Configuration in IAS must be updated.
228
228
229
-

229
+

230
230
231
231
SAP has example implementations for client certificate notifications with SAP Cloud Platform Integration [here](https://blogs.sap.com/2017/12/06/sap-cloud-platform-integration-automated-notification-of-keystore-entries-reaching-expiry/) and [here](https://blogs.sap.com/2019/03/01/sap-cloud-platform-integration-automated-notification-for-client-certificates-reaching-expiry/). This could be adapted with Azure Integration Services or PowerAutomate. However, they would need to be adapted to work with server certificates. Such approach requires a custom implementation.
0 commit comments