Skip to content

Commit f0c61c2

Browse files
committed
change media folder name for sap integration scenario
1 parent 49e2ec7 commit f0c61c2

File tree

7 files changed

+6
-6
lines changed

7 files changed

+6
-6
lines changed

articles/active-directory/fundamentals/scenario-azure-first-sap-identity-integration.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -35,7 +35,7 @@ This document provides advice on the technical design and configuration of SAP p
3535

3636
There are many services and components in the SAP and Microsoft technology stack that play a role in user authentication and authorization scenarios. The main services are listed in the diagram below.
3737

38-
![SAP landscape overview](./media/scenario-aad-first-sap-integration/sap-landscape-overview.png)
38+
![SAP landscape overview](./media/scenario-azure-first-sap-identity-integration/sap-landscape-overview.png)
3939

4040
Since there are many permutations of possible scenarios to be configured, we focus on one scenario that is in-line with an Azure AD identity first strategy. We'll make the following assumptions:
4141

@@ -46,7 +46,7 @@ Since there are many permutations of possible scenarios to be configured, we foc
4646

4747
Based on these assumptions, we focus mostly on the products and services presented in the diagram below. These are the various components that are most relevant to authentication and authorization in a cloud-based environment.
4848

49-
![SAP services in scope](./media/scenario-aad-first-sap-integration/sap-services-in-scope.png)
49+
![SAP services in scope](./media/scenario-azure-first-sap-identity-integration/sap-services-in-scope.png)
5050

5151
## Recommendations
5252

@@ -71,7 +71,7 @@ For SAP SaaS applications IAS is provisioned and pre-configured for easy onboard
7171

7272
When your authoritative user directory is Azure AD, we recommend setting up a trust configuration in BTP towards IAS. IAS in turn is set up to federate with Azure AD as a Corporate Identity Provider.
7373

74-
![SAP trust configuration](./media/scenario-aad-first-sap-integration/sap-trust-configuration.png)
74+
![SAP trust configuration](./media/scenario-azure-first-sap-identity-integration/sap-trust-configuration.png)
7575

7676
On the trust configuration in BTP, we recommend that "Create Shadow Users During Logon" is enabled. This way, users who haven't yet been created in BTP, automatically get an account when they sign in through IAS/Azure AD for the first time. If this setting would be disabled, only pre-provisioned users would be allowed to sign in.
7777

@@ -138,7 +138,7 @@ If you want to use Azure AD as the authoritative source for fine-grained authori
138138

139139
With this configuration, we recommend using the Azure AD group's Group ID (Object ID) as the unique identifier of the group, not the display name ("sAMAccountName"). This means you must use the Group ID as the "Groups" assertion in the SAML token issued by Azure AD. In addition the Group ID is used for the assignment to the Role Collection in BTP.
140140

141-
![Using Role Collections in SAP](./media/scenario-aad-first-sap-integration/sap-use-role-collections.png)
141+
![Using Role Collections in SAP](./media/scenario-azure-first-sap-identity-integration/sap-use-role-collections.png)
142142

143143
#### Why this recommendation?
144144

@@ -158,7 +158,7 @@ In Azure AD:
158158
- Further, in order to keep claims payloads small and to avoid running into the limitation whereby Azure AD will limit the number of group claims to 150 in SAML assertions, we highly recommend limiting the groups returned in the claims to only those groups that explicitly were assigned:
159159
- Under "Which groups associated with the user should be returned in the claim?" answer with "Groups assigned to the application". Then for the groups you want to include as claims, assign them to the Enterprise Application using the "Users and Groups" section and selecting "Add user/group".
160160

161-
![Azure AD Group Claim configuration](./media/scenario-aad-first-sap-integration/sap-aad-group-claim-configuration.png)
161+
![Azure AD Group Claim configuration](./media/scenario-azure-first-sap-identity-integration/sap-aad-group-claim-configuration.png)
162162

163163
In IAS:
164164

@@ -226,7 +226,7 @@ As discussed before, we recommend setting up a trust configuration in BTP toward
226226
- The tenant certificate in IAS: when this changes, both the Enterprise Application's SAML 2.0 Configuration in Azure AD and the Trust Configuration in BTP must be updated.
227227
- The Enterprise Application certificate in Azure AD: when this changes, the Corporate Identity Provider's SAML 2.0 Configuration in IAS must be updated.
228228

229-
![Rolling over SAML Signing Certs](./media/scenario-aad-first-sap-integration/sap-rollover-saml-signing-certs.png)
229+
![Rolling over SAML Signing Certs](./media/scenario-azure-first-sap-identity-integration/sap-rollover-saml-signing-certs.png)
230230

231231
SAP has example implementations for client certificate notifications with SAP Cloud Platform Integration [here](https://blogs.sap.com/2017/12/06/sap-cloud-platform-integration-automated-notification-of-keystore-entries-reaching-expiry/) and [here](https://blogs.sap.com/2019/03/01/sap-cloud-platform-integration-automated-notification-for-client-certificates-reaching-expiry/). This could be adapted with Azure Integration Services or PowerAutomate. However, they would need to be adapted to work with server certificates. Such approach requires a custom implementation.
232232

0 commit comments

Comments
 (0)