You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: guides/security/overview.md
+19-19Lines changed: 19 additions & 19 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -36,14 +36,14 @@ For example, authentication can be delegated to a [separate ingress component](.
36
36
37
37
### Customizable { #key-concept-customizable }
38
38
39
-
Due to the plugin-based architecture, **CAP allows standard functions to be modified as required or, if necessary, completely replaced**.
40
-
This flexibility is crucial for scenarios where the default methods do not fully meet the requirements of the application.
39
+
Due to the plugin-based architecture, **you can modify CAP's standard functions as required or, if necessary, completely replace them**.
40
+
This flexibility is crucial for scenarios where the default methods do not fully meet your application's requirements.
41
41
Moreover, this integration helps to easily incorporate non-CAP and even non-BTP services, thereby providing a flexible and interoperable environment.
42
42
43
43
{width="600px" }
44
44
45
-
For instance, it is possible to define specific endpoints with a [custom authentication strategy](./authentication#custom-auth).
46
-
Likewise, the CAP representation of the request user can be overruled to match additional, application-specific requirements.
45
+
For instance, you can define specific endpoints with a [custom authentication strategy](./authentication#custom-auth).
46
+
Likewise, you can override the CAP representation of the request user to match additional, application-specific requirements.
47
47
48
48
### Built on Best of Breed { #key-concept-platform-services }
49
49
@@ -59,7 +59,7 @@ Likewise, TLS termination is offered by the [platform infrastructure](#platform-
59
59
60
60
### Decoupled from Business Logic { #key-concept-decoupled-coding }
61
61
62
-
As security functions are factorized into independent components, **application code is entirely decoupled** and hence is not subject to change in case of any security-related adaptations.
62
+
As security functions are factorized into independent components, **application code is entirely decoupled** and hence is not subject to change for any security-related adaptations.
63
63
This ensures that business logic remains independent of platform services, which are often subject to security-hardening initiatives.
64
64
As a welcome side effect, this also allows testing application security in a **local test or development setup in a self-contained way**.
65
65
@@ -85,15 +85,15 @@ The application is responsible for coordinated overall configuration.
85
85
## Security Architecture
86
86
87
87
CAP applications run in a specific context that has a major impact on the security [architecture](#architecture-overview).
88
-
CAP requires a dedicated [platform environment](#platform-environment) to integrate with, in order to ensure end-to-end security.
88
+
CAP requires a dedicated [platform environment](#platform-environment) to integrate with to ensure end-to-end security.
The following diagram provides a high-level overview of the security-relevant components and interfaces of a deployed CAP application in a cloud environment:
93
93
94
94
{width="600px"}
95
95
96
-
To serve a business request, different runtime components are involved: a request, issued by a UI or technical client ([public zone](#public-zone)), is forwarded by a gateway or ingress router to the CAP application. In case of a UI request, an [Application Router](https://help.sap.com/docs/btp/sap-business-technology-platform/application-router) instance acts as a proxy to manage the login flow and the browser session. The CAP application can have additional services such as a CAP sidecar. All application components ([application zone](#application-zone)) might make use of platform services such as database or identity service ([platform zone](#platform-zone)).
96
+
To serve a business request, different runtime components are involved: a request, issued by a UI or technical client ([public zone](#public-zone)), is forwarded by a gateway or ingress router to the CAP application. For a UI request, an [Application Router](https://help.sap.com/docs/btp/sap-business-technology-platform/application-router) instance acts as a proxy to manage the login flow and the browser session. The CAP application can have additional services such as a CAP sidecar. All application components ([application zone](#application-zone)) might make use of platform services such as database or identity service ([platform zone](#platform-zone)).
97
97
98
98
#### Public Zone { #public-zone }
99
99
@@ -107,17 +107,17 @@ Ideally, you should limit the number of exposed endpoints to a minimum, perhaps
107
107
108
108
The platform zone contains all platform components and services that are *configured and maintained* by the application provider.
109
109
CAP applications consume these low-level [platform services](#btp-services) to handle more complex business requests.
110
-
For instance, persistence service to store business data and identity service to authenticate the business user play a fundamental role.
110
+
For instance, the persistence service stores business data and the identity service authenticates the business user. Both play a fundamental role.
111
111
112
112
The platform zone also includes the gateway, which is the main entry point for external requests. Additionally, it may contain extra ingress routers.
113
113
114
114
#### Application Zone { #application-zone}
115
115
116
-
The application zone comprises all microservices that represent a CAP application. They are tightly integrated and form a **unit of trust**. The application provider is responsible to *develop, deploy and operate* these services:
116
+
The application zone comprises all microservices that represent a CAP application. They are tightly integrated and form a **unit of trust**. The application provider is responsible for *developing, deploying, and operating* these services:
117
117
118
118
- The [Application Router](https://help.sap.com/docs/btp/sap-business-technology-platform/application-router) acts as an optional reverse proxy wrapping the application service and providing business-independent functionality required for UIs.
119
119
This includes serving UI content, providing a login flow as well as managing the session with the browser.
120
-
It can be deployed as an application (reusable module) or alternatively consumed as a [service](https://help.sap.com/docs/btp/sap-business-technology-platform/managed-application-router).
120
+
You can deploy it as an application (reusable module) or alternatively consume it as a [service](https://help.sap.com/docs/btp/sap-business-technology-platform/managed-application-router).
121
121
122
122
- The CAP application service exposes the API to serve business requests. Usually, it makes use of lower-level platform services. As built on CAP, a significant number of security requirements is covered either out of the box or by adding minimal configuration.
123
123
@@ -144,7 +144,7 @@ This **frees CAP applications from the need to manage trust certificates**. The
144
144
145
145
3.**Secrets** that are required to protect the application or to consume other platform services **are injected by the platform** into the application microservices in a secure way.
146
146
147
-
All supported [environments](#cloud) fulfill the given requirements. Additional requirements could be added in future.
147
+
All supported [environments](#cloud) fulfill the given requirements. Additional requirements may be added in future.
148
148
149
149
::: tip
150
150
Custom domain certificates must be signed by a trusted certificate authority.
@@ -190,12 +190,12 @@ Currently, CAP supports to run on two cloud runtimes of [SAP Business Technology
Application providers are responsible to ensure a **secure platform environment**.
193
+
Application providers are responsible for ensuring a **secure platform environment**.
194
194
In particular, this includes *configuring*[platform services](#btp-services) the application consumes.
195
-
For instance, the provider (user) administrator needs to configure the [identity service](#identity-service) to separate platform users from business users that come from different identity providers.
195
+
For instance, you as the provider (user) administrator need to configure the [identity service](#identity-service) to separate platform users from business users that come from different identity providers.
196
196
Likewise, login policies (for example, multifactor authentication or single-sign-on) must be aligned with company-specific requirements.
197
197
198
-
Note, that achieving production-ready security requires to meet all relevant aspects of the **development process** as well.
198
+
Note that achieving production-ready security requires meeting all relevant aspects of the **development process** as well.
199
199
For instance, source code repositories must be protected and must not contain any secrets or personal data.
200
200
Likewise, the **deployment process** must be secured. This includes not only setting up CI/CD pipelines running on technical platform users, but also defining integration tests to ensure properly secured application endpoints.
201
201
@@ -219,23 +219,23 @@ Find more about BTP platform security here:
219
219
220
220
### Security Platform Services { #btp-services }
221
221
222
-
SAP BTP provides a range of platform services that your CAP applications can utilize to meet production-grade security requirements. To ensure the security of your CAP applications, it's crucial to comply with the service level agreement (SLA) of these platform services. *As the provider of the application, you play a key role in meeting these requirements by correctly configuring and using these services.*
222
+
SAP BTP provides a range of platform services that your CAP applications can use to meet production-grade security requirements. To ensure the security of your CAP applications, comply with the service level agreement (SLA) of these platform services. *As the provider of the application, you play a key role in meeting these requirements by correctly configuring and using these services.*
223
223
224
224
::: tip
225
225
SAP BTP services and the underlying platform infrastructure hold various certifications and attestations, which can be found under the naming of SAP Cloud Platform in the [SAP Trust Center](https://www.sap.com/about/trust-center/certification-compliance/compliance-finder.html?search=SAP%20Business%20Technology%20Platform%20ISO).
226
226
:::
227
227
[Webcast SAP BTP Cloud Identity and Security Services](https://assets.dm.ux.sap.com/webinars/sap-user-groups-k4u/pdfs/221117_sap_security_webcast_series_sap_btp_cloud_identity_and_security_services.pdf){.learn-more}
228
228
229
229
230
-
The CAP framework offers flexible APIs that you can integrate with various services, including your custom services. If you replace platform services with your custom ones, it's important to ensure that the service level agreements (SLAs) CAP depends on are still met.
230
+
The CAP framework offers flexible APIs that you can integrate with various services, including your custom services. If you replace platform services with your custom ones, ensure that the service level agreements (SLAs) CAP depends on are still met.
231
231
232
232
The most important services for security offered by the platform:
The Identity Authentication service defines the user base for (CAP) applications and services, and allows to control access.
237
-
Customers can integrate their third-party or on-premise identity provider (IdP) and harden security by defining multifactor authentication or by narrowing client IP ranges.
238
-
This service helps to introduce a strict separation between platform users (provider) and business users (subscribers), a requirement of CAP. It supports various authentication methods, including SAML 2.0 and [OpenID Connect](https://openid.net/connect/), and allows for the configuration of single sign-on access.
236
+
The Identity Authentication service defines the user base for (CAP) applications and services, and allows you to control access.
237
+
You can integrate your third-party or on-premise identity provider (IdP) and harden security by defining multifactor authentication or by narrowing client IP ranges.
238
+
This service helps introduce a strict separation between platform users (provider) and business users (subscribers), a requirement of CAP. It supports various authentication methods, including SAML 2.0 and [OpenID Connect](https://openid.net/connect/), and allows you to configure single sign-on access.
239
239
240
240
[Learn more in the SAP Cloud Identity - Security Guide.](https://help.sap.com/docs/IDENTITY_AUTHENTICATION?#discover_task-security){.learn-more}
0 commit comments