SCUR351 Simplifying User Administration in Heterogeneous ...

62 downloads 1315 Views 3MB Size Report
e.g. (Web application). Directory. Web App.. Service. E m p lo ye e p o rta l. Windows .... attributetypes: ( 1.3.6.1.4.1.694.2.1.101 NAME 'sapUsername' SYNTAX.
SAP TechEd ‘03 Basel, CH

SCUR351 Simplifying User Administration in Heterogeneous Landscapes Patrick Hildenbrand Kristian Lehment SAP AG

Learning Objectives As a result of this workshop, you will be able to: Explain and use Central User Administration (CUA) Set up and use LDAP directory synchronization Configure and use the User Management Engine (UME)

 SAP AG 2003, TechED_Basel / SCUR351, P. Hildenbrand u. K. Lehment / 2

© 2003 SAP AG

SCUR 351, Patrick Hildenbrand, Kristian Lehment

1

SAP TechEd ‘03 Basel, CH

Agenda

Identity management overview CUA in detail LDAP directory integration in detail UME in detail Summary

 SAP AG 2003, TechED_Basel / SCUR351, P. Hildenbrand u. K. Lehment / 3

Agenda

Identity management overview CUA in detail LDAP directory integration in detail UME in detail Summary

 SAP AG 2003, TechED_Basel / SCUR351, P. Hildenbrand u. K. Lehment / 4

© 2003 SAP AG

SCUR 351, Patrick Hildenbrand, Kristian Lehment

2

SAP TechEd ‘03 Basel, CH

Central User Administration Using ALE

Recommended >= 4.6c Users can be administered in central SAP system

Central system of CUA

Automatic distribution to client SAP systems ALE

Local administration still possible (redistribution)

ALE

No inconsistencies Central locks possible SAP 6.20 SAP 4.6 SAP 4.5 CUA client CUA client CUA client Client systems of CUA  SAP AG 2003, TechED_Basel / SCUR351, P. Hildenbrand u. K. Lehment / 5

Central User Administration & LDAP Synchronization SAP 6.10 CUA central system

ALE

Directory LDAP synchronization

ALE

SAP 6.10 SAP 4.6 CUA client CUA client

LDAP synchronization

SAP 4.5 CUA client

SAP 6.20

SAP 6.10

 SAP AG 2003, TechED_Basel / SCUR351, P. Hildenbrand u. K. Lehment / 6

© 2003 SAP AG

SCUR 351, Patrick Hildenbrand, Kristian Lehment

3

SAP TechEd ‘03 Basel, CH

Central User Administration, LDAP Synchronization & Enterprise Portal 5.0 Enterprise Portal 5.0

SAP 6.20 CUA central system

Directory

LDAP synchronization

ALE

ALE

SAP 6.20 SAP 4.6 CUA client CUA client

SAP 4.5 CUA client

 SAP AG 2003, TechED_Basel / SCUR351, P. Hildenbrand u. K. Lehment / 7

Central User Administration, LDAP Synchronization & Enterprise Portal 6.0 Directory

LDAP synchronization

Central User Admin ALE

LDAP based user persistence layer

RDBMS based user

persistence layer User Management DB Engine

Authentication / Authorization

6.20 Enterprise Portal 6.0

ALE

4.6D

 SAP AG 2003, TechED_Basel / SCUR351, P. Hildenbrand u. K. Lehment / 8

© 2003 SAP AG

SCUR 351, Patrick Hildenbrand, Kristian Lehment

4

SAP TechEd ‘03 Basel, CH

UME 4.0 and SAP Web Application Server 6.30

Role Integration J2EE engine

UME

UME userstore assign

J2EE role

assign

Java Group assign (in J2EE engine or UME) ?

mapping

Actions

Java Users

SAP Users

UME role i.e. Administrator

i.e. administrators

i.e. Admin

i.e. UME.Manage_All

ABAP engine

assign

SAP Role

 SAP AG 2003, TechED_Basel / SCUR351, P. Hildenbrand u. K. Lehment / 9

Agenda

Identity management overview CUA in detail LDAP directory integration in detail UME in detail Summary

 SAP AG 2003, TechED_Basel / SCUR351, P. Hildenbrand u. K. Lehment / 10

© 2003 SAP AG

SCUR 351, Patrick Hildenbrand, Kristian Lehment

5

SAP TechEd ‘03 Basel, CH

Set Up of System Infrastructure s: mean ways l a Steps to go through m em’ syst a syste at ‘ n h i t nt Note clie Setting Up an ALE communication user } USER

Define logical systems later on, systems are always referred to by their logical system ID

Define RFC destinations between central system and child systems

} ALE

Define ALE distribution model “Switch on” the Central User Administration Define field attributes

} CUA

Migrate users (if necessary)

 SAP AG 2003, TechED_Basel / SCUR351, P. Hildenbrand u. K. Lehment / 11

CUA Configuration CUA CENTRAL CLIENT TT1 200

CHILD SYSTEM TT1 300

Since ALE is the heart of a CUA from a technical perspective: First: copy SAP supplied roles for the RFC users to the customer name versions Next: create administrative users in each client Always start with the central client for all relevant tasks during the configuration Set up logical systems Assign a logical system to each affected client

CHILD SYSTEM TT1 NNN

 SAP AG 2003, TechED_Basel / SCUR351, P. Hildenbrand u. K. Lehment / 12

© 2003 SAP AG

SCUR 351, Patrick Hildenbrand, Kristian Lehment

6

SAP TechEd ‘03 Basel, CH

Creating Roles for RFC User Access – Central System In the Central Client all RFC users will need to be created

CUA Central System

CHILD SYSTEM TT1 300

CLIENT TT1 200 Before creating the RFC users you will need to copy a number of SAP supplied roles for use in your implementation In the central client these roles are: SAP_BC_USR_CUA_SETUP_CENTRAL * SAP_BC_USR_CUA_CENTRAL SAP_BC_USR_CUA_CENTRAL_BDIST A NAMING CONVENTION CAN BE AS SIMPLE AS ADD A „Z_“ IN FRONT OF THE SAP SUPPLIED NAMES

CHILD SYSTEM TT1 NNN

*This role is only required during the setup of CUA and can be taken away from the TT1/200 user afterwards  SAP AG 2003, TechED_Basel / SCUR351, P. Hildenbrand u. K. Lehment / 13

Creating Roles for RFC User Access – Client Systems

CUA Central System CLIENT TT1 200

Only the user needed for the particular child system needs to be created in these instances CHILD SYSTEM TT1 300

In the Child Systems/Clients these roles are: SAP_BC_USR_CUA_SETUP_CLIENT* SAP_BC_USR_CUA_CLIENT A NAMING CONVENTION CAN BE AS SIMPLE AS ADD A “Z_” IN FRONT OF THE SAP SUPPLIED NAMES. Once the roles are copied, and generated you are ready to create users and assign the new roles to them

CHILD SYSTEM TT1 NNN

*This role is only required during the setup of CUA and can be taken away from the ADM user afterwards.  SAP AG 2003, TechED_Basel / SCUR351, P. Hildenbrand u. K. Lehment / 14

© 2003 SAP AG

SCUR 351, Patrick Hildenbrand, Kristian Lehment

7

SAP TechEd ‘03 Basel, CH

Create RFC Users

CUA Central System CLIENT TT1 200

CHILD SYSTEM TT1 300

The use of ALE requires to set-up RFC connections between the clients. In order to set up these connections, special RFC users are required These users will have very specific access granted to them and should be monitored over time to ensure that they do not gain additional unnecessary authorizations The naming convention should be something like: CUA_ for the central client and CUA__ for the child systems Once they are created assign the proper roles to each one of them

CHILD SYSTEM TT1 NNN

 SAP AG 2003, TechED_Basel / SCUR351, P. Hildenbrand u. K. Lehment / 15

Create ALE Distribution Model

TT1CLNT200

TT1CLNT300

CUA Central System Via transaction SALE the distribution model can be created Use naming convention for the central system like CLNT, e.g. TT1CLNT200

CHILD SYSTEM TT1 NNN

This allows for the distribution of the user master data from the central system to the child systems

 SAP AG 2003, TechED_Basel / SCUR351, P. Hildenbrand u. K. Lehment / 16

© 2003 SAP AG

SCUR 351, Patrick Hildenbrand, Kristian Lehment

8

SAP TechEd ‘03 Basel, CH

Define Logical Systems In CUA, clients are referred to by logical system ID. To be able to do that we obviously first have to name logical systems. In a second step we then assign these logical systems to actual clients.

 SAP AG 2003, TechED_Basel / SCUR351, P. Hildenbrand u. K. Lehment / 17

Define Logical Systems In the IMG-Activity: Name the Logical System, enter a logical system name and a clear description for that system.

In the IMG-Activity Assign Logical System to Client, make the connection between a logical system name and a client in the current R/3 System.  SAP AG 2003, TechED_Basel / SCUR351, P. Hildenbrand u. K. Lehment / 18

© 2003 SAP AG

SCUR 351, Patrick Hildenbrand, Kristian Lehment

9

SAP TechEd ‘03 Basel, CH

Define Target Systems for RFC Calls If we look at the distribution model again, we see that we now have assigned a logical system name to all systems involved. In the next step we have to define which system communicates with which other system. Note that the central system communicates with all client systems. Every client system only needs to “know” the central system.

 SAP AG 2003, TechED_Basel / SCUR351, P. Hildenbrand u. K. Lehment / 19

Define Target Systems for RFC Calls We already mentioned that Central User Administration uses ALE for communication between systems. ALE is based on Remote Function Calls (RFC) between systems. To specify communication in a system landscape we have to define RFC calls between systems. An RFC destination is always created from the client where you are currently logged on, to another client. From the distribution model you already know that we need bi-directional communication between central and client system.

 SAP AG 2003, TechED_Basel / SCUR351, P. Hildenbrand u. K. Lehment / 20

© 2003 SAP AG

SCUR 351, Patrick Hildenbrand, Kristian Lehment

10

SAP TechEd ‘03 Basel, CH

Define Target Systems for RFC Calls After starting the IMGActivity Define Target Systems for RFC Calls, choose Create to define a new connection.

Under RFC destination enter the desired logical system. Connection type 3 defines that it is a connection to another R/3 System. Under Logon enter the previously created ALE user.  SAP AG 2003, TechED_Basel / SCUR351, P. Hildenbrand u. K. Lehment / 21

Creating the ALE Distribution Model (Manually)

To be able to distribute data between the systems we now have to define what kind of data has to be distributed. This is done by defining an ALE distribution model The distribution model describes the ALE message flow between logical systems Two types of data are distributed by the ALE distribution model: User master data (including assigned roles and profiles) Company address

 SAP AG 2003, TechED_Basel / SCUR351, P. Hildenbrand u. K. Lehment / 22

© 2003 SAP AG

SCUR 351, Patrick Hildenbrand, Kristian Lehment

11

SAP TechEd ‘03 Basel, CH

Creating an ALE Distribution Model After starting the IMG-Activity: • Maintain Distribution Model and Distribute

Views • Choose Create Model View • Add BAPI to define a new distribution model

It specifies which logical systems are involved in the CUA landscape and which data has to be distributed

 SAP AG 2003, TechED_Basel / SCUR351, P. Hildenbrand u. K. Lehment / 23

Creating an ALE Distribution Model The two BAPIs involved are called USER.Clone and UserCompany.Clone USER and UserCompany are the Object names, whereas Clone specifies the actual method.

 SAP AG 2003, TechED_Basel / SCUR351, P. Hildenbrand u. K. Lehment / 24

© 2003 SAP AG

SCUR 351, Patrick Hildenbrand, Kristian Lehment

12

SAP TechEd ‘03 Basel, CH

Generating Partner Profiles These partner profiles set the conditions for data exchange in an ALE environment The partner profiles are also generated from transaction BD64 -> Environment -> Generate Note that under Packet size you can select how many IDocs will be sent for each RFC process. This is used only if you specify 'Collect IDocs and transfer' Recommendations: Use Collect Idoc and transfer for both outbound processing in the central system and inbound processing in client systems and schedule reports RSOUT00 in central system and RBDAPP01 in client systems. Use packet size 50  SAP AG 2003, TechED_Basel / SCUR351, P. Hildenbrand u. K. Lehment / 25

Check Partner Profiles

Now you should check the generated partner profiles using -> Environment -> Change.

Use an Idoc Basic Type which both systems (central and client system) support. The Idoc Basic Type is release dependant.  SAP AG 2003, TechED_Basel / SCUR351, P. Hildenbrand u. K. Lehment / 26

© 2003 SAP AG

SCUR 351, Patrick Hildenbrand, Kristian Lehment

13

SAP TechEd ‘03 Basel, CH

Distribute ALE Distribution Model

Save and Distribute the new ALE Model.

 SAP AG 2003, TechED_Basel / SCUR351, P. Hildenbrand u. K. Lehment / 27

Activating the CUA Execute transaction SCUA in the central system New version of SCUA allows for automatic creation of the ALE distribution model and generation of partner profiles in central and client systems Enter the ALE model name and choose Create Enter the logical system names of all client systems and Save Go Back or restart SCUA, enter the ALE model name and choose Save Restart SCUA and choose Distribute Now, the creation of user accounts is controlled by the central system

 SAP AG 2003, TechED_Basel / SCUR351, P. Hildenbrand u. K. Lehment / 28

© 2003 SAP AG

SCUR 351, Patrick Hildenbrand, Kristian Lehment

14

SAP TechEd ‘03 Basel, CH

Field Selection

What is to be distributed? You decide...

...by setting attributes for each field  SAP AG 2003, TechED_Basel / SCUR351, P. Hildenbrand u. K. Lehment / 29

Transaction SCUM: Set Distribution Parameters Global – You can only maintain the data in the CUA central system and the changes are automatically distributed to the child systems Proposal – A default value is maintained in the CUA central system. This data is distributed once when a user is created, and then is maintained locally in the child system thereafter without further distribution from the central system. Redistribution – Data can be maintained both centrally and locally. If a change is made in the local child system it is redistributed first to the central system and then on to the other affected child systems. Local – Maintained locally only, with no further distribution Everywhere - Data can be maintained both centrally and locally. Only the changes made in the central system are distributed.

 SAP AG 2003, TechED_Basel / SCUR351, P. Hildenbrand u. K. Lehment / 30

© 2003 SAP AG

SCUR 351, Patrick Hildenbrand, Kristian Lehment

15

SAP TechEd ‘03 Basel, CH

Maintenance of Field Attributes Easy-to-use transaction for setting attributes quickly

Same tabs as in SU01

Field set to local: no maintenance in central system User maintenance (SU01) in central system  SAP AG 2003, TechED_Basel / SCUR351, P. Hildenbrand u. K. Lehment / 31

Use of Central User Administration

Users are created and maintained by executing transaction SU01 in the central system Maintenance of local fields via SU01 by local administrators in the client systems Maintenance of distribution parameters is only possible for the values chosen during the configuration of CUA This can represent a training issue for user administrators, since they will have to remember what client to log onto to perform their tasks

 SAP AG 2003, TechED_Basel / SCUR351, P. Hildenbrand u. K. Lehment / 32

© 2003 SAP AG

SCUR 351, Patrick Hildenbrand, Kristian Lehment

16

SAP TechEd ‘03 Basel, CH

User Maintenance in the Central System

SU01 in central system

Additional tab Systems: Define to which system the user will be distributed

 SAP AG 2003, TechED_Basel / SCUR351, P. Hildenbrand u. K. Lehment / 33

User Maintenance in the Central System

SU01 in central system: Difference in Roles tab

:

Define roles per system

Same for profiles  SAP AG 2003, TechED_Basel / SCUR351, P. Hildenbrand u. K. Lehment / 34

© 2003 SAP AG

SCUR 351, Patrick Hildenbrand, Kristian Lehment

17

SAP TechEd ‘03 Basel, CH

User Maintenance in a Child System Notice that you can no longer create users in this child system...

 SAP AG 2003, TechED_Basel / SCUR351, P. Hildenbrand u. K. Lehment / 35

CUA Monitoring and Analysis

How can I be sure that my changes are processed correctly ?

 SAP AG 2003, TechED_Basel / SCUR351, P. Hildenbrand u. K. Lehment / 36

© 2003 SAP AG

SCUR 351, Patrick Hildenbrand, Kristian Lehment

18

SAP TechEd ‘03 Basel, CH

Logs Within Each System Must Be Monitored Change user data Client System

LOG Complete list of Errors Warnings Successes Messages

Central System

Each action in the client system sends a log back to the central system

 SAP AG 2003, TechED_Basel / SCUR351, P. Hildenbrand u. K. Lehment / 37

Log Display Distribution log transaction SCUL in the central system

Various ways to display logs Ordered by system Ordered by error status Ordered by user name Ordered by user-defined selection criteria

 SAP AG 2003, TechED_Basel / SCUR351, P. Hildenbrand u. K. Lehment / 38

© 2003 SAP AG

SCUR 351, Patrick Hildenbrand, Kristian Lehment

19

SAP TechEd ‘03 Basel, CH

Change Documents, Last Modifier

Change documents in each system Modification in central system Distribution

Change document central system last modifier: Global Administrator Change document client system last modifier: ALE Transfer User

Change in client system

Modification in client system

Change document client system last modifier: Local Administrator

 SAP AG 2003, TechED_Basel / SCUR351, P. Hildenbrand u. K. Lehment / 39

CUA and Role Maintenance

How will I maintain roles in CUA?

 SAP AG 2003, TechED_Basel / SCUR351, P. Hildenbrand u. K. Lehment / 40

© 2003 SAP AG

SCUR 351, Patrick Hildenbrand, Kristian Lehment

20

SAP TechEd ‘03 Basel, CH

CUA and Role Maintenance

CUA Central System

SAP Component System

Assign roles

Develop roles Dev Read (single / composite) roles You can transport single and composite roles from a DEV system to the CUA central instance, but this is not recommended

QS

PRD

Transport

SAP BW System Develop roles Dev

BW or HR systems for example, have authorizations that will not exist in the CUA! Roles may therefore not be transported

QS

PRD

Transport

 SAP AG 2003, TechED_Basel / SCUR351, P. Hildenbrand u. K. Lehment / 41

Exercise

Exercise “1”

 SAP AG 2003, TechED_Basel / SCUR351, P. Hildenbrand u. K. Lehment / 42

© 2003 SAP AG

SCUR 351, Patrick Hildenbrand, Kristian Lehment

21

SAP TechEd ‘03 Basel, CH

Position-Based Security in HR-ORG and CUA

What is HR-Org? How might a system architecture look when HR-Org is used? What prerequisites have to be met to use HR-Org? How would a scenario look where HR-Org is used to support user administration? How do I implement HR-Org based user administration?

 SAP AG 2003, TechED_Basel / SCUR351, P. Hildenbrand u. K. Lehment / 43

HR Organizational Management – Org Structure in HR OU Org Unit Market MY

Org Units (OU)

1:n

OU

OU

Org Unit Finance

Org Unit HR

1:n

Positions

S

S

Position 70008501

Position 70008502

1:1

1:1

Employees Infotype 105

P

P

Employee John Smith 1:1

Employee Peter Scott 1:1

Users US

US

SAP User MYSMITHJ

SAP User MYSCOTTP

 SAP AG 2003, TechED_Basel / SCUR351, P. Hildenbrand u. K. Lehment / 44

© 2003 SAP AG

SCUR 351, Patrick Hildenbrand, Kristian Lehment

22

SAP TechEd ‘03 Basel, CH

HR Organizational Management – Objects

Object types

Object keys

Organizational Unit

O

Position

S

Employee

P

Jobs

C

User

US

Role

AG

All Objects are identified by an ObjectID.

 SAP AG 2003, TechED_Basel / SCUR351, P. Hildenbrand u. K. Lehment / 45

Position-Based Security in HR Org 0

Role Z_GEN_ALL

1

3

5

2

4

6

Position Payroll Admin Role Z_HR_Payroll Admin User MAIER

⇒ User Maier inherits the roles Z_GEN_ALL and Z_HR_Payroll Admin

⇒ If you want to connect an employee to a user you have to maintain infotype 0105

 SAP AG 2003, TechED_Basel / SCUR351, P. Hildenbrand u. K. Lehment / 46

© 2003 SAP AG

SCUR 351, Patrick Hildenbrand, Kristian Lehment

23

SAP TechEd ‘03 Basel, CH

Position-Based Security and CUA 1. Build composite roles in the central CUA system that combine single roles from different logical systems

Role Z_FI_Controlling Composite Role Role Z_HR_Payroll Admin Z_HR_ADMIN Role Z_Reporting

FICLNT100 HRCLNT200 BWCLNT200

2. Assign Composite Roles to objects in HR Organizational Management in the CUA central and run “org compare” and “user compare” 0 5

3

1

Position Payroll Admin 4

2

6

Composite Role Z_HR_ADMIN

Requirements: 4.6B or higher; support packages according to SAP note 511200  SAP AG 2003, TechED_Basel / SCUR351, P. Hildenbrand u. K. Lehment / 47

Landscapes HR Org sits on the CUA Central System Central System of CUA

HR Org sits on a CUA daughter System Indirect Role Assignment

Central System of CUA

ALE

ALE

ALE

Only Composite roles residing in the CUA central system can be assigned to PD-Org objects

Replication of Organizational ALE Structure into CUA Central

HR System with HR Org

 SAP AG 2003, TechED_Basel / SCUR351, P. Hildenbrand u. K. Lehment / 48

© 2003 SAP AG

SCUR 351, Patrick Hildenbrand, Kristian Lehment

24

SAP TechEd ‘03 Basel, CH

HR Org Structure Replication

a) Initial Replication Performed only once at Go-Live Distributes all objects of the HR Org structure

b) Delta Replications Performed periodically Only distribution of objects with change pointers Should be scheduled as background job

 SAP AG 2003, TechED_Basel / SCUR351, P. Hildenbrand u. K. Lehment / 49

Role Assignment to Positions in CUA (Indirect Role Assignment)

Drag&Drop

Role assignment becomes independent of daily user administration!  SAP AG 2003, TechED_Basel / SCUR351, P. Hildenbrand u. K. Lehment / 50

© 2003 SAP AG

SCUR 351, Patrick Hildenbrand, Kristian Lehment

25

SAP TechEd ‘03 Basel, CH

Assignment of Roles to Orgunits (O) and Jobs (C)

Role can be assigned to orgunits (O) as well In this case role assignments are inherited to all (sub-) orgunits and positions below Alternatively roles can be assigned to jobs In this case role assignments are inherited to all positions linked to the job Fairly generic roles only can be assigned to orgunits and jobs, since it is replicated to a potentially large number of users

 SAP AG 2003, TechED_Basel / SCUR351, P. Hildenbrand u. K. Lehment / 51

HR-Org Driven User Administration: Pros & Cons Advantages

Disadvantages

Org view available for role assignments

More complex user mass upload procedure (pre-go live)

Automated role assignment for all employee actions like hire, transfer etc.

Additional ALE distribution model to be monitored

Role accumulation avoided Close integration of user administration processes to HR Clear separation of user and role assignment administration

less flexible in terms of individual assignments of roles to users no transition period in terms of role assignments after transfers

 SAP AG 2003, TechED_Basel / SCUR351, P. Hildenbrand u. K. Lehment / 52

© 2003 SAP AG

SCUR 351, Patrick Hildenbrand, Kristian Lehment

26

SAP TechEd ‘03 Basel, CH

Documentation SAP Documentation 'Indirect Role Assignment - 620'

SAP Note 578265 'PFCG integration HR Org and role administration' SAP Note 578271 'PFCG integration of role assignment maint. in PPOME' SAP Note 581019 'Distribute PFCG HR-ORG model for ind. role assignm' SAP Note 511200 'PFCG/PFUD/SU01/SU10: Role assignment and profile comparison' SAP Note 200343 'HR-CA-ALE: Composite SAP note re distributing HR master data' SAP Note 363187 'HR-CA-ALE: Initial dist. w. HRMD_A/HRMD_ABA (hint)'

 SAP AG 2003, TechED_Basel / SCUR351, P. Hildenbrand u. K. Lehment / 53

Agenda

Identity Management Overview CUA in Detail LDAP Directory Integration in Detail UME in Detail Summary

 SAP AG 2003, TechED_Basel / SCUR351, P. Hildenbrand u. K. Lehment / 54

© 2003 SAP AG

SCUR 351, Patrick Hildenbrand, Kristian Lehment

27

SAP TechEd ‘03 Basel, CH

What Is a Directory Service?

A directory service is a mechanism to Store Distribute Search Retrieve

- structured information of general or specific interest

 SAP AG 2003, TechED_Basel / SCUR351, P. Hildenbrand u. K. Lehment / 55

Actual Situation (Example: User Administration) SAP HR

Infra DB

Telephone DB IT Tracking

License DB

Mail server Oracle DB

Internet Internet Firewall

RADIUS

Hello, I am the new Personnel data employee Where is my office/desk

Room, location

User-ID, password I need a telephone, telephone number, PC, mobile mobile I need software ABC

SMS configuration

I use e-mail, E-mail address, intranet and internet User-ID, PW, time management access rights I use my VPN, User-ID, applications remote password

 SAP AG 2003, TechED_Basel / SCUR351, P. Hildenbrand u. K. Lehment / 56

© 2003 SAP AG

SCUR 351, Patrick Hildenbrand, Kristian Lehment

28

SAP TechEd ‘03 Basel, CH

Integrated Cross-platform User Management

RACF user m anage

il

VPN a ccess

Directory

plo yee Em

er n t us N me LA age n ma

E-Ma n of s io t a e Cr esse addr

ment

por ta l

HOST applications

• Maintain basic user master data • Grant access to groups = applications • Control user accounts Administration • Maintain application-specific e.g. (Web application) attributes • Rule based creation / deletion of accounts

Internet Internet VPN

Messaging Server

Mail system Web App.. Service

Windows domain

 SAP AG 2003, TechED_Basel / SCUR351, P. Hildenbrand u. K. Lehment / 57

Directory Benefits Directories serve as central repository for master data, which is used by several different applications Modifications on this data can be done by every authorized application Access to this data is provided using the standardized Lightweight Directory Access Protocol (LDAP) Hundreds of other application and hardware suppliers support this protocol SAP systems can be connected to such a directory to share parts of their user data or database content (e.g. HR data) with other applications.

 SAP AG 2003, TechED_Basel / SCUR351, P. Hildenbrand u. K. Lehment / 58

© 2003 SAP AG

SCUR 351, Patrick Hildenbrand, Kristian Lehment

29

SAP TechEd ‘03 Basel, CH

Information Model – Hierarchical Structure DIT: Directory Information Tree

/

C=DE

C=GB

o=SAP

o=CompuNet

 SAP AG 2003, TechED_Basel / SCUR351, P. Hildenbrand u. K. Lehment / 59

Information Model – Names in the Tree c=DE o=SAP AG ou=Security Consulting cn=Max Smith

cn=Xaver Huber

ou=Sales cn=Norbert Hofer

cn=Kurt Wagner

c=DE,o=SAP AG,ou=Security Consulting,cn=Max Smith

• The way through the DIT defines the identification of an object • Absolute and relative names • Distinguished names have to be unique • Relative distinguished names are unique in their naming context  SAP AG 2003, TechED_Basel / SCUR351, P. Hildenbrand u. K. Lehment / 60

© 2003 SAP AG

SCUR 351, Patrick Hildenbrand, Kristian Lehment

30

SAP TechEd ‘03 Basel, CH

Information Model – Object Class Hierarchy

person

object class hierarchy

cn givenName sn

top

telephone mail

person

orgUnit

orgPerson cn givenName

orgPerson

sn telephone mail employeeID

SAPaddonUM

title

inetOrgPerson

department function

(SAP Schema extension)  SAP AG 2003, TechED_Basel / SCUR351, P. Hildenbrand u. K. Lehment / 61

Information Model – Entries in the DIT Uid

CN=D505050;o=SAPAG;C=DE

naming attribute (DN)

object class

inetOrgPerson sapAddOnUM

special attribute

givenName

Max

single-value attribute

sn

Smith

mandatory attribute

telephoneNumber

+49-6227 7-47474

optional attribute

mail

[email protected]

optional attribute

sapUserName

SMITH

SAP attribute

sapRoles

ABC:000:sapDeveloper XYZ:100:sapAdministrator

multi-value attribute

modifyTimestamp

20010730175352Z

operational attribute

 SAP AG 2003, TechED_Basel / SCUR351, P. Hildenbrand u. K. Lehment / 62

© 2003 SAP AG

SCUR 351, Patrick Hildenbrand, Kristian Lehment

31

SAP TechEd ‘03 Basel, CH

LDIF Format In order to allow for a standardized way of • Data extraction, • Data exchange between LDAP servers, • Loading data into LDAP servers, - LDIF (the “LDAP data interchange format”) was introduced.

Advantages of LDIF: • Standardized (described with RFC 2849) • Easy, ASCII based format • Syntax: attribute “:” value • Includes options to add, modify and delete objects and attributes

 SAP AG 2003, TechED_Basel / SCUR351, P. Hildenbrand u. K. Lehment / 63

LDIF Format, Example

dn: cn=smith,ou=employees,o=sap,dc=com Object class: top Object class: person Object class: organizationalPerson Object class: inetOrgPerson Mail: [email protected] givenName: max sn: smith telephoneNumber: +49(0)6227-474747

 SAP AG 2003, TechED_Basel / SCUR351, P. Hildenbrand u. K. Lehment / 64

© 2003 SAP AG

SCUR 351, Patrick Hildenbrand, Kristian Lehment

32

SAP TechEd ‘03 Basel, CH

LDIF File for Object Classes and Attributes # Version 1: initial release # # -------------------------------------------------------# dn: cn=schema changetype: modify add: attributetypes attributetypes: ( 1.3.6.1.4.1.694.2.1.101 NAME 'sapUsername' SYNTAX 1.3.6.1.4.1.1466.115.121.1.15 SINGLE-VALUE X-NDS_NAME 'sapUsername' )

dn: cn=schema changetype: modify add: attributetypes attributetypes: ( 1.3.6.1.4.1.694.2.1.102 NAME 'sapAlias' SYNTAX 1.3.6.1.4.1.1466.115.121.1.15 SINGLE-VALUE X-NDS_NAME 'sapAlias' )

 SAP AG 2003, TechED_Basel / SCUR351, P. Hildenbrand u. K. Lehment / 65

Replication, Physical Distribution Replication c=de,o=neptune

ou=parts

ou=stuff

ou=widgets

Physical distribution of content

c=

S de ubs ,o id = n ia ep r y t u “P ne ar ,o ts” u= : pa rts

Replication

 SAP AG 2003, TechED_Basel / SCUR351, P. Hildenbrand u. K. Lehment / 66

© 2003 SAP AG

SCUR 351, Patrick Hildenbrand, Kristian Lehment

33

SAP TechEd ‘03 Basel, CH

LDAP Connector

Application Server Work Process

Directory

LDAP Connector

Call Function ‘LDAP_XXX‘ Connection with LDAP Server Function ‘LDAP_XXX‘

LDAP

RFC

Executable LDAP_RFC shipped since Release 4.6A Loads LDAP Library of operating system at runtime  SAP AG 2003, TechED_Basel / SCUR351, P. Hildenbrand u. K. Lehment / 67

Transaction LDAP Allows deposition of connection and authentication data for different directory servers

Allows setup of the LDAP connector for directory access

Provides simple access to basic LDAP functionalities for testing purposes  SAP AG 2003, TechED_Basel / SCUR351, P. Hildenbrand u. K. Lehment / 68

© 2003 SAP AG

SCUR 351, Patrick Hildenbrand, Kristian Lehment

34

SAP TechEd ‘03 Basel, CH

RFC to LDAP Connector Create an RFC destination as shown. Then go back to the LDAP transaction and click on the “connector” button …

The LDAP connector is available from release R/3 4.6c. However the mapping table and the mass synchronization is available with SAP Web Application Server 6.10 and higher.  SAP AG 2003, TechED_Basel / SCUR351, P. Hildenbrand u. K. Lehment / 69

Activate LDAP Connector Now select the RFC destination just created. Enter information for LDAP connector, then click on the activation button:

LDAP activity can be monitored via CCMS.

 SAP AG 2003, TechED_Basel / SCUR351, P. Hildenbrand u. K. Lehment / 70

© 2003 SAP AG

SCUR 351, Patrick Hildenbrand, Kristian Lehment

35

SAP TechEd ‘03 Basel, CH

User Access to LDAP Server In the LDAP transaction, click on “System user” Then enter similar info as shown below.

 SAP AG 2003, TechED_Basel / SCUR351, P. Hildenbrand u. K. Lehment / 71

Define Logical LDAP System Names In transaction LDAP, click on “Server Names” This screen is also transaction LDAPMAP

 SAP AG 2003, TechED_Basel / SCUR351, P. Hildenbrand u. K. Lehment / 72

© 2003 SAP AG

SCUR 351, Patrick Hildenbrand, Kristian Lehment

36

SAP TechEd ‘03 Basel, CH

Test Connection to LDAP Server On the main screen of transaction LDAP Select a logical LDAP connector, and a logical LDAP server defined earlier

Click on the Log On button

In the next window, you can use “Use System User” to test the connection.

 SAP AG 2003, TechED_Basel / SCUR351, P. Hildenbrand u. K. Lehment / 73

User Data in SAP Systems

Administration of user data: Transactions SUxx BAPI interfaces

Maintained data: SAP user name Logon data Address data Access control data Personalization data

 SAP AG 2003, TechED_Basel / SCUR351, P. Hildenbrand u. K. Lehment / 74

© 2003 SAP AG

SCUR 351, Patrick Hildenbrand, Kristian Lehment

37

SAP TechEd ‘03 Basel, CH

LDAP Synchronization On top of the LDAP API, SAP implemented a user master data synchronization tool, which can be used to synch user master data between SAP and an LDAP server. The tool is flexible to allow various scenarios in which single source of user data is maintained across enterprise. In some cases, maybe custom development is desired to extend SAP’s standard functionalities.

Transaction LDAPMAP as shown before  SAP AG 2003, TechED_Basel / SCUR351, P. Hildenbrand u. K. Lehment / 75

Extend Schema of the LDAP Server Execute report RSLDAPSCHEMAEXT from SE38 An SAP proposed schema extension for the LDAP product is created

Method of importing this schema extension to selected SAP supported LDAP products

 SAP AG 2003, TechED_Basel / SCUR351, P. Hildenbrand u. K. Lehment / 76

© 2003 SAP AG

SCUR 351, Patrick Hildenbrand, Kristian Lehment

38

SAP TechEd ‘03 Basel, CH

Mapping Between Directory and SAP Data Fields

dn

uid=D505050,o=sap,c=de

Objectclass

inetOrgPerson sapAddOnUM

Username

SMITH

Firstname

Max

givenName

Max

Surname

Smith

Sn

Smith

Telephone Nr.

6227 7

telephoneNumber

+49-6227 7-47474

Telephone Ext.

47474

Uid

D505050

Mail

[email protected]

Mail

[email protected]

Roles

sapUserName

SMITH

sapRoles

ABC:100:sapDeveloper XYZ:200:sapAdministrator

sapDeveloper (system ABC, client 100) sapAdministrator (system XYZ, client 200)

Mapping  SAP AG 2003, TechED_Basel / SCUR351, P. Hildenbrand u. K. Lehment / 77

LDAPMAP Transaction - Mapping In this screen, you define the mapping between the LDAP server and the SAP system.

Click to add a new mapping For the LDAP application “User”, SAP provides a mapping proposal To delete a mapping, select it, then click on To delete all mapping lines, click the trash button

 SAP AG 2003, TechED_Basel / SCUR351, P. Hildenbrand u. K. Lehment / 78

© 2003 SAP AG

SCUR 351, Patrick Hildenbrand, Kristian Lehment

39

SAP TechEd ‘03 Basel, CH

Transaction LDAPMAP - Mapping

After importing the SAP proposed mapping it may look like this

 SAP AG 2003, TechED_Basel / SCUR351, P. Hildenbrand u. K. Lehment / 79

Mapping Flags in LDAPMAP Filter

Determines how corresponding entries for SAP Objects can be found in the directory (Only one line can be checked)

Import

Determines which mappings are used to read directory entries

Export

Determines which mappings are used to write directory entries

Required

Determines which attributes are essential (mandatory) for new directory entries

RDN

Marks the mapping which is used to form the RDN of new directory entries (Only one line can be checked)

 SAP AG 2003, TechED_Basel / SCUR351, P. Hildenbrand u. K. Lehment / 80

© 2003 SAP AG

SCUR 351, Patrick Hildenbrand, Kristian Lehment

40

SAP TechEd ‘03 Basel, CH

Transaction LDAPMAP – Synchronization Flags

 SAP AG 2003, TechED_Basel / SCUR351, P. Hildenbrand u. K. Lehment / 81

Report RSLDAPSYNC_USER

 SAP AG 2003, TechED_Basel / SCUR351, P. Hildenbrand u. K. Lehment / 82

© 2003 SAP AG

SCUR 351, Patrick Hildenbrand, Kristian Lehment

41

SAP TechEd ‘03 Basel, CH

Tasks of the Mapping Layer SAP system with WebAS 6.x release

Directory Server

LDAP Synchronization Mapping

Mapping of SAP data fields to designated directory server attributes Assignment of entries to designated object classes Assignment of RDN and DN (Key) Handling of complex structures  SAP AG 2003, TechED_Basel / SCUR351, P. Hildenbrand u. K. Lehment / 83

Mapping Function Modules SAP system with WebAS 6.x release

Directory Server

LDAP Synchronization Mapping

SAP Fields

Function Module

Directory Attributes

Parameters

 SAP AG 2003, TechED_Basel / SCUR351, P. Hildenbrand u. K. Lehment / 84

© 2003 SAP AG

SCUR 351, Patrick Hildenbrand, Kristian Lehment

42

SAP TechEd ‘03 Basel, CH

Mapping of Complex Structures

 SAP AG 2003, TechED_Basel / SCUR351, P. Hildenbrand u. K. Lehment / 85

BC-LDAP-USR - Certified Partners Partners currently certified (Status: Beginning 2003) (in sequence of certification date)

Novell, product „eDirectory Rel. 8.5“ Siemens, product „DirX Directory Server, Rel. 6.0“ Critical Path, product „CP Directory Server (CP D, Rel. 4.0“ Computer Associates, product „eTrust Directory, Rel. 4.0“ Oracle Corp., product „Oracle Internet Directory (OID)“ Microsoft Corp., product „Active Directory, Rel. Win2K SP1“

 SAP AG 2003, TechED_Basel / SCUR351, P. Hildenbrand u. K. Lehment / 86

© 2003 SAP AG

SCUR 351, Patrick Hildenbrand, Kristian Lehment

43

SAP TechEd ‘03 Basel, CH

Directory Server Software Certification Possible

SAP User Management Engine

SAP Certified Integration

3rd Party LDAP Directory Server

With EP 6.0 and WebAS 6.30, a certification of LDAP directory servers is possible This extends the certification that has been offered since WebAS release 6.10 covering the LDAP-communication of the SAP R/3 user management with a 3rd party directory server to the UME

 SAP AG 2003, TechED_Basel / SCUR351, P. Hildenbrand u. K. Lehment / 87

Certification Benefits for SAP Customers and Third-Party Vendors Benefits for SAP Customers Reduced implementation time & costs through tested 3rd party integration Guaranteed data integrity through stable interfaces (here LDAP) Easy selection of certified 3rd party integrations through online search engine

Benefits for Third-Party Vendors Listing on SAP’s homepage including certified scenario and contact data Vendor easily recognizable for SAP customers through SAP media (tagline, certificate, etc.) Technical certification may be prerequisite to join SAP Software Partner Program

 SAP AG 2003, TechED_Basel / SCUR351, P. Hildenbrand u. K. Lehment / 88

© 2003 SAP AG

SCUR 351, Patrick Hildenbrand, Kristian Lehment

44

SAP TechEd ‘03 Basel, CH

Interested? – Please contact ICC for more details

ICC Walldorf, Germany Phone +49 6227 – 767600 [email protected]

ICC Palo Alto, California US Phone +1 650 - 849 2661 [email protected]

Since 1995 about 800 vendors have successfully certified more than 1,400 interface products! http://www.sap.com/partner/software/directory

ICC Bangalore, India Phone +91 80 8418155 - 300 [email protected] responsible for Japanese requests

ICC: Integration & Certification Center  SAP AG 2003, TechED_Basel / SCUR351, P. Hildenbrand u. K. Lehment / 89

Exercise

Exercise “2”

 SAP AG 2003, TechED_Basel / SCUR351, P. Hildenbrand u. K. Lehment / 90

© 2003 SAP AG

SCUR 351, Patrick Hildenbrand, Kristian Lehment

45

SAP TechEd ‘03 Basel, CH

Agenda

Identity Management Overview CUA in Detail LDAP Directory Integration in Detail UME in Detail Summary

 SAP AG 2003, TechED_Basel / SCUR351, P. Hildenbrand u. K. Lehment / 91

Features of UME with EP 6.0 Web-based user administration End user self-registration User can create account in the portal Workflow for approval of registration request by administrator

Password management & policies Configurable expiration dates Initial passwords and change at first login Limit of failed logon attempts

Flexible user persistence layer LDAP directory, database or SAP system as user store

Delegated administration

 SAP AG 2003, TechED_Basel / SCUR351, P. Hildenbrand u. K. Lehment / 92

© 2003 SAP AG

SCUR 351, Patrick Hildenbrand, Kristian Lehment

46

SAP TechEd ‘03 Basel, CH

UME Architecture Applications Accessing User Management

EP 6.0

SRM 3.0

Logon

UME UI

UME Services

User Administration

Authentication / User APISSO User Account API

User API

UME API Layer

User Profile / Group Provisioning API

UME Core Layer

Group API

Role API

Authorization

Role API

Replication Manager

Persistence Manager

LDAP Directory

Database

Persistence Layer

ACL API

External System

ABAP Engine

 SAP AG 2003, TechED_Basel / SCUR351, P. Hildenbrand u. K. Lehment / 93

Persistence Manager Central place for reading and writing user-specific data Users Groups Role assignments

Uses Persistence Adapters to read/write data Supports database, LDAP directory and SAP system as repository User Management Core Layer

Persistence Manager

Persistence Adapters User Persistence Store

Database

LDAP Directory

SAP Engine

 SAP AG 2003, TechED_Basel / SCUR351, P. Hildenbrand u. K. Lehment / 94

© 2003 SAP AG

SCUR 351, Patrick Hildenbrand, Kristian Lehment

47

SAP TechEd ‘03 Basel, CH

Persistence – Supported Repositories

Portal Database Oracle 9.2 Microsoft SQL Server 2000

LDAP Directory Novell eDirectory Sun ONE Directory Server Microsoft ADS Siemens DirX

SAP System SAP Web Application Server 6.20 or higher

 SAP AG 2003, TechED_Basel / SCUR351, P. Hildenbrand u. K. Lehment / 95

Persistence Manager User Partitioning Specific user sets can be distributed across different repositories Example:

Self-registered, external users

Persistence Manager

Database

LDAP Directories

Internal users

Attribute Partitioning Specific user attributes can be distributed across different repositories Example:

Role assignments (portal-specific data)

Persistence Manager

Database

LDAP Directory

General user data (application independent)

 SAP AG 2003, TechED_Basel / SCUR351, P. Hildenbrand u. K. Lehment / 96

© 2003 SAP AG

SCUR 351, Patrick Hildenbrand, Kristian Lehment

48

SAP TechEd ‘03 Basel, CH

Replication Manager Replication of user data to external systems Provisioning for external systems that cannot use supported user repositories Notification when users are created or modified Data exchange via XML documents One-way replication of user data (Portal User Management Core Layer

External System)

Replication Manager

External System

 SAP AG 2003, TechED_Basel / SCUR351, P. Hildenbrand u. K. Lehment / 97

Replication Manager – Supported Systems

External System SAP Basis 4.6D, SAP Web Application Server 6.10 or higher Business Add-Ins (BAdis) supported

Example:

Replication Manager Portal User Provisioning to SAP Systems

BW

SRM

CRM

 SAP AG 2003, TechED_Basel / SCUR351, P. Hildenbrand u. K. Lehment / 98

© 2003 SAP AG

SCUR 351, Patrick Hildenbrand, Kristian Lehment

49

SAP TechEd ‘03 Basel, CH

User Administration Web based Administration GUI User Administration Functions: Create, copy, modify and search users Manage Roles and Permissions Assign users and groups to role(s)

 SAP AG 2003, TechED_Basel / SCUR351, P. Hildenbrand u. K. Lehment / 99

The UME UserAdmin Tool

 SAP AG 2003, TechED_Basel / SCUR351, P. Hildenbrand u. K. Lehment / 100

© 2003 SAP AG

SCUR 351, Patrick Hildenbrand, Kristian Lehment

50

SAP TechEd ‘03 Basel, CH

Maintaining Roles in the UME UserAdmin tool

 SAP AG 2003, TechED_Basel / SCUR351, P. Hildenbrand u. K. Lehment / 101

User Administration User Administration Functions (cont.): Set or auto-create password Set date & time for user account activation Lock/unlock users View user account history Approve/deny self-registered users Adapt attributes contained in self-registration E-Mail notifications for specified events

 SAP AG 2003, TechED_Basel / SCUR351, P. Hildenbrand u. K. Lehment / 102

© 2003 SAP AG

SCUR 351, Patrick Hildenbrand, Kristian Lehment

51

SAP TechEd ‘03 Basel, CH

Password Management Administration Functions Configure password policies Set initial password for user Let system auto-create password for user Reset password Customizable “Forgot Password” process

Password Policies Min/max. length Numeric characters allowed/mandatory Password different from UID Mixed case required Special characters required Password expiry time period (days) Password must be changed at next logon Number of failed logon attempts before account is locked  SAP AG 2003, TechED_Basel / SCUR351, P. Hildenbrand u. K. Lehment / 103

Security Logging & Auditing Logging of all security relevant information User login (successful/failed) IP address of user logged in User logoff User created/modified User approval/denial User locked/unlocked Role assignment changed

 SAP AG 2003, TechED_Basel / SCUR351, P. Hildenbrand u. K. Lehment / 104

© 2003 SAP AG

SCUR 351, Patrick Hildenbrand, Kristian Lehment

52

SAP TechEd ‘03 Basel, CH

Delegated User Administration Currently the delegated user administration is based on the concept of COMPANY. Companies are totally unrelated to groups. It is not possible to use GROUPS as a means of delegated user administration yet. A company is an attribute in a user’s profile. Every user belongs to one company only. Companies are not related to user groups. Companies are needed for the implementation of delegated user administration.

 SAP AG 2003, TechED_Basel / SCUR351, P. Hildenbrand u. K. Lehment / 105

Usage of Companies The following scenarios are possible: 1.

No Companies:

2.

One Company and Guest Users:

Closed environment, internal use only. internal use + self registration and approval process. 3.

Two Companies and Guest Users:

4.

Delegated Administration using the company concept:

5.

Fully Company Aware:

internal use + self reg. + limited access to externals (e. g. suppliers). internal use; companies are treated as administration groups used in SRM/CRM for instance.

 SAP AG 2003, TechED_Basel / SCUR351, P. Hildenbrand u. K. Lehment / 106

© 2003 SAP AG

SCUR 351, Patrick Hildenbrand, Kristian Lehment

53

SAP TechEd ‘03 Basel, CH

User Self-Service User can change his or her profile User can set a new password During logon (for initial passwords, when expired) By changing user profile

User can request new password (sent to user by E-Mail) Use self-registration User fills out a simple registration form User immediately becomes a guest user Optional approval process: User waits for approval by administrator to become a registered user

 SAP AG 2003, TechED_Basel / SCUR351, P. Hildenbrand u. K. Lehment / 107

Demo

Demo and Exercise “3”

 SAP AG 2003, TechED_Basel / SCUR351, P. Hildenbrand u. K. Lehment / 108

© 2003 SAP AG

SCUR 351, Patrick Hildenbrand, Kristian Lehment

54

SAP TechEd ‘03 Basel, CH

Summary

SAP offers a stable and widely used Central User Administration for SAP systems SAP offers LDAP directory integration SAP offers a User Management Engine for the Enterprise Portal

 SAP AG 2003, TechED_Basel / SCUR351, P. Hildenbrand u. K. Lehment / 109

Further Information Public Web: http://www.sap.com/netweaver E-Mail: [email protected]

Key capabilities

Security

Consulting Contact Frank Rambo, SAP Security Consulting ([email protected])

Related SAP Education Training Opportunities http://www.sap.com/usa/education/ CA940 SAP R/3 Authorization Concept ADM950 Secure SAP System Management ADM960 Security in SAP System Environment

Related Workshops/Lectures at SAP TechEd 2003 SCUR251 Eliminating Authentication Pop-Ups in SAP Landscapes, October 02 / 14:00 – 16:00 pm, Room H10, Hands-On Session

 SAP AG 2003, TechED_Basel / SCUR351, P. Hildenbrand u. K. Lehment / 110

© 2003 SAP AG

SCUR 351, Patrick Hildenbrand, Kristian Lehment

55

SAP TechEd ‘03 Basel, CH

Questions?

Q&A

 SAP AG 2003, TechED_Basel / SCUR351, P. Hildenbrand u. K. Lehment / 111

Feedback

Please complete your session evaluation and drop it off on your way out. Be courteous — deposit your trash, and do not take the handouts for the following session.

The SAP TechEd ’03 Basel Team  SAP AG 2003, TechED_Basel / SCUR351, P. Hildenbrand u. K. Lehment / 112

© 2003 SAP AG

SCUR 351, Patrick Hildenbrand, Kristian Lehment

56

SAP TechEd ‘03 Basel, CH

Copyright 2003 SAP AG. All Rights Reserved No part of this publication may be reproduced or transmitted in any form or for any purpose without the express permission of SAP AG. The information contained herein may be changed without prior notice. Some software products marketed by SAP AG and its distributors contain proprietary software components of other software vendors. Microsoft®, WINDOWS®, NT®, EXCEL®, Word®, PowerPoint® and SQL Server® are registered trademarks of Microsoft Corporation. IBM®, DB2®, DB2 Universal Database, OS/2®, Parallel Sysplex®, MVS/ESA, AIX®, S/390®, AS/400®, OS/390®, OS/400®, iSeries, pSeries, xSeries, zSeries, z/OS, AFP, Intelligent Miner, WebSphere®, Netfinity®, Tivoli®, Informix and Informix® Dynamic ServerTM are trademarks of IBM Corporation in USA and/or other countries. ORACLE® is a registered trademark of ORACLE Corporation. UNIX®, X/Open®, OSF/1®, and Motif® are registered trademarks of the Open Group. Citrix®, the Citrix logo, ICA®, Program Neighborhood®, MetaFrame®, WinFrame®, VideoFrame®, MultiWin® and other Citrix product names referenced herein are trademarks of Citrix Systems, Inc. HTML, DHTML, XML, XHTML are trademarks or registered trademarks of W3C®, World Wide Web Consortium, Massachusetts Institute of Technology. JAVA® is a registered trademark of Sun Microsystems, Inc. JAVASCRIPT® is a registered trademark of Sun Microsystems, Inc., used under license for technology invented and implemented by Netscape. MarketSet and Enterprise Buyer are jointly owned trademarks of SAP AG and Commerce One. SAP, R/3, mySAP, mySAP.com, xApps, xApp and other SAP products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of SAP AG in Germany and in several other countries all over the world. All other product and service names mentioned are the trademarks of their respective companies.

 SAP AG 2003, TechED_Basel / SCUR351, P. Hildenbrand u. K. Lehment / 113

© 2003 SAP AG

SCUR 351, Patrick Hildenbrand, Kristian Lehment

57

Suggest Documents