SSO - Configuration - Step by Step Procedure
SSO - Configuration - Step by Step Procedure
Page 1 of 4
SAPERRORS.COM
[email protected]
Pre-requisites
a. Maintain the following the instance profile parameters.
login/create_sso2_ticket
login/accept_sso2_ticket
b. Users need to have the same user ID in all of the systems they access using the logon ticket. Passwords do not have to be the same in all
systems.
c. End users need to configure their Web browsers to accept cookies.
d. Any Web servers or SAP Web AS servers that are to accept the logon ticket as the authentication mechanism must be placed in the same DNS
domain as the issuing server. The logon ticket cannot be used for authentication to servers outside of this domain.
e. The issuing server must possess a public and private key pair and public-key certificate so that it can digitally sign the logon ticket.
SAP System application servers (to include the SAP Web AS) receive a key pair and a self-signed public-key certificate during the installation
process. By default, the system uses the system Personal Security Environment (system PSE) for storing these keys, however, you may need to
use a different PSE in the following cases:
- If the system has been upgraded from a Release <= 4.6B, then the PSE used for logon tickets is the SAPSSO2 PSE.
- If you have defined an explicit PSE to use for logon tickets, then this PSE (as specified in the table SSFARGS) is used.
f. Systems that accept logon tickets must have access to the issuing servers public-key certificate so that they can verify the digital signature
provided with the ticket.
Depending on the type of certificate you use, the servers certificate is either sent with the logon ticket to the accepting system or the
information is entered in the accepting systems certificate list. We provide a configuration tool, the SSO administration wizard (transaction
SSO2), that automatically establishes the appropriate configuration for the accepting system.
Installation
http://saperrors.com/2012/04/13/sso-configuration-between-abap-and-java-as-logon-tic... 4/18/2012
SSO Configuration between ABAP and JAVA AS (Logon Tickets) Step-by-step pro... Page 2 of 4
II.
3. Choose the path of JAVA AS certificate where we saved in step I and continue.
4. Once JAVA AS certificate details are displayed under Certificate area, click on Add to Certificate List button as shown below.
http://saperrors.com/2012/04/13/sso-configuration-between-abap-and-java-as-logon-tic... 4/18/2012
SSO Configuration between ABAP and JAVA AS (Logon Tickets) Step-by-step pro... Page 3 of 4
5. Click the button Add to ACL to maintain Java certificate in Access Control List.
2. Login Visual Administrator and choose Server Services KeyStorage TicketKeystore and press Load and choose the Certificate.
3. Maintain backend ABAP system details in Java ACL as follows.
a. Choose Server > Services > Security Provider > Ticket
b. Go to Change Mode, select com.sap.security.core.server.jaas.EvaluateTicketLoginModule, click on Modify button and add the entries as follows.
ume.configuration.active = true
trustedsys<n>= <ABAP SID>, <Prod. Client>
trustediss<n>= CN=<ABAP SID>
trusteddn<n>= CN=<ABAP SID>
http://saperrors.com/2012/04/13/sso-configuration-between-abap-and-java-as-logon-tic... 4/18/2012
SSO Configuration between ABAP and JAVA AS (Logon Tickets) Step-by-step pro... Page 4 of 4
Note: We need add two sets of above said entries. One for client 000 and other one for Production client.
Source: http://scn.sap.com/docs/DOC-26142
This entry was posted in Documentatation, J2EE Engine by SAPerrors. Bookmark the permalink.
http://saperrors.com/2012/04/13/sso-configuration-between-abap-and-java-as-logon-tic... 4/18/2012