Unleash the Power of Single Sign-On with Microsoft and SAP White Paper
Total Page:16
File Type:pdf, Size:1020Kb
Collaboration Technology Support Center – Microsoft – Collaboration Brief September 2007 Unleash the Power of Single Sign-On with Microsoft and SAP White Paper Authors Tilo Boettcher, Microsoft Corp ([email protected]) Juergen Daiberl, Microsoft Corp ([email protected]) André Fischer, SAP AG ([email protected]) Lei Liu, Spell GmbH ([email protected]) Summary Single Sign-On (SSO) becomes more and more crucial for today’s complex IT landscape driven by the ever-increasing request to integrate existing systems to support cross-organizational business processes. In context of Identity Management, it means to bridge different authentication models used by these systems, which results in high administrative overhead as well as low usability. To enforce a consistent authentication policy throughout the enterprise and to offer simplified and homogeneous logon experience for enterprise users, Microsoft and SAP provide a set of technologies to unleash the power of SSO for enterprises. In this white paper, we review the mainstream enabling technologies for authentication as well as Single Sign-On within the Microsoft/SAP context and outline their usage in some typical scenarios on the enterprise level. Applies to . SAP NetWeaver Application Server . SAP NetWeaver Portal . SAP GUI . Microsoft .NET . Microsoft Office SharePoint Server Keywords Single Sign-On, Authentication, Federation, SAML, SAP Logon Ticket, SAP Assertion Ticket, Kerberos, CardSpace Level of difficulty Technical consultants, Architects, Developers, IT Managers Contact This document is provided to you by SAP and Microsoft to drive interoperability. Please check the .NET interoperability area in the SAP Developer Network (http://sdn.sap.com) or the SAP interoperability section in the Microsoft and SAP Customer Information Center (http://www.microsoft.com/isv/sap) for any updates or further information. This document is a common publication by SAP and Microsoft (“Co-Editors”) who have both contributed to its content and retain respective rights therein. The information contained in this document represents the current view of the Co-Editors on the issues discussed as of the date of publication. Because the Co-Editors must respond to changing market conditions, it should not be interpreted to be a commitment on the part of the Co-Editors, and the Co-Editors cannot guarantee the accuracy of any information presented after the date of publication. This document is for informational purposes only. NEITHER OF THE CO-EDITORS MAKES ANY WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS DOCUMENT. Complying with all applicable copyright laws is the responsibility of the user. Without limiting the rights under copyright, no part of this document may be reproduced, stored in or introduced into a retrieval system, or transmitted in any form or by any means (electronic, mechanical, photocopying, recording, or otherwise), or for any purpose, without the express written permission of the Co-Editors. Either Co-Editor may have patents, patent applications, trademarks, copyrights, or other intellectual property rights covering subject matter in this document. Except as expressly provided in any written license agreement from the respective Co-Editor(s), the furnishing of this document does not give you any license to these patents, trademarks, copyrights, or other intellectual property. © 2007 Microsoft Corporation. All rights reserved. © 2007 SAP AG. All rights reserved. Microsoft, Active Directory, ASP.NET, CardSpace, Internet Information Server (IIS), Microsoft .NET Framework, Microsoft Office, SharePoint, Windows, Windows Communication Foundation (WCF), Windows Server, and other Microsoft products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of Microsoft Corporation. SAP, R/3, mySAP, mySAP.com, xApps, xApp, SAP NetWeaver, and other SAP products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of SAP AG in Germany and in several other countries all over the world. All other product and service names mentioned are the trademarks of their respective companies. Data contained in this document serves informational purposes only. National product specifications may vary. The names of actual companies and products mentioned herein may be the trademarks of their respective owners. Table of Contents Introduction ............................................................................................................... 1 The Anatomy of Single Sign-On .......................................................................................................... 1 Enabling Technologies for SSO .................................................................................... 4 Authentication Infrastructure ............................................................................................................. 4 Authentication on Windows Platform ................................................................................................ 4 Authentication on SAP Platform ......................................................................................................... 4 Pluggable Authentication Services (PAS) ........................................................................................... 5 Java Authentication and Authorization Service (JAAS)...................................................................... 6 Single Sign-On for Web-Based Scenarios on SAP................................................................................. 8 User Authentication ............................................................................................................................ 8 User ID/Password based Authentication........................................................................................... 8 HTTP Header Variable Authentication ............................................................................................ 11 X.509 Client Certificate Authentication ........................................................................................... 12 Integrated Windows Authentication ............................................................................................... 14 Authentication based on SAP Logon Ticket ..................................................................................... 16 Authentication based on SAML Token ............................................................................................ 18 User Mapping .................................................................................................................................. 20 Single Sign-On for SAP GUI for Windows .......................................................................................... 21 Secure Network Communication (SNC) ............................................................................................ 21 SAP Runs on Windows Platform ...................................................................................................... 21 SAP Runs on a non-Windows Platform............................................................................................ 21 Summary .......................................................................................................................................... 22 SSO Usage Scenarios ................................................................................................. 24 SSO from Windows-based Workstations to SAP using SAP Frontends .............................................. 24 SSO from Windows-based Applications to SAP ................................................................................. 25 SSO from SAP Applications to Microsoft ........................................................................................... 26 Conclusion & Outlook ............................................................................................... 29 Conclusion ........................................................................................................................................ 29 Outlook ............................................................................................................................................ 30 Federation with Windows Platform .................................................................................................. 30 Table of Figures ........................................................................................................ 32 Introduction Today’s fast paced and ever changing enterprise enables the enforcement of a consistent authentication policy throughout the enterprise. The abilities to integrate with existing systems, to bridge different authentication models, and to offer simplified and homogeneous logon mechanism on desired client platform(s) are the primary goals of such a consistent authentication policy. It is to envision that the further convergence of enterprise systems, e.g. CRM, ERP, etc, towards integrated enterprise-level business applications demands for more convenient security model to enable user authentication. As an efficient way to facilitate simplified user authentication in enterprise, Single Sign-On (SSO) refers the mechanisms for enterprise users to authenticate themselves by a single authentication authority once and then gain access to other protected resources without re-authenticating. SSO is advantageous for both administrators and enterprise users. A user only needs to deal with a