NW Java Security and User Management
21
Blog Posts
17 Contributors
-
Last Changed: 16th of November 2020 Motivation and Overview After some time, I thought it is time to update the Document – SAP First Guidance – Implement SAP BW/4HANA in the Azure Cloud especially the topics for SAP Analytics Cloud and the... Read More »0Comments3Likes
-
Key takeaways There are multiple ways to prevent exploitation of RECON, all with different pros and cons. Fixing or mitigating RECON involves interacting with each SAP JAVA system and potentially with each node, depending on the approach... Read More »1Comment4Likes
-
Note to SAP Community members: SAP recognizes the importance of the integrity of the SAP Community. In an effort to continue to support the community and at the same time adapt to this time of uncertainty, we are creating a temporary space for... Read More »0Comments1Like
-
Purpose The goal of this blog post is to provide the steps which are necessary to configure the SSL termination scenario on web dispatcher integrated into SCS instance in process orchestration (as Java). Overview The blog post includes the... Read More »3Comments1Like
-
My obsession with this new way of hitting the PI server using servlets took new turn when a brilliant colleague of mine wanted me to program a way to get target root certificate without having to ask them for or without running a command on... Read More »2Comments1Like
-
Based on my previous blog – SICF on PI/PO , We may need to log incoming requests or process the incoming requests (e.g delete few header /prolog etc.) as per our needs before sending it to the adapter. But the challenge here is you cannot in... Read More »0Comments0Likes
-
Secure Socket Layer (SSL) is one of the important topics to address when coming on to access of systems over browser. When we say that a particular site is SSL enabled, it means , we have issued certificates for that specific system Uniform... Read More »2Comments1Like
-
Overview: For some specific scenarios, the official product documentation explicitly asks for a PSE to be created using the ‘sapgenpse’ command-line tool. This is not a common procedure since most SAP systems already provide a dedicated... Read More »0Comments4Likes
-
Recent news reports have brought vulnerabilities in SAProuter, as well as how nefarious individuals could leverage these vulnerabilities, into the spotlight. The news focused on malware designed to learn about SAP systems networked to PCs that were... Read More »1Comment4Likes
-
Disclaimer – This is my first post on the SAP community. Looking forward to learning from the community and connecting with anyone who reads this. Please feel free to drop me a comment below. The below is my first post discussing my experience... Read More »4Comments3Likes