NW Java Security and User Management
22 Blog Posts
17 Contributors
-
last Changed: 16th of May 2023 demystifying TLS/SSL Settings for NetWeaver the correct TLS/SSL Setting in SAP NetWeaver based Systems (ABAP, BI-JAVA, SolMan 7.2) are the most mandantory pre requisites to enable the SAP Secure Notes Download,... Read More »2Comments8Likes
-
I would like to acknowledge to my colleague Leonardo Arismendi for his significant contribution to have this configuration in place in a timely manner. Audience. The steps described in this white paper are to be executed by an SAP System... Read More »3Comments10Likes
-
Last Changed: 16th of November 2020 Motivation and Overview After some time, I thought it is time to update the Document – SAP First Guidance – Implement SAP BW/4HANA in the Azure Cloud especially the topics for SAP Analytics Cloud and the... Read More »0Comments11Likes
-
Key takeaways There are multiple ways to prevent exploitation of RECON, all with different pros and cons. Fixing or mitigating RECON involves interacting with each SAP JAVA system and potentially with each node, depending on the approach... Read More »1Comment5Likes
-
Note to SAP Community members: SAP recognizes the importance of the integrity of the SAP Community. In an effort to continue to support the community and at the same time adapt to this time of uncertainty, we are creating a temporary space for... Read More »0Comments1Like
-
Purpose The goal of this blog post is to provide the steps which are necessary to configure the SSL termination scenario on web dispatcher integrated into SCS instance in process orchestration (as Java). Overview The blog post includes the... Read More »4Comments2Likes
-
My obsession with this new way of hitting the PI server using servlets took new turn when a brilliant colleague of mine wanted me to program a way to get target root certificate without having to ask them for or without running a command on... Read More »2Comments1Like
-
Based on my previous blog – SICF on PI/PO , We may need to log incoming requests or process the incoming requests (e.g delete few header /prolog etc.) as per our needs before sending it to the adapter. But the challenge here is you cannot in... Read More »0Comments1Like
-
Secure Socket Layer (SSL) is one of the important topics to address when coming on to access of systems over browser. When we say that a particular site is SSL enabled, it means , we have issued certificates for that specific system Uniform... Read More »2Comments1Like
-
Overview: For some specific scenarios, the official product documentation explicitly asks for a PSE to be created using the ‘sapgenpse’ command-line tool. This is not a common procedure since most SAP systems already provide a dedicated... Read More »0Comments5Likes