SAP BTP Security
130 Blog Posts
61 Contributors
-
Hi, just want to provide you a short heads up. SAP BTP started to provide security recommendations for its services. We started with the following services Identity Authentication Destination Service Cloud Connector Credential Store Of course... Read More »0Comments5Likes
-
This blog post gives a simple example of using authorization in a simple project. It also shows a simplistic way of using attributes. The project is based on Node.js and runs on SAP BTP Cloud Foundry. Security is based on XSUAA and relies on SAP ID... Read More »0Comments2Likes
-
This blog series is mainly targeted for developers and administrators. If you are someone who has gone through the plethora of tutorials, documentation, and presentations on security topics in SAP BTP and still lacks the confidence to implement... Read More »0Comments6Likes
-
You´ve asked about updates and the latest innovation highlights on our SAP Business Technology Platform product roadmap? To satisfy your needs my intention in this blog post is to communicate our vision as well as key deliverables and... Read More »0Comments6Likes
-
It has been a long journey. A highly-requested and long awaited feature has been released on the 25th of July 2022. You can now use your custom SAP Identity Authentication service tenant to log in to your BTP management tools. That includes the BTP... Read More »4Comments13Likes
-
Configure Different Trust Configurations for the Same Identity Authentication Tenant (Azure AD Apps)My name is Imre working at SAP since 2004. Now I’m at Identity Authentication Service area. In this blog post I will explore in detail how to configure Different Trust Configurations for the Same Identity Authentication Tenant (Azure AD... Read More »0Comments2Likes
-
When defining a destination in SAP BTP, we have the option of using mTLS. But how to provide the certificate? This blog post describes in a detailed step-by-step tutorial how to configure a destination with a certificate and how to get a hold of... Read More »6Comments13Likes
-
This post has the third set of exercises demonstrating different grant types described in my article “How grant-types keep your application secure?“. This exercise looks at the grant types that propagate users from outside of the... Read More »0Comments1Like
-
This post has the second set of exercises demonstrating different grant types described in my article “How grant-types keep your application secure?“. This exercise looks at the grant types that derive authorization indirectly, from... Read More »0Comments1Like
-
This post has the first set of exercises demonstrating different grant types described in my article “How grant-types keep your application secure?“. This exercise looks at the grant types that derive authorization directly from the... Read More »0Comments2Likes