Microsoft Entra SSO integration with SAP Business Technology Platform
مقالة
In this article, you learn how to integrate SAP Business Technology Platform with Microsoft Entra ID. When you integrate SAP Business Technology Platform with Microsoft Entra ID, you can:
Control in Microsoft Entra ID who has access to SAP Business Technology Platform.
Enable your users to be automatically signed-in to SAP Business Technology Platform with their Microsoft Entra accounts.
Manage your accounts in one central location.
Prerequisites
The scenario outlined in this article assumes that you already have the following prerequisites:
A Microsoft Entra user account with an active subscription. If you don't already have one, you can Create an account for free.
SAP Business Technology Platform single sign-on (SSO) enabled subscription.
هام
You need to deploy your own application or subscribe to an application on your SAP Business Technology Platform account to test single sign on. In this article, an application is deployed in the account.
Scenario description
In this article, you configure and test Microsoft Entra single sign-on in a test environment.
SAP Business Technology Platform supports SP initiated SSO.
Add SAP Business Technology Platform from the gallery
To configure the integration of SAP Business Technology Platform into Microsoft Entra ID, you need to add SAP Business Technology Platform from the gallery to your list of managed SaaS apps.
Configure and test Microsoft Entra SSO for SAP Business Technology Platform
Configure and test Microsoft Entra SSO with SAP Business Technology Platform using a test user called B.Simon. For SSO to work, you need to establish a link relationship between a Microsoft Entra user and the related user in SAP Business Technology Platform.
To configure and test Microsoft Entra SSO with SAP Business Technology Platform, perform the following steps:
c. In the Sign On URL textbox, type the URL used by your users to sign into your SAP Business Technology Platform application. This is the account-specific URL of a protected resource in your SAP Business Technology Platform application. The URL is based on the following pattern: https://<applicationName><accountName>.<landscape host>.ondemand.com/<path_to_protected_resource>
ملاحظة
This is the URL in your SAP Business Technology Platform application that requires the user to authenticate.
These values aren't real. Update these values with the actual Identifier,Reply URL and Sign on URL. Contact SAP Business Technology Platform Client support team to get Sign-On URL and Identifier. Reply URL you can get from trust management section which is explained later in the article.
On the Set up Single Sign-On with SAML page, in the SAML Signing Certificate section, select Download to download the Federation Metadata XML from the given options as per your requirement and save it on your computer.
In a different web browser window, sign on to the SAP Business Technology Platform Cockpit at https://account.<landscape host>.ondemand.com/cockpit(for example: https://account.hanatrial.ondemand.com/cockpit).
Select the Trust tab.
In the Trust Management section, under Local Service Provider, perform the following steps:
a. Select Edit.
b. As Configuration Type, select Custom.
c. As Local Provider Name, leave the default value. Copy this value and paste it into the Identifier field in the Microsoft Entra configuration for SAP Business Technology Platform.
d. To generate a Signing Key and a Signing Certificate key pair, select Generate Key Pair.
e. As Principal Propagation, select Disabled.
f. As Force Authentication, select Disabled.
g. Select Save.
After saving the Local Service Provider settings, perform the following to obtain the Reply URL:
a. Download the SAP Business Technology Platform metadata file by selecting Get Metadata.
b. Open the downloaded SAP Business Technology Platform metadata XML file, and then locate the ns3:AssertionConsumerService tag.
c. Copy the value of the Location attribute, and then paste it into the Reply URL field in the Microsoft Entra configuration for SAP Business Technology Platform.
Select the Trusted Identity Provider tab, and then select Add Trusted Identity Provider.
ملاحظة
To manage the list of trusted identity providers, you need to have chosen the Custom configuration type in the Local Service Provider section. For Default configuration type, you have a non-editable and implicit trust to the SAP ID Service. For None, you don't have any trust settings.
Select the General tab, and then select Browse to upload the downloaded metadata file.
ملاحظة
After uploading the metadata file, the values for Single Sign-on URL, Single Logout URL, and Signing Certificate are populated automatically.
Select the Attributes tab.
On the Attributes tab, perform the following step:
a. Select Add Assertion-Based Attribute, and then add the following assertion-based attributes:
The configuration of the Attributes depends on how the application(s) on SCP are developed, that is, which attribute(s) they expect in the SAML response and under which name (Principal Attribute) they access this attribute in the code.
b. The Default Attribute in the screenshot is just for illustration purposes. It isn't required to make the scenario work.
c. The names and values for Principal Attribute shown in the screenshot depend on how the application is developed. It's possible that your application requires different mappings.
Assertion-based groups
As an optional step, you can configure assertion-based groups for your Microsoft Entra identity Provider.
Using groups on SAP Business Technology Platform allows you to dynamically assign one or more users to one or more roles in your SAP Business Technology Platform applications, determined by values of attributes in the SAML 2.0 assertion.
For example, if the assertion contains the attribute "contract=temporary", you may want all affected users to be added to the group "TEMPORARY". The group "TEMPORARY" may contain one or more roles from one or more applications deployed in your SAP Business Technology Platform account.
Use assertion-based groups when you want to simultaneously assign many users to one or more roles of applications in your SAP Business Technology Platform account. If you want to assign only a single or small number of users to specific roles, we recommend assigning them directly in the “Authorizations” tab of the SAP Business Technology Platform cockpit.
Create SAP Business Technology Platform test user
In order to enable Microsoft Entra users to log in to SAP Business Technology Platform, you must assign roles in the SAP Business Technology Platform to them.
To assign a role to a user, perform the following steps:
Log in to your SAP Business Technology Platform cockpit.
Perform the following:
a. Select Authorization.
b. Select the Users tab.
c. In the User textbox, type the user’s email address.
d. Select Assign to assign the user to a role.
e. Select Save.
Test SSO
In this section, you test your Microsoft Entra single sign-on configuration with following options.
Select Test this application, this option redirects to SAP Business Technology Platform Sign-on URL where you can initiate the login flow.
Go to SAP Business Technology Platform Sign-on URL directly and initiate the login flow from there.
You can use Microsoft My Apps. When you select the SAP Business Technology Platform tile in the My Apps, you should be automatically signed in to the SAP Business Technology Platform for which you set up the SSO. For more information about the My Apps, see Introduction to the My Apps.
Related content
Once you configure SAP Business Technology Platform you can enforce session control, which protects exfiltration and infiltration of your organization’s sensitive data in real time. Session control extends from Conditional Access. Learn how to enforce session control with Microsoft Defender for Cloud Apps.
In this module, you learn about integrating Azure Identity Services with SAP RISE, implementing single sign-on, transitioning from SAP Identity Management to Microsoft Entra, using Microsoft Security Copilot and Microsoft Sentinel with SAP RISE.