cancel
Showing results for 
Search instead for 
Did you mean: 

Enterprise Single Sign On Using NW SSO

S0007586158
Participant
0 Kudos

Hi,

Can any one provide some details of E-SSO  using NW SSO?, how to achieve this, what components are required, and configuration guides..etc

Regards,

Sam

Accepted Solutions (0)

Answers (2)

Answers (2)

Former Member
0 Kudos

Dear Sam,

As per E-SSO documentation:

Enterprise Single Sign-On (E-SSO) helps end users log on to multiple systems or applications without the need to remember every password or logon dialog. Once a user has successfully authenticated to the Enterprise Single Sign-On application, further logon to applications running under the system’s control are carried out automatically.

For more detailed, please check

User Guide SAP NetWeaver Single Sign-On: Enterprise Single Sign-On:

http://scn.sap.com/docs/DOC-4407

Regards,

Adrian

donka_dimitrova
Contributor
0 Kudos

Hello Sam,

Please, share some info about the scenario/use case you want to implement using E-SSO.

Regards,

Donka Dimitrova

S0007586158
Participant
0 Kudos

Hi Donka,

We are looking for an SSO solution to login to unix systems ,oracle databases ..etc in additional to SAP systems.

Regards,

Sam

tim_alsop
Active Contributor
0 Kudos

For Unix logon, I recommend you use SSH with Kerberos. You don't need to buy an SSO product for this, since Kerberos enabled SSH is included with Unix and Linux distributions, and you can use free Putty on Windows workstations.

For Oracle DB access over SQL, you can use the Kerberos supported provided by Oracle. Again, no need to buy anything for this.

Thanks

Tim

S0007586158
Participant
0 Kudos

Thanks time for the valid answer, so in what contest E-SSO make sense?

Regards,

Sam

tim_alsop
Active Contributor
0 Kudos

I assume you mean 'context' not 'contest' ?

Generally e-sso products are used when an application (e.g. legacy) cannot be changed to use cryptography for authentication, and where security is not a big requirements/concern. An e-sso product usually remembers the users password and inserts it into the logon screen of the application, which means it is not improving security like cryptography based authentication would, but the end user doesn't have to remember their passwords.