on 03-24-2016 1:04 PM
Hello Experts,
We are using PI 7.4 single stack Java SP11. We have a 3rd party BPM software that will used to add/update/delete/query records in our SAP ECC system. We do not want anybody who uses the 3rd party software to be able to manipulate data unless they have authorization on the SAP system. Can principal propagation be used with 3rd party software or does this need to be done with SAML? If it can be done, can someone point me to good documentation to set this up?
All help is appreciated and will be rewarded.
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.
Thanks Raghuraman,
I have studied the two links you sent, however they deal with PI 7.1 and are not particular to 7.4 single stack.
The 3rd party BPM currently cannot determine if the user has the authorization to execute the add/update/delete against data in the SAP ECC system. The 3rd party security is not maintained by the SAP security team, hence a user gets moved to a different department and no longer has the authorization to do his old job. However the user may still need access to the 3rd party BPM. If the 3rd party BPM must send some a user token to validate a users authorization then we know right away wither or not that user has authorization. Otherwise it is a guess.
Hi David,
If you use principal propagation the same user is used in all the components from sender to the receiver, From the sender system if user TEST trigger the process the same user will come to PI and then the same user will enter into ECC to execute the task (insert/delete/update), when it enter into ECC before execution the actual task you can check whether the user have required authorization to execute this task, if user have access you allow the user to execute, if the user does not have access then you can stop the user to execute the task.
Regards,
Praveen.
Karan,
I have been working with a consultant and we have a working model of PP in PI 7.4 (actually just completed it yesterday). I don't have time right now but before the end of next week I hope to put up a blog on how it is done. When I do I will add a link here for it.
Best regards,
David Pauley
Hello David,
Thanks a lot .... !!!
Much appreciable if you share a link in your free time, that how you dealt PP concept for 7.4 single stack.
Also i was looking to below SAP help link, where in procedure first step is 'Configuration Back-End system', it will be helpful if you add regarding this configuration too.
URL: http://help.sap.com/saphelp_nw75/helpdata/en/48/ce95b718d3424be10000000a421937/content.htm
Screenshot:
Also one more query that for maintaining trusted relationship, do we need to use HTTPS protocol for connection or only HTTP protocol will work? (required Secure connection or unsecured)
Thanks a lot once again for looking into it.
Regards,
Karan Kholakiya.
User | Count |
---|---|
93 | |
10 | |
10 | |
9 | |
9 | |
7 | |
6 | |
5 | |
5 | |
4 |
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.