Skip to content

Commit 9e30a71

Browse files
test tutorial
1 parent fb525d4 commit 9e30a71

19 files changed

Lines changed: 105 additions & 0 deletions
Lines changed: 105 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,105 @@
1+
---
2+
title: Establish Trust Configuration between SAP S/4HANA On-premise and SAP BTP
3+
description: Configure trust between SAP S/4HANA On-premise and the BTP subaccount. During the configuration, you download the identity providers generated in SAP S/4HANA On-premise. You import SAML identity provider metadata into your SAP BTP Cloud Foundry account.
4+
auto_validation: true
5+
time: 15
6+
tags: [ tutorial>beginner, software-product>sap-business-technology-platform, topic>Cloud, software-product>sap-document-management-service, software-product>sap-s-4hana-cloud]
7+
primary_tag: software-product>sap-business-technology-platform
8+
author_name: Vikram Kulkarni
9+
author_profile: https://github.com/Vikramkulkarni01
10+
---
11+
12+
## Prerequisites
13+
- You've access to the SAP BTP subaccount and have necessary admin privileges.
14+
- You've access to the SAP S/4HANA On-premise system.
15+
- You've access to the Google Workspace Account. For more information, see [Configure Service Account in Google Cloud Platform](https://help.sap.com/docs/IRPA/1154f48dd7ab430ea52badeb4359e4b4/40baf1a31fad4e86892795f7fe59d971.html).
16+
17+
## You will learn
18+
- How to configure trust between SAP S/4HANA On-premise and SAP BTP system.
19+
- How to manage trust configurations between SAP S/4HANA On-premise and SAP BTP.
20+
21+
---
22+
23+
[ACCORDION-BEGIN [Step 1: ](Download SAML2.0 metadata from SAP S/4HANA onpremise)]
24+
1. Log in to the SAP S/4HANA system and run the transaction *`OA2C_SAML20`*, to get the SAML metadata.
25+
26+
2. Copy the text into a *`.xml'* file into your local system.
27+
28+
!![SAML Metadata](screenshots/saml.png)
29+
30+
31+
[DONE]
32+
[ACCORDION-END]
33+
34+
[ACCORDION-BEGIN [Step 2: ](Create trust configuration)]
35+
1. Log on to your BTP Subaccount and navigate to the **Trust Configuration** option in the left side menu and click **New Trust Configuration**.
36+
37+
!![NewTrustConfiguration](screenshots/NewTrustConfiguration.png)
38+
39+
2. In the **New Trust Configuration** window that opens, upload the **`SAML2.Metadata.xml`** that you downloaded in the previous step (Reference: `Step 1.1`), and enter the name of your choice. Click on **Parse** and **Save**.
40+
41+
!![SAML_Metadata](screenshots/SAML_Metadata.png)
42+
43+
3. Verify the trust configuration by clicking on the recently created trust configuration in the above step (Reference: `Step 2.2`).
44+
>**Important**: Verify that the SAP backend system's host name is correctly specified in the trust configuration. Double-check the selected **`Origin Key`** for accuracy and ensure that the protocol is set to **`SAML`**.
45+
46+
!![ShowDetailsIssuer](screenshots/ShowDetailsIssuer.png)
47+
48+
4. Click on **Show Details** and ensure that the *Subject* and *Issuer* provided are correct.
49+
50+
!![ShowDetailsIssuer2](screenshots/ShowDetailsIssuer2.png)
51+
52+
!![ShowDetailsIssuer3](screenshots/ShowDetailsIssuer3.png)
53+
54+
55+
[DONE]
56+
[ACCORDION-END]
57+
58+
59+
[ACCORDION-BEGIN [Step 3: ](Add users in SAP BTP)]
60+
61+
1. Navigate back to the SAP BTP Cockpit home screen and go to the **Security** > **Users** tab. Click **Create**.
62+
63+
In the **Create User** dialog, enter the **Username**, select the newly created **Identity Provider**, add the email address of the user, and click **Create**.
64+
65+
!![NewUser](screenshots/NewUserV1.png)
66+
67+
>**IMPORTANT**: The e-mail address of the user must be identical to the one used in the SAP S/4HANA system. The email address can be identified using the *`Maintain Business User`* or *`Manage Workforce`* option. It's important to note that the email IDs are identical. For example, if your SAP system user email ID is **demo.user@myexample.com** then the SAP BTP Cockpit user email ID is the as same your SAP system user email ID, and it should also be maintained as : **demo.user@myexample.com**.
68+
69+
70+
2. Select the newly created user from the list and click on **Assign Role Collection**.
71+
72+
!![AssignRoleCollections](screenshots/AssignRoleCollectionsV1.png)
73+
74+
3. Assign the user role collection of the **SAP Document Management Service, Integration Option** (For example, `SDM_roles` or the role collection that you created) which is defined in the subaccount. For more information, see the 3rd step in this tutorial [Create a Service Instance and then a Service Key of SAP Document Management Service, Integration Option](btp-sdm-gwi-create-serviceinstance).
75+
76+
!![SDM_RoleCollections](screenshots/SDM_RoleCollections.png)
77+
78+
[DONE]
79+
[ACCORDION-END]
80+
81+
[ACCORDION-BEGIN [Step 4: ](Download SAML metadata from SAP BTP cockpit)]
82+
83+
1. In the same subaccount, navigate to the **Trust Configuration** and click **SAML Metadata**. A metadata file gets downloaded to your local system.
84+
85+
!![SAML_Metadata_download](screenshots/SAML_Metadata_download.png)
86+
87+
2. Go to the file in your explorer and right-click on the downloaded file in your local system from the previous step. Open it with any editor (like **Notepad, Notepad++, Code, Sublime Text, etc.**) scroll down to the bottom of the file to get the token endpoint and copy the URL that is located at the string:
88+
89+
```JSON
90+
<md:AssertionConsumerService Binding="urn:oasis:names:tc:SAML:2.0:bindings:URI" Location="https://example.com"index="1"/>
91+
```
92+
!![AssertionConsumerService](screenshots/AssertionConsumerService.png)
93+
94+
[DONE]
95+
[ACCORDION-END]
96+
97+
[ACCORDION-BEGIN [Step 5: ](Test yourself)]
98+
99+
[VALIDATE_2]
100+
101+
[DONE]
102+
[ACCORDION-END]
103+
104+
105+
---
275 KB
Loading
121 KB
Loading
540 KB
Loading
228 KB
Loading
84 KB
Loading
101 KB
Loading
50.3 KB
Loading
91.7 KB
Loading
68 KB
Loading

0 commit comments

Comments
 (0)