In this exercise, you will learn how to configure the target system in a way that it trusts the Cloud Connector and you will import the previously created sample certifcate in order to generate a user mapping rule in the ABAP system.
20 minutes
There are two levels of trust: - you need to allow the Cloud Connector to identify itself with its system certificate for the HTTPS case. - you need to allow this identity to propagate the user accordingly so that the short-living X.509 certificate could be forwarded. At the end of the exercise you will configure the user mapping in the target system. The X.509 certificate contains information about the cloud user in its subject. You will use this information in order to map the identity to the appropriate user in this system.
Step 1: Establishing trust between the ABAP System and the Cloud Connector by importing CA issuing the system certificate
-
Go to you backend system and double-click on the bookmark called Trust Manager (STRUST) in the favorites.
-
Click on the Import certificate icon at the bottom of the screen.
-
In the dialog window, choose the certificate file representing the public key of the issuer of the system certificate. The path of the certificate should be
C:\Users\student\Downloads\cacert.der
if you followed the previous exercises.
-
All the details of the certificate are now displayed. Press then the button Add to certificate list.
-
Verify that you can see your system certificate in the Certificate list. Then Save the configuration.
Note: The Internet Communication Manager (ICM) ensures that communication between the SAP System and the outside world via HTTP, HTTPS and SMTP protocols works properly. In its role as a server, the ICM is processing requests from the Internet that arrive as URLs with the server/port combination that the ICM is listening to. The ICM then calls the relevant local handler for the URL in question.
-
Double-click on the bookmark called Maintain Profiles (RZ10) in the favorites.
-
The system has been installed on a master image and the profile has been bound to the name of the system. As you are using now a clone of the image, we need first to adapt the profile. So click Utilities in the top menu and select Import profiles - Of active servers.
-
Check that the profile bound to your system name has been added and click the Back icon.
-
Now you can continue with with the standard procedure and select DEFAULT as profile.
-
Select the radio button for Extended maintenance and press the Change button.
-
Add following details:
- Parameter name:
icm/HTTPS/trust_client_with_issuer
- Parameter val.:
CN=SAPNetCA_G2, O=SAP, L=Walldorf, C=D
Note: You have probably seen that the last letter of the parameter value is missing. Please keep it without "E" at the end. We do want to debug the application in the next lesson.
- Parameter name:
-
Hint: usually you will find the issuer of the system certificate in the Cloud Connector Administration UI under Configuration > ON PREMISE > System Certificate.
-
Now you should do the same procedure to add the second parameter which is the subject of the system certificate. Here are the details:
- Parameter name:
icm/HTTPS/trust_client_with_subject
- Parameter val.:
CN=scc.fair.sap.corp, OU=Connectivity, O=SAP, C=DE
- Parameter name:
-
Hint: usually you will find the issuer of the system certificate in the Cloud Connector Administration UI under Configuration > ON PREMISE > System Certificate.
-
Close the information popup window by clicking the Green Check icon.
-
In the next information popup, you will be informed that the ICM needs to be restarted. Click on the Green Check icon.
-
Open the ICM by double-clicking the bookmark called ICM Monitor (SMICM) in favorites.
-
Restart the ICM by clicking Administration in the top menu and select ICM > Hard Shut Down > Global.
-
Check the HTTPS settings under Goto in the top menu. Select Parameters > Display.
-
The 2 new parameters should be now visible under HTTPS (SSL) settings.
You can do the mapping manually in the system or make use of an Identity Management Solution for a more comfortable approach. For example, for large numbers of users the rule-based certificate mapping is a good way to save time and effort. In this scenario, we will use the second option.
-
Double-click the bookmark called Profile Parameter Maintenance (RZ11) in favorites.
-
Insert
login/certificate_mapping_rulebased
as Parameter Name and clickDisplay
.
-
Verify the new value and go back to bookmarks by clicking 2 times the Back icon.
-
Double-click on the bookmark called Rule based Certificate Mapping (CERTRULE) in favorites.
-
Import the previously exported sample certificate by clicking on the Import icon and click then Open.
-
Update the following details and click the Enter icon:
- Certificate Attr:
[email protected]
(where XXX should be replaced with your user number) - Login as:
E-Mail
Note: Here you can see that there is no standardized display of subject attributes. Cloud Connector is displaying the attribute as EMAIL, Windows OS as E, and the CERTRULE screen has no textual represenation at all, but only shows the OID. This is also a common pitfall when establishing trust as often a textual representation has to be provided.
- Certificate Attr:
-
Verify that the rule has been added and press the Save to activate it.
-
Check now that the user CPL360_USER is mapped in the right panel called Certificate Status based on Persistence.