37
Public SAP Single Sign-On 2.0 Overview Presentation March 2016

SAP NetWeaver Single Sign-On: Overview

  • Upload
    others

  • View
    16

  • Download
    0

Embed Size (px)

Citation preview

Page 1: SAP NetWeaver Single Sign-On: Overview

Public

SAP Single Sign-On 2.0Overview PresentationMarch 2016

Page 2: SAP NetWeaver Single Sign-On: Overview

© 2016 SAP SE or an SAP affiliate company. All rights reserved. 2Public

Agenda

SAP security portfolioOverview SAP Single Sign-OnSingle sign-on main scenariosCapabilitiesSummary

Page 3: SAP NetWeaver Single Sign-On: Overview

SAP security portfolio

Page 4: SAP NetWeaver Single Sign-On: Overview

© 2016 SAP SE or an SAP affiliate company. All rights reserved. 4Public

SAP security products portfolio

SAPBusiness

Suite

SAP CloudApplications

SAP MobileApplications

3rd PartySystems

SAP HANA Platform SAP NetWeaver Application Server

SAP AccessControl

SAP IdentityManagement

Make it simple for users to dowhat they are allowed to do.

Know your users and whatthey can do.

SAP SingleSign-On

Ensure corporatecompliance to

regulatory requirements.

PlatformSecurity

Make sure that SAPsolutions run securely

SAP EnterpriseThreat Detection

Counter possible threats andidentify attacks.

Add-On for CodeVulnerability

Analysis

Find and correctvulnerabilities in customer

code.

SAP CloudIdentity service

Manage the identity life-cyclein the cloud.

Page 5: SAP NetWeaver Single Sign-On: Overview

Overview SAP Single Sign-On

Page 6: SAP NetWeaver Single Sign-On: Overview

© 2016 SAP SE or an SAP affiliate company. All rights reserved. 6Public

SAP Single Sign-OnBenefits

Single Sign-On – authenticateonce and subsequently accessSAP and non-SAP applications ina secure and user- friendly way

Security – Improve securitymeasures and meet company andregulatory requirements

From Anywhere – from yourmobile devices, from outside thecorporate network, etc.

Low Cost – leverage the benefitsof quick implementation and lowcost of ownership

Page 7: SAP NetWeaver Single Sign-On: Overview

© 2016 SAP SE or an SAP affiliate company. All rights reserved. 7Public

SAP Single Sign-OnBenefits in detail

Security• With just one password to remember, a strong password policy is finally feasible• No more need for password reminders on post-it notes• All passwords kept in one protected, central place

Reduce costs• Efficiency gains for users that only need to remember one password• Higher productivity due to reduced efforts for manual authentication, password reset,

helpdesk interaction,…

Simplicity• Lean product, fast implementation project, quick ROI• No more efforts to provision, protect, and reset passwords across many systems• No more efforts to manage password policies across many systems

Page 8: SAP NetWeaver Single Sign-On: Overview

© 2016 SAP SE or an SAP affiliate company. All rights reserved. 8Public

SAP Single Sign-OnSupported authentication modes

Single sign-on• Authenticate once to an authentication server (Active Directory, AS ABAP,..)• Received security token confirms identity for each subsequent login to business

applications

Multiple sign-on• User authenticates each time when accessing a business application• Authentication is performed against a central authentication server, not the business

application itself

Multi-factor authentication• In addition to knowledge of information (password), authentication requires a physical

element (possession of mobile phone, RSA SecurID card, etc.)

Page 9: SAP NetWeaver Single Sign-On: Overview

© 2016 SAP SE or an SAP affiliate company. All rights reserved. 9Public

SAP Single Sign-OnProduct description

SAP Single Sign-On provides simple, secure access to IT applications for business users. It offers advanced securitycapabilities to protect your company data and business applications.

Simple and secure access� Single sign-on for native SAP clients and web applications� Single sign-on for mobile devices� Support for cloud and on-premise landscapes

Secure data communication� Encryption of data communication for SAP GUI� Digital signatures� FIPS 140-2 certification of security functions

Advanced security capabilities� Two-factor authentication� Risk-based authentication using access policies� RFID-based authentication� Hardware security module support

Page 10: SAP NetWeaver Single Sign-On: Overview

Single sign-on main scenarios

Page 11: SAP NetWeaver Single Sign-On: Overview

© 2016 SAP SE or an SAP affiliate company. All rights reserved. 11Public

SAP Single Sign-OnComponents

Secure Login Client� Client application� Manages security tokens (Kerberos tokens, X.509 certificates)

Secure Login Server� Central service on SAP NetWeaver AS Java� Provides X.509 certificates to users and application servers

SAP Common Cryptographic Library (f.k.a. SecureLogin Library)� Cryptography and security library for SAP applications

Identity Provider� Central service on SAP NetWeaver AS Java� Provides SAML 2.0 assertions for Web-based SSO

Page 12: SAP NetWeaver Single Sign-On: Overview

© 2016 SAP SE or an SAP affiliate company. All rights reserved. 12Public

Single sign-on based on the Windows domain authenticationSecure, low TCO access to SAP business applications using Kerberos

• Users authenticate to Microsoft Active Directory during Windows login• Active Directory provides a Kerberos security token that SAP business

applications accept as proof of identity

• Supported on desktop systems (Windows, OS X) and mobile devices (iOS,Windows Mobile) that are part of a Windows domain

• Requires access to the corporate network• Users need to have an account in an Active Directory

• Very fast implementation, very low TCO, no additional server required• Single sign-on for web applications on AS ABAP and AS Java, desktop clients

such as SAP GUI, Business Client, RFC client applications like Analysis forOffice, HANA database, Business Intelligence platform, and many more

• Network encryption for SAP GUI and RFC clients is available based on SNC

Page 13: SAP NetWeaver Single Sign-On: Overview

© 2016 SAP SE or an SAP affiliate company. All rights reserved. 13Public

Start desktop client, app or browser and open connection

1

3

Business User

NW AS JAVA

SAP GUI & RFC (SNC)

Browser (SPNEGO)

Browser (SPNEGO)Windowslogin

Kerberossecuritytoken

Authentication Scenario1. User authenticates to

Windows domain2. Active Directory provides

Kerberos security token touser

3. User opens a systemconnection using a nativeclient or browser

4. Kerberos token is forwardedto system using SNC (for SAPGUI and RFC clients) orSPNEGO (for browsers). TheKerberos token is validatedoffline on the server, noconnection to AD required.

Single sign-on based on the corporate Windows domainSecure, low TCO access to SAP business applications using Kerberos

Microsoft Active Directory

2

SAP NetWeaverApplication Server Java

SAP NetWeaverApplication Server ABAP

Kerberos authentication

4

Page 14: SAP NetWeaver Single Sign-On: Overview

© 2016 SAP SE or an SAP affiliate company. All rights reserved. 14Public

Single sign-on using X.509 digital certificatesHighly interoperable single sign-on to SAP and 3rd party applications

• Users authenticate to SAP Secure Login Server to retrieve a short-lived X.509certificate, or reuse already available certificates, e.g. from corporate smart cards

• SAP business applications accept the certificate as proof of identity• Validity of the user certificate (hours, days, weeks) can be configured based on

security and usability requirements

• Supported on desktop systems (Windows, OS X)• Secure Login Server requires an AS Java to run. If certificates are already

available to users, e.g. through smart cards, then no additional server isrequired.

• Secure Login Server is a lean alternative to introducing a full-blown PKI• Secure Login Server supports two-factor and risk-based authentication, against

different user stores (LDAP, ABAP, ..)• X.509 certificates are accepted by a broad range of both SAP and 3rd party web

applications and clients, including many legacy systems• Network encryption for SAP GUI and RFC clients is available based on SNC

Page 15: SAP NetWeaver Single Sign-On: Overview

© 2016 SAP SE or an SAP affiliate company. All rights reserved. 15Public

Start desktop client, app or browser and open connection

1

3

Business User

NW AS JAVA

SAP GUI & RFC (SNC)

Browser (SSL clientauthentication)

Browser (SSL clientauthentication)Authenti-

cation

X.509certificate

Authentication Scenario1. (*) User authenticates to

Secure Login Server.Authentication can beautomatic (using e.g.Kerberos) or manual, evenbased on multiple factors

2. (*) Secure Login Serverreturns an X.509 certificate,valid for e.g. a working day

3. User opens a systemconnection

4. X.509 certificate token isforwarded to system andallows authentication

(*) Steps 1 and 2 are not required if theuser is already in possession of acertificate.

Single sign-on using X.509 digital certificatesHighly interoperable single sign-on to SAP and 3rd party applications

Secure Login Server (on AS Java)

2

Other Web Servers

SAP NetWeaverApplication Server ABAP

Certificate-basedauthentication

4

Page 16: SAP NetWeaver Single Sign-On: Overview

© 2016 SAP SE or an SAP affiliate company. All rights reserved. 16Public

Single sign-on using X.509 digital certificatesExtension scenarios based on Secure Login Server and X.509 certificates

• Instant user identification based on RFID token (Radio FrequencyIdentification)

• Warehouse and production scenarios where efficient authentication is key• Kiosk/terminal computers shared among teams• Simple configuration using Microsoft Active Directory to validate identities• Support for PC/SC and WaveID RFID reader devices

• Single sign-on for Secure Shell (SSH, putty)• Secure Login Client can be configured to run as an SSH agent• X.509 certificates and keys that are stored locally can be used for

authentication in SSH terminal sessions

Page 17: SAP NetWeaver Single Sign-On: Overview

© 2016 SAP SE or an SAP affiliate company. All rights reserved. 17Public

The security capabilities of the SAP NetWeaver Application Server ABAP are often based on certificates. When customers havea security policy that defines a short certificate validity, certificates expire on a regular basis and need to be updated.Certificate Lifecycle Management helps manage the renewal of certificates, reduces manual efforts, and prevents downtime.

Registration of SAP NetWeaver AS ABAP with Secure Login Server� Administrator establishes trust relationship between AS ABAP and Secure Login Server� Administrator configures the corresponding Secure Login Server profile for each

relevant certificate

Automated renewal of certificates� Scheduled ABAP report checks the local AS ABAP for certificates that are about to

expire� ABAP report retrieves renewed certificate from Secure Login Server and installs it

Benefits� No more manual steps required� SAP supported solution� Mitigate risk of unexpected downtime

Single sign-on using X.509 digital certificatesCertificate Lifecycle Management for Application Server ABAP

Page 18: SAP NetWeaver Single Sign-On: Overview

© 2016 SAP SE or an SAP affiliate company. All rights reserved. 18Public

Single sign-on using Security Assertion Markup Language (SAML)Identity federation and single sign-on for cross organizational scenarios

• Users authenticate to the SAP Identity Provider to retrieve a SAML assertion• SAP web applications accept the assertion as proof of identity• The assertion definition is very flexible and supports the easy mapping of

attributes between different systems, allowing loosely coupled integration acrossorganizations

• Supported by browser-based applications on desktop systems and mobiledevices

• SAP Identity Provider requires an AS Java to run

• SAP Identity Provider supports two-factor and risk-based authentication, againstdifferent user stores (LDAP, ABAP, ..)

• SAML assertions are accepted by a broad range of both SAP and 3rd party webapplications

• SAML assertions enable single sign-on during the lifetime of the browser session

Page 19: SAP NetWeaver Single Sign-On: Overview

© 2016 SAP SE or an SAP affiliate company. All rights reserved. 19Public

Start browser and open connection

3

1

Business User

NW AS JAVA

Authenti-cation

Create SAML assertionand redirect backto Service Provider

Authentication Scenario1. The user opens a connection

to the business system, whichis configured as a SAMLService Provider

2. The business system redirectsthe browser to the IdP

3. User authenticates to IdP,either automatically (usinge.g. SPNEGO) or manual,even based on multiplefactors

4. IdP establishes a securitysession, returns a SAMLassertion, and redirects thebrowser back to the SP

5. User is authenticated

Single sign-on using Security Assertion Markup Language (SAML)Identity federation and single sign-on for cross organizational scenarios

SAP Identity Provider (IdP) on AS Java

4

Service Provider (SP),e.g. SAP NetWeaver

Application Server ABAPor Java

SAML-basedauthentication

2Business applicationserver redirects browserto the Identity Provider

5

Page 20: SAP NetWeaver Single Sign-On: Overview

© 2016 SAP SE or an SAP affiliate company. All rights reserved. 20Public

Single sign-on based on SAP AuthenticatorLean solution for single sign-on on mobile devices

• Users authenticate once to the authentication server to store a shared secret ontheir mobile device

• Time-based One-Time Passwords (TOTP) based on the shared secret arepassed from SAP Authenticator to the SAP Identity Provider, which enablessingle sign-on for web-based business applications

• SAP Authenticator is available on mobile devices (iOS, Android)• SAP Authenticator supports browser-based applications, the SAP Fiori client,

and customer-developed mobile apps• SAP Authenticator-based authentication requires the AS Java

• SAP Authenticator can be combined with two-factor and risk-based authentication• Fast implementation due to automated roll-out of the configuration to mobile

devices• Highly flexible approach with little infrastructure prerequisites

Page 21: SAP NetWeaver Single Sign-On: Overview

© 2016 SAP SE or an SAP affiliate company. All rights reserved. 21Public

Browser accesses SPand authenticates withSAML

IdP returns SAMLassertion to mobiledevice

Start SAP Authenticator app on mobile device andopen browser or Fiori client connection, sendingone-time password (OTP)

1

3

Business User

NW AS JAVA

RegistrationStore shared secreton mobile device

Authentication Scenario1. User registers mobile device

once with the SAPAuthentication Library

2. Shared secret is stored onmobile device once

3. User starts SAP Authenticatoron mobile device and opens alink to a web or Fiori Clientapplication

4. Access is redirected to the IdPand user is authenticated withOTP

5. IdP establishes a securitysession, returns a SAMLassertion, and redirects thebrowser to the SP

6. User is authenticated

Single sign-on based on SAP AuthenticatorLean solution for single sign-on on mobile devices

SAP Authentication Library and Identity Provider (IdP)

2

4User is authenticated atthe IdP based on OTP

6

Service Provider (SP)

5

Page 22: SAP NetWeaver Single Sign-On: Overview

Capabilities

Page 23: SAP NetWeaver Single Sign-On: Overview

© 2016 SAP SE or an SAP affiliate company. All rights reserved. 23Public

SAP CommonCryptoLibFIPS 140-2 certification

Component “SAP NW SSO 2.0 Secure Login Library Crypto Kernel” was certified on January 6th, 2015

List entry (Cert# 2308):http://csrc.nist.gov/groups/STM/cmvp/documents/140-1/140val-all.htm

Certificate:http://csrc.nist.gov/groups/STM/cmvp/documents/140-1/140crt/FIPS140ConsolidatedCertList0049.pdf

Blog on SAP Community Network:http://scn.sap.com/community/security/blog/2015/01/21/sap-s-crypto-kernel-receives-fips-140-2-certificate

Page 24: SAP NetWeaver Single Sign-On: Overview

© 2016 SAP SE or an SAP affiliate company. All rights reserved. 24Public

Latest enhancements in version 8.4.38*• Significant performance increase on all major platforms

• RSA, AES, SHA-2• Perfect Forward Secrecy for TLS

• Ephemeral key agreement• Elliptic curve Diffie-Hellman key exchange

• Elliptic curves P-224, P-256, P-384, P-521• TLS 1.2 cipher suites in Galois Counter Mode (GCM)• New command “sapgenpse tlsinfo” to help configure

cipher suite profile parameters for TLS

** See SAP Note 2004653 for complete list

Previous support**• Hash algorithms: SHA-2, ..• Signature algorithms: DSA, PKCS #1 v 2.1 RSA

PSS, ..• Key exchange algorithms: Diffie-Hellman, ElGamal,

PKCS #1 v 2.1 RSA OAEP, ..• Block cipher algorithms: AES 256bit, ..

SAP CommonCryptoLibCapabilities

* See SAP Note 2181733 for details

Page 25: SAP NetWeaver Single Sign-On: Overview

© 2016 SAP SE or an SAP affiliate company. All rights reserved. 25Public

SAP Single Sign-OnDigital Signatures

Benefits of digital signatures• Confirm that a document was created by a known sender• Confirm that a document was not tampered with during transmission• Provide the means for a binding signature that cannot be denied afterwards

Usage with AS ABAP• Based on Secure Store & Forward (SSF) interface• Server-side digital signatures: Supported by the SAP CommonCryptoLib• SAP Single Sign-On includes support for hardware security modules• Client-side digital signatures: Supported by Secure Login Client for SAP GUI

More information on SAP Help Portal and SAP Service Marketplace• Digital Signing with Secure Store and Forward (SSF)• Digital Client Signature• Digital Signatures (SSF) with a Hardware Security Module• SAP Note 1973271 - Secure Login Library 2.0 HSM Configuration for SSF

Page 26: SAP NetWeaver Single Sign-On: Overview

© 2016 SAP SE or an SAP affiliate company. All rights reserved. 26Public

SAP user interface integrationCombines beautiful user interfaces with great usabilitySupport new SAP clients out of the box� SAP Fiori� SAP NetWeaver Business Client� SAP Screen Personas

Single sign-on for new SAP clients

Page 27: SAP NetWeaver Single Sign-On: Overview

© 2016 SAP SE or an SAP affiliate company. All rights reserved. 27Public

SAP Single Sign-OnTwo-factor authentication

Authentication requires two means of identification� Knowledge of a password� Possession of a physical device, such as a cell phone

Options for the second factor� SAP Authenticator mobile app

– Generates one-time passwords (RFC 6238 compatible)– Available for iOS and Android� One-time password sent using SMS� One-time password sent using e-mail� RSA / RADIUS

Usage scenarios� Recommended for scenarios with special security

requirements� Web and SAP GUI applications

Page 28: SAP NetWeaver Single Sign-On: Overview

© 2016 SAP SE or an SAP affiliate company. All rights reserved. 28Public

SAP Single Sign-OnRisk-based authentication based on context

Risk-based authentication� Risk-based enforcement of stronger authentication� Example: User access from outside the corporate networkè Two-factor authentication is required

INTRANET

CORPORATE LDAPDMZ

SAP Identity Provider orSecure Login Server

2FA Token

• Evaluate context such as IP address, userroles, device,..

• Accept access, deny access or enforce 2FA• Return SSO token (SAML or X.509)

INTERNET

Page 29: SAP NetWeaver Single Sign-On: Overview

© 2016 SAP SE or an SAP affiliate company. All rights reserved. 29Public

SAP Single Sign-OnLimit business functionality based on context

RuntimeSAP Application Server

Check access policyand handle access

restrictions

� Temporarily reduce user roles andauthorizations for session on AS Java

� Extend customer exits in applications on ASABAP to allow risk-based authorizationchecks, e.g. for admin tasks or datadownloadSAML assertion

Risk-based authorization handling• Relies on SAP Identity Provider, using SAML 2.0• Access policy information added to SAML

assertion after authentication• On AS Java, dynamic reduction of available roles based

on access policy. See SAP note 2151025.• On AS ABAP, access policy information available in

security session. See SAP note 2057832.

Including access policyinformation from SAP IdP

Page 30: SAP NetWeaver Single Sign-On: Overview

© 2016 SAP SE or an SAP affiliate company. All rights reserved. 30Public

Single sign-on for ABAP: SNC made easyGuided SNC configuration using the SNC Wizard

Page 31: SAP NetWeaver Single Sign-On: Overview

© 2016 SAP SE or an SAP affiliate company. All rights reserved. 31Public

Platform securitySupport for eliminating unencrypted SAP GUI / RFC access to AS ABAP

Situation• It is often a compliance requirement to only allow encrypted communication to SAP systems• As documented in SAP Note 1690662, unencrypted communication can be blocked• Enabling this setting may be a risk for business continuity if SAP Single Sign-On was not yet configured

on all clients, as some people may lose access to the system

Solution• Unencrypted access to the backend can be recorded in the Security Audit Log, as documented in SAP

Note 2122578• Customers can enable the logging function and keep an eye on whether there are still unencrypted

connections from certain client machines, which can then be configured to use SAP Single Sign-On• Once the administrator is reassured that there are no more clients with missing configuration out there,

she can enforce encrypted communication as described in SAP Note 1690662

Page 32: SAP NetWeaver Single Sign-On: Overview

© 2016 SAP SE or an SAP affiliate company. All rights reserved. 32Public

Hardware security module support

Store private keys in hardware� Protect Secure Login Server Certificate Authority� Protect private keys for digital signatures (Secure Store and Forward, SSF)� Performance acceleration

SafeNetThales

Page 33: SAP NetWeaver Single Sign-On: Overview

Summary

Page 34: SAP NetWeaver Single Sign-On: Overview

© 2016 SAP SE or an SAP affiliate company. All rights reserved. 34Public

Recommendations

üIdentify the most critical systems. Which systems contain your most sensitive business information?How many people have access to them? Define your overall single sign-on strategy and start withthese critical business systems.

Understand the different modules of SAP Single Sign-On and analyze your system landscape todetermine which SSO standards can be used. If your organization does not have the appropriateresources and know-how, involve SAP Consulting or SAP partners.

Passwords are often the weakest link in enterprises. Prevent the usage of passwords by relying onstandards such as SAML, X.509 certificates, or Kerberos. SAP Single Sign-On offers solutions forall of these standards.

Once you have implemented single sign-on, start enforcing strong passwords in the related systems.Mid-term strategy: Consider disabling user name/password authentication in critical businesssystems.

ü

ü

ü

Page 35: SAP NetWeaver Single Sign-On: Overview

© 2016 SAP SE or an SAP affiliate company. All rights reserved. 35Public

Summary

SAP Single Sign-On offers a suite of securitycapabilities, for SAP as well as non-SAP applications

It offers• Investment protection• Flexibility• Single sign-on for heterogeneous system landscapes

What are the main business drivers?• Protect business, reputation and trust• Lower password related costs• Simplicity and agility

Page 36: SAP NetWeaver Single Sign-On: Overview

© 2016 SAP SE or an SAP affiliate company. All rights reserved. 36Public

Get more information

http://scn.sap.com/community/sso

Community Network

Page 37: SAP NetWeaver Single Sign-On: Overview

© 2016 SAP SE or an SAP affiliate company. All rights reserved. 37Public

© 2016 SAP SE or an SAP affiliate company. All rights reserved.

No part of this publication may be reproduced or transmitted in any form or for any purpose without the express permission of SAP SE or an SAP affiliate company.

SAP and other SAP products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of SAP SE (or an SAP affiliatecompany) in Germany and other countries. Please see http://global12.sap.com/corporate-en/legal/copyright/index.epx for additional trademark information and notices.

Some software products marketed by SAP SE and its distributors contain proprietary software components of other software vendors.

National product specifications may vary.

These materials are provided by SAP SE or an SAP affiliate company for informational purposes only, without representation or warranty of any kind, and SAP SE or itsaffiliated companies shall not be liable for errors or omissions with respect to the materials. The only warranties for SAP SE or SAP affiliate company products andservices are those that are set forth in the express warranty statements accompanying such products and services, if any. Nothing herein should be construed asconstituting an additional warranty.

In particular, SAP SE or its affiliated companies have no obligation to pursue any course of business outlined in this document or any related presentation, or to developor release any functionality mentioned therein. This document, or any related presentation, and SAP SE’s or its affiliated companies’ strategy and possible futuredevelopments, products, and/or platform directions and functionality are all subject to change and may be changed by SAP SE or its affiliated companies at any timefor any reason without notice. The information in this document is not a commitment, promise, or legal obligation to deliver any material, code, or functionality. All forward-looking statements are subject to various risks and uncertainties that could cause actual results to differ materially from expectations. Readers are cautioned not to placeundue reliance on these forward-looking statements, which speak only as of their dates, and they should not be relied upon in making purchasing decisions.