SlideShare a Scribd company logo
Unified Connectivity (UCON) 
Overview 
July 2014 Public
Disclaimer 
This presentation outlines our general product direction and should not be relied on in making a 
purchase decision. This presentation is not subject to your license agreement or any other agreement 
with SAP. SAP has no obligation to pursue any course of business outlined in this presentation or to 
develop or release any functionality mentioned in this presentation. This presentation and SAP's 
strategy and possible future developments are subject to change and may be changed by SAP at any 
time for any reason without notice. This document is provided without a warranty of any kind, either 
express or implied, including but not limited to, the implied warranties of merchantability, fitness for a 
particular purpose, or non-infringement. SAP assumes no responsibility for errors or omissions in this 
document, except if such damages were caused by SAP intentionally or grossly negligent. 
© 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 2
Agenda - UCON RFC Security Basic Scenario 
Motivation and Scope 
Basic Concepts 
Coverage of New RFMs 
How to Cope With the Restrictions of Productive Systems 
Summary 
© 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 3
UCON RFC Security Basic Scenario 
Motivation and Scope
The Scope of UCON RFC Basic Connectivity 
C 
High-performing, 
for local high load scenarios, 
across all ABAP Releases, 
close integration into ABAP 
RFC-Based Connectivity 
© 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 5
UCON - A Simple Approach to Make RFC More Secure 
Reduce the Overall Attack Surface of Your Remote-Enabled 
Function Modules. Enhance RFC security by blocking the 
access to a large number of RFMs ! 
Facts: 
y Most SAP ERP customers run just a limited number of the business 
scenarios for which they need to expose some RFMs 
y A lot of RFMs are only used to parallelize within a system. 
Solution 
y Find out which RFMs need to be exposed for the scenarios of a 
customer. 
y Block the access to all other RFMs. 
© 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 6
The Basic Strategy of UCON to Solve These Problems 
Reduce the number of RFMs exposed to the outside world. 
Expose only and exactly those RFMs a customer needs to run their business scenarios. 
38000 RFMs in 
SAP ERP (incl. 
SAP NetWeaver) 
A typical SAP 
customer only needs 
to expose a few 
hundred RFMs for 
their business 
scenarios 
© 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 7
UCON RFC Security Basic Scenario 
Basic Concepts
The UCON Way to Security: Expose Only Those 
Function Modules You Need to the Outside World 
… 
RF 
M1 
RF 
M2 
RF 
M3 
RF 
M4 
RF 
M5 
RF 
M6 
RF 
M7 
RF 
M8 
RF 
M9 
RF 
M 
RF 
M. 
10 11 
Default Communication Assembly (CA) 
© 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 9
UCON Checks Do not Interfere with Calls Within the Same Client and System 
RF 
M3 
RF 
M5 
RF 
M7 
SAP Business Suite 
Blocked for access 
from outside – 
Open for use in 
parallel RFC inside 
the same client in the 
… 
RF 
M1 
RF 
M. 
… 
same system 
© 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 10
UCON - An Additional Role/User-Independent Layer of Security Checks 
User trying to access a RFM 
no No Access 
RFM in 
CA? 
yes 
no 
User has 
authorization? 
User has authorization 
for the relevant CA? No Access 
yes Access to 
RFM 
© 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 11
UCON Setup and Configuration 
It is simple to set up and configure Unified Connectivity (UCON): 
1. Set the UCON profile parameter UCON/RFC/ACTIVE to 1 to enable UCON runtime checks for RFMs in the 
final phase. 
2. Run the UCON setup to generate a default communication assembly (CA) and other required entities. 
3. Choose a suitable duration of the logging and evaluation phase. 
4. Schedule the batch job SAP_UCON_MANAGEMENT that selects and persists the RFC statistic records 
required by the UCON phase tool on the database. 
© 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 12
UCON RFC Security 
Easy Customer Adoption in Three Steps 
Logging of RFMs 
called from 
outside 
Evaluation/ 
Simulation 
Runtime checks 
active 
© 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 13
UCON RFC Security 
Easy Customer Adoption in Three Steps 
Logging of RFMs 
called from 
outside 
Runtime check 
Runtime Checks 
active 
Evaluation/ 
Simulation 
active 
© 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 14
Phase 1 
Logging of RFC Connectivity Data 
Tool support to use solid information instead of unreliable data 
• Use a dedicated tool set to collect the information you need 
Identify the RFMs you need to expose to run your business 
scenarios 
• Collect aggregated statistic data on which RFMs are called in 
your system from outside 
• Over a time period you can choose 
At the end of phase 1, choose the RFMs you need and assign them 
to the Default CA: 
• Based on the statistical records, you decide which RFMs 
should be accessed from outside and assign them to the CA 
© 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 15
UCON RFC Security 
Easy Customer Adoption in Three Steps 
Logging of RFMs 
Logging of RFMs 
called from 
from 
outside 
outside 
Evaluation/ 
simulation 
Runtime check 
Runtime checks 
active 
Simulation 
Checks 
active 
© 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 16
Phase 2 
Evaluation of the Data Logged 
UCON should not interfere with productive customer scenarios: 
• Use the evaluation phase (phase 2) to simulate UCON 
runtime checks 
• Check completeness of RFMs you need to expose 
• Put required RFMs into Default CA 
Customizable duration of evaluation phase: 
• Duration of evaluation phase depends on in-house experience 
and knowledge 
Check whether you have protected the right RFMs and make 
necessary corrections 
© 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 17
UCON RFC Security 
Easy Customer Adoption in Three Steps 
Logging of RFMs 
Logging of RFMs 
called from 
from 
outside 
outside 
Evaluation/ 
Simulation 
simulation 
Runtime check 
Runtime checks 
active 
Checks 
active 
© 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 18
Phase 3 
The RFMs in the System Are Protected by UCON 
UCON runtime checks are now active: 
• Only RFMs in the default CA are accessible from outside 
• RFM that are not in the Default CA are now protected 
against any outside access 
Less than 5% of all RFMs need to be exposed in a typical 
customer system: 
• Out of a total of 38,000 RFMs in an SAP ERP system, only 
a few hundred are required and exposed for productive 
customer connectivity 
Massive reduction of RFC attack surface for the average 
customer system 
© 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 19
Prerequisites for the Different Security Layers 
Access to RFMs 
UCON 
runtime 
checks 
S_RFC 
checks 
Access to RFMs 
© 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 20
Efforts Required for the Different Security Layers 
Access to RFMs 
UCON 
runtime 
checks 
S_RFC 
checks 
Access to RFMs 
© 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 21
UCON Protection After the Initial UCON Security Classification 
Check-Active Phase 
Blocked RFMs from initial UCON set-up 
100 ++ 
Default CA 
37,000++ 
SAP Business Suite 
Blocked RFMs/ UCON-protected 
RFMs from 
other, new transports or 
installations 
© 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 22
UCON RFC Security Basic Scenario 
Coverage of New Remote-Enabled Function Modules
UCON Protection After Initial Security Classification 
Check-active Phase 
Development 
Protected/ 
blocked 
RFMs 
Default Communication 
Assembly 
Exposed RFMs 
© 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 24
New RFMs Arrive at a UCON-Protected System 
Check-active phase 
Development 
Over time: New RFMs in 
transports, SPs, EhPs … 
© 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 25
New RFMs on Their Way to UCON Protection – Logging Phase 
Logging phase 
Evaluation phase Access allowed 
Access blocked 
UCON protection 
Check-active phase 
Access allowed 
New RFMs are 
automatically 
assigned to the 
logging phase 
© 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 26
New RFMs on Their Way to UCON Protection – Evaluation Phase 
Logging phase 
Access allowed 
Access blocked 
UCON protection 
Evaluation phase 
Check-active phase 
Access allowed 
© 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 27
New RFMs Have Achieved UCON Protection – Check-Active Phase 
Logging phase 
Evaluation phase 
Access blocked 
UCON protection 
Check-active phase 
Access allowed 
© 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 28
The Ever-Growing Scope of UCON Protection 
Blocked RFMs from initial UCON set-up 
Default CA 
SAP Business Suite 
Blocked RFMs 
from other, new 
transports or 
installations 
© 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 29
UCON RFC Security Basic Scenario 
How to Cope With the Restrictions of Productive Systems
UCON and the Restrictions in a Productive System 
Challenges 
PROD 
Assignment of relevant RFMs 
to default CA and UCON 
UCON 
Phase 
Tool 
phases 
Collection 
of RFC call 
statistics 
and UCON 
protection 
Authorizations and system change options in 
Productive Systems are not sufficient for UCON 
Operations 
© 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 31
UCON and the Restrictions in a Productive System 
Solution 
DEV PROD 
UCON 
Phase 
Tool 
Assignment of 
relevant RFMs 
to default CA 
and UCON 
UCON 
Phase 
Tool 
phases 
Collection 
of RFC call 
statistics 
and UCON 
protection 
Delegate 
UCON 
operations 
to DEV 
Slide 32 
© 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 32
UCON and the Restrictions in a Productive System 
How to Delegate UCON Operations to DEV - Step 1 
DEV PROD 
UCON 
Phase Tool 
Import RFC call statistics from 
PROD to DEV 
UCON 
Phase Tool RFC call 
statistics 
.csv 
1 
© 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 33
UCON and the Restrictions in a Productive System 
How to Delegate UCON Operations to DEV - Step 2 
DEV PROD 
UCON 
Phase Tool 
Import RFC call statistics from 
PROD to DEV 
UCON 
Phase Tool RFC call 
statistics 
.csv 
Assign relevant RFMs to 
default CA and to next phase 
1 
2 
© 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 34
UCON and the Restrictions in a Productive System 
How to Delegate UCON Operations to DEV - Step 3 
DEV PROD 
UCON 
Phase Tool 
UCON 
Phase Tool 
Import RFC call statistics from 
PROD to DEV 
UCON 
Phase Tool RFC call 
Assign relevant RFMs to 
default CA and to next phase 
UCON 
Phase Tool 
statistics 
.csv 
Phase and CA assignment 
of RFMs 
R3Trans 
1 
2 
3 
© 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 35
UCON and the Restrictions in a Productive System 
How to Delegate UCON Operations to DEV in a Nutshell 
DEV PROD 
UCON 
Phase 
Tool 
Assignment of 
relevant RFMs 
to default CA 
and UCON 
UCON 
Phase 
Tool 
RFC call 
statistics 
phases 
Phase and CA 
assignment of RFMs 
Collection 
of RFC call 
statistics 
and UCON 
protection 
© 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 36
UCON RFC Security Basic Scenario 
Summary
UCON - Summary 
It is simple to set up and configure Unified Connectivity (UCON) 
• The UCON framework offers a simple, straightforward approach for enhancing the security of 
your RFCs. It allows you to minimize the number of RFMs on ABAP-based servers exposed 
to other clients and systems, reducing the available attack surface in your RFC 
communications. 
• The UCON phase tool guides and supports the administrator in the three-step setup and the 
three-phased process. 
• UCON covers new function modules entering the system via Support Packages, 
Enhancement Packages, transports, or new developments. 
• UCON is fully enabled for life-cycle management to ensure consistent RFC security 
across your system landscape. 
© 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 38
Get More Information 
Community Network 
Get more information, videos and updates 
Unified Connectivity (UCON) 
http://scn.sap.com/docs/DOC-53844 
SAP NetWeaver Security Community 
http://scn.sap.com/community/security 
© 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 39
© 2014 SAP SE or an SAP affiliate company. All rights reserved. 
No part of this publication may be reproduced or transmitted in any form or for any purpose without the express permission of SAP SE or an 
SAP affiliate company. 
SAP and other SAP products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of SAP SE 
(or an SAP affiliate company) in Germany and other countries. Please see http://global12.sap.com/corporate-en/legal/copyright/index.epx for additional trademark 
information and notices. 
Some software products marketed by SAP SE and its distributors contain proprietary software components of other software vendors. 
National product specifications may vary. 
These materials are provided by SAP SE or an SAP affiliate company for informational purposes only, without representation or warranty of any kind, and SAP SE or its 
affiliated companies shall not be liable for errors or omissions with respect to the materials. The only warranties for SAP SE or 
SAP affiliate company products and services are those that are set forth in the express warranty statements accompanying such products and services, if any. Nothing 
herein should be construed as constituting an additional warranty. 
In particular, SAP SE or its affiliated companies have no obligation to pursue any course of business outlined in this document or any related presentation, or to develop or 
release any functionality mentioned therein. This document, or any related presentation, and SAP SE’s or its affiliated companies’ strategy and possible future 
developments, products, and/or platform directions and functionality are all subject to change and may be changed by SAP SE or its affiliated companies at any time for any 
reason without notice. The information in this document is not a commitment, promise, or legal obligation to deliver any material, code, or functionality. All forward-looking 
statements are subject to various risks and uncertainties that could cause actual results to differ materially from expectations. Readers are cautioned not to place undue 
reliance on these forward-looking statements, which speak only as of their dates, and they should not be relied upon in making purchasing decisions. 
© 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 40

More Related Content

What's hot

Sap Security Workshop
Sap Security WorkshopSap Security Workshop
Sap Security Workshop
larrymcc
 
Sap fiori
Sap fioriSap fiori
Sap fiori
Anudeep Bhatia
 
Document Imaging and the SAP Content Server 101
Document Imaging and the SAP Content Server 101Document Imaging and the SAP Content Server 101
Document Imaging and the SAP Content Server 101
Verbella CMG
 
Change Control Management in SAP Solution Manager 7.2
Change Control Management in SAP Solution Manager 7.2Change Control Management in SAP Solution Manager 7.2
Change Control Management in SAP Solution Manager 7.2
Techedge Group
 
Focused Insights Overview
Focused Insights OverviewFocused Insights Overview
Focused Insights Overview
⌘ Xavier Dupeyrat
 
sap fiori architecture
sap fiori architecturesap fiori architecture
sap fiori architecture
Phanindra Mortha
 
Sap grc process control 10.0
Sap grc process control 10.0Sap grc process control 10.0
Sap grc process control 10.0
Latha Kamal
 
SAP HANA SPS08 Security
SAP HANA SPS08 SecuritySAP HANA SPS08 Security
SAP HANA SPS08 Security
SAP Technology
 
SAP - SOLUTION MANAGER
SAP - SOLUTION MANAGER SAP - SOLUTION MANAGER
SAP - SOLUTION MANAGER
Douglas Bernardini
 
62620940 charm-configuration-procedures
62620940 charm-configuration-procedures62620940 charm-configuration-procedures
62620940 charm-configuration-procedures
narendar99
 
SAP ECC to S/4HANA Move
SAP ECC to S/4HANA MoveSAP ECC to S/4HANA Move
SAP ECC to S/4HANA Move
AGSanePLDTCompany
 
Benefits of SAP Fiori Apps
Benefits of SAP Fiori AppsBenefits of SAP Fiori Apps
Benefits of SAP Fiori Apps
KTern.AI
 
Sap S4 HANA Everything You Need To Know
Sap S4 HANA Everything You Need To Know Sap S4 HANA Everything You Need To Know
Sap S4 HANA Everything You Need To Know
Soumya De
 
Sap ehp6 to ehp7 upgradation projects
Sap ehp6 to ehp7 upgradation projectsSap ehp6 to ehp7 upgradation projects
Sap ehp6 to ehp7 upgradation projects
Lokesh Modem
 
SAP Project Management: Major Responsibilities And Key Task
SAP Project Management: Major Responsibilities And Key TaskSAP Project Management: Major Responsibilities And Key Task
SAP Project Management: Major Responsibilities And Key Task
Anjali Rao
 
BW Migration to HANA Part 2 - SUM DMO Tool for SAP Upgrade & Migration
BW Migration to HANA Part 2 - SUM DMO Tool for SAP Upgrade & MigrationBW Migration to HANA Part 2 - SUM DMO Tool for SAP Upgrade & Migration
BW Migration to HANA Part 2 - SUM DMO Tool for SAP Upgrade & Migration
Linh Nguyen
 
Future of an abap developer
Future of an abap developerFuture of an abap developer
Future of an abap developer
Robert Eijpe
 
SAP ChaRM (Change Request Management)
SAP ChaRM (Change Request Management) SAP ChaRM (Change Request Management)
SAP ChaRM (Change Request Management)
anjalirao366
 
SAP Student Lifecycle Management - Overview November 2017
SAP Student Lifecycle Management - Overview November 2017SAP Student Lifecycle Management - Overview November 2017
SAP Student Lifecycle Management - Overview November 2017
Rob Jonkers
 
Sap basis made_easy321761331053730
Sap basis made_easy321761331053730Sap basis made_easy321761331053730
Sap basis made_easy321761331053730
K Hari Shankar
 

What's hot (20)

Sap Security Workshop
Sap Security WorkshopSap Security Workshop
Sap Security Workshop
 
Sap fiori
Sap fioriSap fiori
Sap fiori
 
Document Imaging and the SAP Content Server 101
Document Imaging and the SAP Content Server 101Document Imaging and the SAP Content Server 101
Document Imaging and the SAP Content Server 101
 
Change Control Management in SAP Solution Manager 7.2
Change Control Management in SAP Solution Manager 7.2Change Control Management in SAP Solution Manager 7.2
Change Control Management in SAP Solution Manager 7.2
 
Focused Insights Overview
Focused Insights OverviewFocused Insights Overview
Focused Insights Overview
 
sap fiori architecture
sap fiori architecturesap fiori architecture
sap fiori architecture
 
Sap grc process control 10.0
Sap grc process control 10.0Sap grc process control 10.0
Sap grc process control 10.0
 
SAP HANA SPS08 Security
SAP HANA SPS08 SecuritySAP HANA SPS08 Security
SAP HANA SPS08 Security
 
SAP - SOLUTION MANAGER
SAP - SOLUTION MANAGER SAP - SOLUTION MANAGER
SAP - SOLUTION MANAGER
 
62620940 charm-configuration-procedures
62620940 charm-configuration-procedures62620940 charm-configuration-procedures
62620940 charm-configuration-procedures
 
SAP ECC to S/4HANA Move
SAP ECC to S/4HANA MoveSAP ECC to S/4HANA Move
SAP ECC to S/4HANA Move
 
Benefits of SAP Fiori Apps
Benefits of SAP Fiori AppsBenefits of SAP Fiori Apps
Benefits of SAP Fiori Apps
 
Sap S4 HANA Everything You Need To Know
Sap S4 HANA Everything You Need To Know Sap S4 HANA Everything You Need To Know
Sap S4 HANA Everything You Need To Know
 
Sap ehp6 to ehp7 upgradation projects
Sap ehp6 to ehp7 upgradation projectsSap ehp6 to ehp7 upgradation projects
Sap ehp6 to ehp7 upgradation projects
 
SAP Project Management: Major Responsibilities And Key Task
SAP Project Management: Major Responsibilities And Key TaskSAP Project Management: Major Responsibilities And Key Task
SAP Project Management: Major Responsibilities And Key Task
 
BW Migration to HANA Part 2 - SUM DMO Tool for SAP Upgrade & Migration
BW Migration to HANA Part 2 - SUM DMO Tool for SAP Upgrade & MigrationBW Migration to HANA Part 2 - SUM DMO Tool for SAP Upgrade & Migration
BW Migration to HANA Part 2 - SUM DMO Tool for SAP Upgrade & Migration
 
Future of an abap developer
Future of an abap developerFuture of an abap developer
Future of an abap developer
 
SAP ChaRM (Change Request Management)
SAP ChaRM (Change Request Management) SAP ChaRM (Change Request Management)
SAP ChaRM (Change Request Management)
 
SAP Student Lifecycle Management - Overview November 2017
SAP Student Lifecycle Management - Overview November 2017SAP Student Lifecycle Management - Overview November 2017
SAP Student Lifecycle Management - Overview November 2017
 
Sap basis made_easy321761331053730
Sap basis made_easy321761331053730Sap basis made_easy321761331053730
Sap basis made_easy321761331053730
 

Viewers also liked

Read Access Logging (RAL) for SAP NetWeaver Overview
Read Access Logging (RAL) for SAP NetWeaver OverviewRead Access Logging (RAL) for SAP NetWeaver Overview
Read Access Logging (RAL) for SAP NetWeaver Overview
SAP Technology
 
Materializing dataprivacy in sap .. how?
Materializing dataprivacy in sap .. how?Materializing dataprivacy in sap .. how?
Materializing dataprivacy in sap .. how?
Nico J.W. Kuijper ECMm BPMs ERMp
 
Sap Product Lifecycle Costing solution in detail
Sap Product Lifecycle Costing solution in detailSap Product Lifecycle Costing solution in detail
Sap Product Lifecycle Costing solution in detail
Henry Blanck
 
SAP PLM Online Training Complete Hand Book
SAP PLM Online Training Complete Hand BookSAP PLM Online Training Complete Hand Book
SAP PLM Online Training Complete Hand Book
KMR SOFTWARE SERVICES PVT LTD
 
A comprehensive guide to SAP PLM 7.01
A comprehensive guide to SAP PLM 7.01A comprehensive guide to SAP PLM 7.01
A comprehensive guide to SAP PLM 7.01
Shobhit Singhal
 
HANA SPS07 Architecture & Landscape
HANA SPS07 Architecture & LandscapeHANA SPS07 Architecture & Landscape
HANA SPS07 Architecture & Landscape
SAP Technology
 
SAP HANA – A Technical Snapshot
SAP HANA – A Technical SnapshotSAP HANA – A Technical Snapshot
SAP HANA – A Technical Snapshot
Debajit Banerjee
 
PLM Introduction
PLM IntroductionPLM Introduction
PLM Introduction
Jayakumar Vadivelu
 
Five Reasons To Skip SAP Suite on HANA and Go Directly to SAP S/4HANA
Five Reasons To Skip SAP Suite on HANA and Go Directly to SAP S/4HANAFive Reasons To Skip SAP Suite on HANA and Go Directly to SAP S/4HANA
Five Reasons To Skip SAP Suite on HANA and Go Directly to SAP S/4HANA
SAP Technology
 

Viewers also liked (9)

Read Access Logging (RAL) for SAP NetWeaver Overview
Read Access Logging (RAL) for SAP NetWeaver OverviewRead Access Logging (RAL) for SAP NetWeaver Overview
Read Access Logging (RAL) for SAP NetWeaver Overview
 
Materializing dataprivacy in sap .. how?
Materializing dataprivacy in sap .. how?Materializing dataprivacy in sap .. how?
Materializing dataprivacy in sap .. how?
 
Sap Product Lifecycle Costing solution in detail
Sap Product Lifecycle Costing solution in detailSap Product Lifecycle Costing solution in detail
Sap Product Lifecycle Costing solution in detail
 
SAP PLM Online Training Complete Hand Book
SAP PLM Online Training Complete Hand BookSAP PLM Online Training Complete Hand Book
SAP PLM Online Training Complete Hand Book
 
A comprehensive guide to SAP PLM 7.01
A comprehensive guide to SAP PLM 7.01A comprehensive guide to SAP PLM 7.01
A comprehensive guide to SAP PLM 7.01
 
HANA SPS07 Architecture & Landscape
HANA SPS07 Architecture & LandscapeHANA SPS07 Architecture & Landscape
HANA SPS07 Architecture & Landscape
 
SAP HANA – A Technical Snapshot
SAP HANA – A Technical SnapshotSAP HANA – A Technical Snapshot
SAP HANA – A Technical Snapshot
 
PLM Introduction
PLM IntroductionPLM Introduction
PLM Introduction
 
Five Reasons To Skip SAP Suite on HANA and Go Directly to SAP S/4HANA
Five Reasons To Skip SAP Suite on HANA and Go Directly to SAP S/4HANAFive Reasons To Skip SAP Suite on HANA and Go Directly to SAP S/4HANA
Five Reasons To Skip SAP Suite on HANA and Go Directly to SAP S/4HANA
 

Similar to Unified Connectivity (UCON) for SAP NetWeaver Overview

Pre-Con Education on APM 9.7
Pre-Con Education on APM 9.7Pre-Con Education on APM 9.7
Pre-Con Education on APM 9.7
CA Technologies
 
Platform Encryption for ISVs (February 23, 2016)
Platform Encryption for ISVs (February 23, 2016)Platform Encryption for ISVs (February 23, 2016)
Platform Encryption for ISVs (February 23, 2016)
Salesforce Partners
 
Testing a Microservices Architecture
Testing a Microservices ArchitectureTesting a Microservices Architecture
Testing a Microservices Architecture
Parasoft
 
Mainframe vug july 30 2015
Mainframe vug july 30 2015Mainframe vug july 30 2015
Mainframe vug july 30 2015
Serena Software
 
Penetration Testing SAP Systems
Penetration Testing SAP SystemsPenetration Testing SAP Systems
Penetration Testing SAP Systems
Onapsis Inc.
 
EAS-SEC: Framework for securing business applications
EAS-SEC: Framework for securing business applicationsEAS-SEC: Framework for securing business applications
EAS-SEC: Framework for securing business applications
ERPScan
 
Accelerate2022-Solving the SAP Security Gap through Application-aware Network...
Accelerate2022-Solving the SAP Security Gap through Application-aware Network...Accelerate2022-Solving the SAP Security Gap through Application-aware Network...
Accelerate2022-Solving the SAP Security Gap through Application-aware Network...
PeterSmetny1
 
Hands-On Lab: Smart Instrumentation
Hands-On Lab: Smart InstrumentationHands-On Lab: Smart Instrumentation
Hands-On Lab: Smart Instrumentation
CA Technologies
 
Consistent Regions in Specialized Toolkits for IBM InfoSphere Streams V4.0
Consistent Regions in Specialized Toolkits for IBM InfoSphere Streams V4.0Consistent Regions in Specialized Toolkits for IBM InfoSphere Streams V4.0
Consistent Regions in Specialized Toolkits for IBM InfoSphere Streams V4.0
lisanl
 
Fiori and S/4 authorizations: What are the biggest challenges, and where do t...
Fiori and S/4 authorizations: What are the biggest challenges, and where do t...Fiori and S/4 authorizations: What are the biggest challenges, and where do t...
Fiori and S/4 authorizations: What are the biggest challenges, and where do t...
akquinet enterprise solutions GmbH
 
Mavenir: OpenRAN – What It Is and What It Means for Rural Operators
Mavenir: OpenRAN – What It Is and What It Means for Rural OperatorsMavenir: OpenRAN – What It Is and What It Means for Rural Operators
Mavenir: OpenRAN – What It Is and What It Means for Rural Operators
Mavenir
 
SAP Cloud Platform SLAs and ITSM Process
SAP Cloud Platform SLAs and ITSM ProcessSAP Cloud Platform SLAs and ITSM Process
SAP Cloud Platform SLAs and ITSM Process
SAP Cloud Platform
 
Upgrading Em13c Collaborate 2016
Upgrading Em13c Collaborate 2016Upgrading Em13c Collaborate 2016
Upgrading Em13c Collaborate 2016
Kellyn Pot'Vin-Gorman
 
Best Practices for Optimizing Mainframe Application Performance with CA Cross...
Best Practices for Optimizing Mainframe Application Performance with CA Cross...Best Practices for Optimizing Mainframe Application Performance with CA Cross...
Best Practices for Optimizing Mainframe Application Performance with CA Cross...
CA Technologies
 
Pulse 2014 APM Panel with Brian Fisher
Pulse 2014 APM Panel with Brian FisherPulse 2014 APM Panel with Brian Fisher
Pulse 2014 APM Panel with Brian Fisher
Prolifics
 
How Verizon Uses Automation to Accelerate SAP Projects
How Verizon Uses Automation to Accelerate SAP ProjectsHow Verizon Uses Automation to Accelerate SAP Projects
How Verizon Uses Automation to Accelerate SAP Projects
Worksoft
 
Managed Service Provider Deployment Options for SolarWinds Network & Server M...
Managed Service Provider Deployment Options for SolarWinds Network & Server M...Managed Service Provider Deployment Options for SolarWinds Network & Server M...
Managed Service Provider Deployment Options for SolarWinds Network & Server M...
SolarWinds
 
How to Leverage IBM Technology and Custom Portal Dashboards to Monitor the He...
How to Leverage IBM Technology and Custom Portal Dashboards to Monitor the He...How to Leverage IBM Technology and Custom Portal Dashboards to Monitor the He...
How to Leverage IBM Technology and Custom Portal Dashboards to Monitor the He...
Prolifics
 
Automating your ms world part 3 a brand new way to monitor with am ps web
Automating your ms world part 3 a brand new way to monitor with am ps   webAutomating your ms world part 3 a brand new way to monitor with am ps   web
Automating your ms world part 3 a brand new way to monitor with am ps web
Solarwinds N-able
 
SAP NetWeaver Application Server Add-On for Code Vulnerability Analysis Overview
SAP NetWeaver Application Server Add-On for Code Vulnerability Analysis OverviewSAP NetWeaver Application Server Add-On for Code Vulnerability Analysis Overview
SAP NetWeaver Application Server Add-On for Code Vulnerability Analysis Overview
SAP Technology
 

Similar to Unified Connectivity (UCON) for SAP NetWeaver Overview (20)

Pre-Con Education on APM 9.7
Pre-Con Education on APM 9.7Pre-Con Education on APM 9.7
Pre-Con Education on APM 9.7
 
Platform Encryption for ISVs (February 23, 2016)
Platform Encryption for ISVs (February 23, 2016)Platform Encryption for ISVs (February 23, 2016)
Platform Encryption for ISVs (February 23, 2016)
 
Testing a Microservices Architecture
Testing a Microservices ArchitectureTesting a Microservices Architecture
Testing a Microservices Architecture
 
Mainframe vug july 30 2015
Mainframe vug july 30 2015Mainframe vug july 30 2015
Mainframe vug july 30 2015
 
Penetration Testing SAP Systems
Penetration Testing SAP SystemsPenetration Testing SAP Systems
Penetration Testing SAP Systems
 
EAS-SEC: Framework for securing business applications
EAS-SEC: Framework for securing business applicationsEAS-SEC: Framework for securing business applications
EAS-SEC: Framework for securing business applications
 
Accelerate2022-Solving the SAP Security Gap through Application-aware Network...
Accelerate2022-Solving the SAP Security Gap through Application-aware Network...Accelerate2022-Solving the SAP Security Gap through Application-aware Network...
Accelerate2022-Solving the SAP Security Gap through Application-aware Network...
 
Hands-On Lab: Smart Instrumentation
Hands-On Lab: Smart InstrumentationHands-On Lab: Smart Instrumentation
Hands-On Lab: Smart Instrumentation
 
Consistent Regions in Specialized Toolkits for IBM InfoSphere Streams V4.0
Consistent Regions in Specialized Toolkits for IBM InfoSphere Streams V4.0Consistent Regions in Specialized Toolkits for IBM InfoSphere Streams V4.0
Consistent Regions in Specialized Toolkits for IBM InfoSphere Streams V4.0
 
Fiori and S/4 authorizations: What are the biggest challenges, and where do t...
Fiori and S/4 authorizations: What are the biggest challenges, and where do t...Fiori and S/4 authorizations: What are the biggest challenges, and where do t...
Fiori and S/4 authorizations: What are the biggest challenges, and where do t...
 
Mavenir: OpenRAN – What It Is and What It Means for Rural Operators
Mavenir: OpenRAN – What It Is and What It Means for Rural OperatorsMavenir: OpenRAN – What It Is and What It Means for Rural Operators
Mavenir: OpenRAN – What It Is and What It Means for Rural Operators
 
SAP Cloud Platform SLAs and ITSM Process
SAP Cloud Platform SLAs and ITSM ProcessSAP Cloud Platform SLAs and ITSM Process
SAP Cloud Platform SLAs and ITSM Process
 
Upgrading Em13c Collaborate 2016
Upgrading Em13c Collaborate 2016Upgrading Em13c Collaborate 2016
Upgrading Em13c Collaborate 2016
 
Best Practices for Optimizing Mainframe Application Performance with CA Cross...
Best Practices for Optimizing Mainframe Application Performance with CA Cross...Best Practices for Optimizing Mainframe Application Performance with CA Cross...
Best Practices for Optimizing Mainframe Application Performance with CA Cross...
 
Pulse 2014 APM Panel with Brian Fisher
Pulse 2014 APM Panel with Brian FisherPulse 2014 APM Panel with Brian Fisher
Pulse 2014 APM Panel with Brian Fisher
 
How Verizon Uses Automation to Accelerate SAP Projects
How Verizon Uses Automation to Accelerate SAP ProjectsHow Verizon Uses Automation to Accelerate SAP Projects
How Verizon Uses Automation to Accelerate SAP Projects
 
Managed Service Provider Deployment Options for SolarWinds Network & Server M...
Managed Service Provider Deployment Options for SolarWinds Network & Server M...Managed Service Provider Deployment Options for SolarWinds Network & Server M...
Managed Service Provider Deployment Options for SolarWinds Network & Server M...
 
How to Leverage IBM Technology and Custom Portal Dashboards to Monitor the He...
How to Leverage IBM Technology and Custom Portal Dashboards to Monitor the He...How to Leverage IBM Technology and Custom Portal Dashboards to Monitor the He...
How to Leverage IBM Technology and Custom Portal Dashboards to Monitor the He...
 
Automating your ms world part 3 a brand new way to monitor with am ps web
Automating your ms world part 3 a brand new way to monitor with am ps   webAutomating your ms world part 3 a brand new way to monitor with am ps   web
Automating your ms world part 3 a brand new way to monitor with am ps web
 
SAP NetWeaver Application Server Add-On for Code Vulnerability Analysis Overview
SAP NetWeaver Application Server Add-On for Code Vulnerability Analysis OverviewSAP NetWeaver Application Server Add-On for Code Vulnerability Analysis Overview
SAP NetWeaver Application Server Add-On for Code Vulnerability Analysis Overview
 

More from SAP Technology

SAP Integration Suite L1
SAP Integration Suite L1SAP Integration Suite L1
SAP Integration Suite L1
SAP Technology
 
Future-Proof Your Business Processes by Automating SAP S/4HANA processes with...
Future-Proof Your Business Processes by Automating SAP S/4HANA processes with...Future-Proof Your Business Processes by Automating SAP S/4HANA processes with...
Future-Proof Your Business Processes by Automating SAP S/4HANA processes with...
SAP Technology
 
7 Top Reasons to Automate Processes with SAP Intelligent Robotic Processes Au...
7 Top Reasons to Automate Processes with SAP Intelligent Robotic Processes Au...7 Top Reasons to Automate Processes with SAP Intelligent Robotic Processes Au...
7 Top Reasons to Automate Processes with SAP Intelligent Robotic Processes Au...
SAP Technology
 
Extend SAP S/4HANA to deliver real-time intelligent processes
Extend SAP S/4HANA to deliver real-time intelligent processesExtend SAP S/4HANA to deliver real-time intelligent processes
Extend SAP S/4HANA to deliver real-time intelligent processes
SAP Technology
 
Process optimization and automation for SAP S/4HANA with SAP’s Business Techn...
Process optimization and automation for SAP S/4HANA with SAP’s Business Techn...Process optimization and automation for SAP S/4HANA with SAP’s Business Techn...
Process optimization and automation for SAP S/4HANA with SAP’s Business Techn...
SAP Technology
 
Accelerate your journey to SAP S/4HANA with SAP’s Business Technology Platform
Accelerate your journey to SAP S/4HANA with SAP’s Business Technology PlatformAccelerate your journey to SAP S/4HANA with SAP’s Business Technology Platform
Accelerate your journey to SAP S/4HANA with SAP’s Business Technology Platform
SAP Technology
 
Accelerate Your Move to an Intelligent Enterprise with SAP Cloud Platform and...
Accelerate Your Move to an Intelligent Enterprise with SAP Cloud Platform and...Accelerate Your Move to an Intelligent Enterprise with SAP Cloud Platform and...
Accelerate Your Move to an Intelligent Enterprise with SAP Cloud Platform and...
SAP Technology
 
Transform your business with intelligent insights and SAP S/4HANA
Transform your business with intelligent insights and SAP S/4HANATransform your business with intelligent insights and SAP S/4HANA
Transform your business with intelligent insights and SAP S/4HANA
SAP Technology
 
SAP Cloud Platform for SAP S/4HANA: Accelerate your move to an Intelligent En...
SAP Cloud Platform for SAP S/4HANA: Accelerate your move to an Intelligent En...SAP Cloud Platform for SAP S/4HANA: Accelerate your move to an Intelligent En...
SAP Cloud Platform for SAP S/4HANA: Accelerate your move to an Intelligent En...
SAP Technology
 
Innovate collaborative applications with SAP Jam Collaboration & SAP Cloud Pl...
Innovate collaborative applications with SAP Jam Collaboration & SAP Cloud Pl...Innovate collaborative applications with SAP Jam Collaboration & SAP Cloud Pl...
Innovate collaborative applications with SAP Jam Collaboration & SAP Cloud Pl...
SAP Technology
 
The IoT Imperative for Consumer Products
The IoT Imperative for Consumer ProductsThe IoT Imperative for Consumer Products
The IoT Imperative for Consumer Products
SAP Technology
 
The IoT Imperative for Discrete Manufacturers - Automotive, Aerospace & Defen...
The IoT Imperative for Discrete Manufacturers - Automotive, Aerospace & Defen...The IoT Imperative for Discrete Manufacturers - Automotive, Aerospace & Defen...
The IoT Imperative for Discrete Manufacturers - Automotive, Aerospace & Defen...
SAP Technology
 
IoT is Enabling a New Era of Shareholder Value in Energy and Natural Resource...
IoT is Enabling a New Era of Shareholder Value in Energy and Natural Resource...IoT is Enabling a New Era of Shareholder Value in Energy and Natural Resource...
IoT is Enabling a New Era of Shareholder Value in Energy and Natural Resource...
SAP Technology
 
The IoT Imperative in Government and Healthcare
The IoT Imperative in Government and HealthcareThe IoT Imperative in Government and Healthcare
The IoT Imperative in Government and Healthcare
SAP Technology
 
SAP S/4HANA Finance and the Digital Core
SAP S/4HANA Finance and the Digital CoreSAP S/4HANA Finance and the Digital Core
SAP S/4HANA Finance and the Digital Core
SAP Technology
 
SAP Helps Reduce Silos Between Business and Spatial Data
SAP Helps Reduce Silos Between Business and Spatial DataSAP Helps Reduce Silos Between Business and Spatial Data
SAP Helps Reduce Silos Between Business and Spatial Data
SAP Technology
 
Why SAP HANA?
Why SAP HANA?Why SAP HANA?
Why SAP HANA?
SAP Technology
 
Spotlight on Financial Services with Calypso and SAP ASE
Spotlight on Financial Services with Calypso and SAP ASESpotlight on Financial Services with Calypso and SAP ASE
Spotlight on Financial Services with Calypso and SAP ASE
SAP Technology
 
SAP ASE 16 SP02 Performance Features
SAP ASE 16 SP02 Performance FeaturesSAP ASE 16 SP02 Performance Features
SAP ASE 16 SP02 Performance Features
SAP Technology
 
Spark Usage in Enterprise Business Operations
Spark Usage in Enterprise Business OperationsSpark Usage in Enterprise Business Operations
Spark Usage in Enterprise Business Operations
SAP Technology
 

More from SAP Technology (20)

SAP Integration Suite L1
SAP Integration Suite L1SAP Integration Suite L1
SAP Integration Suite L1
 
Future-Proof Your Business Processes by Automating SAP S/4HANA processes with...
Future-Proof Your Business Processes by Automating SAP S/4HANA processes with...Future-Proof Your Business Processes by Automating SAP S/4HANA processes with...
Future-Proof Your Business Processes by Automating SAP S/4HANA processes with...
 
7 Top Reasons to Automate Processes with SAP Intelligent Robotic Processes Au...
7 Top Reasons to Automate Processes with SAP Intelligent Robotic Processes Au...7 Top Reasons to Automate Processes with SAP Intelligent Robotic Processes Au...
7 Top Reasons to Automate Processes with SAP Intelligent Robotic Processes Au...
 
Extend SAP S/4HANA to deliver real-time intelligent processes
Extend SAP S/4HANA to deliver real-time intelligent processesExtend SAP S/4HANA to deliver real-time intelligent processes
Extend SAP S/4HANA to deliver real-time intelligent processes
 
Process optimization and automation for SAP S/4HANA with SAP’s Business Techn...
Process optimization and automation for SAP S/4HANA with SAP’s Business Techn...Process optimization and automation for SAP S/4HANA with SAP’s Business Techn...
Process optimization and automation for SAP S/4HANA with SAP’s Business Techn...
 
Accelerate your journey to SAP S/4HANA with SAP’s Business Technology Platform
Accelerate your journey to SAP S/4HANA with SAP’s Business Technology PlatformAccelerate your journey to SAP S/4HANA with SAP’s Business Technology Platform
Accelerate your journey to SAP S/4HANA with SAP’s Business Technology Platform
 
Accelerate Your Move to an Intelligent Enterprise with SAP Cloud Platform and...
Accelerate Your Move to an Intelligent Enterprise with SAP Cloud Platform and...Accelerate Your Move to an Intelligent Enterprise with SAP Cloud Platform and...
Accelerate Your Move to an Intelligent Enterprise with SAP Cloud Platform and...
 
Transform your business with intelligent insights and SAP S/4HANA
Transform your business with intelligent insights and SAP S/4HANATransform your business with intelligent insights and SAP S/4HANA
Transform your business with intelligent insights and SAP S/4HANA
 
SAP Cloud Platform for SAP S/4HANA: Accelerate your move to an Intelligent En...
SAP Cloud Platform for SAP S/4HANA: Accelerate your move to an Intelligent En...SAP Cloud Platform for SAP S/4HANA: Accelerate your move to an Intelligent En...
SAP Cloud Platform for SAP S/4HANA: Accelerate your move to an Intelligent En...
 
Innovate collaborative applications with SAP Jam Collaboration & SAP Cloud Pl...
Innovate collaborative applications with SAP Jam Collaboration & SAP Cloud Pl...Innovate collaborative applications with SAP Jam Collaboration & SAP Cloud Pl...
Innovate collaborative applications with SAP Jam Collaboration & SAP Cloud Pl...
 
The IoT Imperative for Consumer Products
The IoT Imperative for Consumer ProductsThe IoT Imperative for Consumer Products
The IoT Imperative for Consumer Products
 
The IoT Imperative for Discrete Manufacturers - Automotive, Aerospace & Defen...
The IoT Imperative for Discrete Manufacturers - Automotive, Aerospace & Defen...The IoT Imperative for Discrete Manufacturers - Automotive, Aerospace & Defen...
The IoT Imperative for Discrete Manufacturers - Automotive, Aerospace & Defen...
 
IoT is Enabling a New Era of Shareholder Value in Energy and Natural Resource...
IoT is Enabling a New Era of Shareholder Value in Energy and Natural Resource...IoT is Enabling a New Era of Shareholder Value in Energy and Natural Resource...
IoT is Enabling a New Era of Shareholder Value in Energy and Natural Resource...
 
The IoT Imperative in Government and Healthcare
The IoT Imperative in Government and HealthcareThe IoT Imperative in Government and Healthcare
The IoT Imperative in Government and Healthcare
 
SAP S/4HANA Finance and the Digital Core
SAP S/4HANA Finance and the Digital CoreSAP S/4HANA Finance and the Digital Core
SAP S/4HANA Finance and the Digital Core
 
SAP Helps Reduce Silos Between Business and Spatial Data
SAP Helps Reduce Silos Between Business and Spatial DataSAP Helps Reduce Silos Between Business and Spatial Data
SAP Helps Reduce Silos Between Business and Spatial Data
 
Why SAP HANA?
Why SAP HANA?Why SAP HANA?
Why SAP HANA?
 
Spotlight on Financial Services with Calypso and SAP ASE
Spotlight on Financial Services with Calypso and SAP ASESpotlight on Financial Services with Calypso and SAP ASE
Spotlight on Financial Services with Calypso and SAP ASE
 
SAP ASE 16 SP02 Performance Features
SAP ASE 16 SP02 Performance FeaturesSAP ASE 16 SP02 Performance Features
SAP ASE 16 SP02 Performance Features
 
Spark Usage in Enterprise Business Operations
Spark Usage in Enterprise Business OperationsSpark Usage in Enterprise Business Operations
Spark Usage in Enterprise Business Operations
 

Recently uploaded

Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota
Fwdays
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
MichaelKnudsen27
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
Chart Kalyan
 
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsConnector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
DianaGray10
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
Y-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PPY-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PP
c5vrf27qcz
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
Jason Yip
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
AstuteBusiness
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
Edge AI and Vision Alliance
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
saastr
 
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
saastr
 
The Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptxThe Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptx
operationspcvita
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Wask
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 

Recently uploaded (20)

Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
 
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsConnector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
Y-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PPY-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PP
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
 
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
 
The Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptxThe Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptx
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 

Unified Connectivity (UCON) for SAP NetWeaver Overview

  • 1. Unified Connectivity (UCON) Overview July 2014 Public
  • 2. Disclaimer This presentation outlines our general product direction and should not be relied on in making a purchase decision. This presentation is not subject to your license agreement or any other agreement with SAP. SAP has no obligation to pursue any course of business outlined in this presentation or to develop or release any functionality mentioned in this presentation. This presentation and SAP's strategy and possible future developments are subject to change and may be changed by SAP at any time for any reason without notice. This document is provided without a warranty of any kind, either express or implied, including but not limited to, the implied warranties of merchantability, fitness for a particular purpose, or non-infringement. SAP assumes no responsibility for errors or omissions in this document, except if such damages were caused by SAP intentionally or grossly negligent. © 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 2
  • 3. Agenda - UCON RFC Security Basic Scenario Motivation and Scope Basic Concepts Coverage of New RFMs How to Cope With the Restrictions of Productive Systems Summary © 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 3
  • 4. UCON RFC Security Basic Scenario Motivation and Scope
  • 5. The Scope of UCON RFC Basic Connectivity C High-performing, for local high load scenarios, across all ABAP Releases, close integration into ABAP RFC-Based Connectivity © 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 5
  • 6. UCON - A Simple Approach to Make RFC More Secure Reduce the Overall Attack Surface of Your Remote-Enabled Function Modules. Enhance RFC security by blocking the access to a large number of RFMs ! Facts: y Most SAP ERP customers run just a limited number of the business scenarios for which they need to expose some RFMs y A lot of RFMs are only used to parallelize within a system. Solution y Find out which RFMs need to be exposed for the scenarios of a customer. y Block the access to all other RFMs. © 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 6
  • 7. The Basic Strategy of UCON to Solve These Problems Reduce the number of RFMs exposed to the outside world. Expose only and exactly those RFMs a customer needs to run their business scenarios. 38000 RFMs in SAP ERP (incl. SAP NetWeaver) A typical SAP customer only needs to expose a few hundred RFMs for their business scenarios © 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 7
  • 8. UCON RFC Security Basic Scenario Basic Concepts
  • 9. The UCON Way to Security: Expose Only Those Function Modules You Need to the Outside World … RF M1 RF M2 RF M3 RF M4 RF M5 RF M6 RF M7 RF M8 RF M9 RF M RF M. 10 11 Default Communication Assembly (CA) © 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 9
  • 10. UCON Checks Do not Interfere with Calls Within the Same Client and System RF M3 RF M5 RF M7 SAP Business Suite Blocked for access from outside – Open for use in parallel RFC inside the same client in the … RF M1 RF M. … same system © 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 10
  • 11. UCON - An Additional Role/User-Independent Layer of Security Checks User trying to access a RFM no No Access RFM in CA? yes no User has authorization? User has authorization for the relevant CA? No Access yes Access to RFM © 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 11
  • 12. UCON Setup and Configuration It is simple to set up and configure Unified Connectivity (UCON): 1. Set the UCON profile parameter UCON/RFC/ACTIVE to 1 to enable UCON runtime checks for RFMs in the final phase. 2. Run the UCON setup to generate a default communication assembly (CA) and other required entities. 3. Choose a suitable duration of the logging and evaluation phase. 4. Schedule the batch job SAP_UCON_MANAGEMENT that selects and persists the RFC statistic records required by the UCON phase tool on the database. © 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 12
  • 13. UCON RFC Security Easy Customer Adoption in Three Steps Logging of RFMs called from outside Evaluation/ Simulation Runtime checks active © 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 13
  • 14. UCON RFC Security Easy Customer Adoption in Three Steps Logging of RFMs called from outside Runtime check Runtime Checks active Evaluation/ Simulation active © 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 14
  • 15. Phase 1 Logging of RFC Connectivity Data Tool support to use solid information instead of unreliable data • Use a dedicated tool set to collect the information you need Identify the RFMs you need to expose to run your business scenarios • Collect aggregated statistic data on which RFMs are called in your system from outside • Over a time period you can choose At the end of phase 1, choose the RFMs you need and assign them to the Default CA: • Based on the statistical records, you decide which RFMs should be accessed from outside and assign them to the CA © 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 15
  • 16. UCON RFC Security Easy Customer Adoption in Three Steps Logging of RFMs Logging of RFMs called from from outside outside Evaluation/ simulation Runtime check Runtime checks active Simulation Checks active © 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 16
  • 17. Phase 2 Evaluation of the Data Logged UCON should not interfere with productive customer scenarios: • Use the evaluation phase (phase 2) to simulate UCON runtime checks • Check completeness of RFMs you need to expose • Put required RFMs into Default CA Customizable duration of evaluation phase: • Duration of evaluation phase depends on in-house experience and knowledge Check whether you have protected the right RFMs and make necessary corrections © 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 17
  • 18. UCON RFC Security Easy Customer Adoption in Three Steps Logging of RFMs Logging of RFMs called from from outside outside Evaluation/ Simulation simulation Runtime check Runtime checks active Checks active © 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 18
  • 19. Phase 3 The RFMs in the System Are Protected by UCON UCON runtime checks are now active: • Only RFMs in the default CA are accessible from outside • RFM that are not in the Default CA are now protected against any outside access Less than 5% of all RFMs need to be exposed in a typical customer system: • Out of a total of 38,000 RFMs in an SAP ERP system, only a few hundred are required and exposed for productive customer connectivity Massive reduction of RFC attack surface for the average customer system © 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 19
  • 20. Prerequisites for the Different Security Layers Access to RFMs UCON runtime checks S_RFC checks Access to RFMs © 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 20
  • 21. Efforts Required for the Different Security Layers Access to RFMs UCON runtime checks S_RFC checks Access to RFMs © 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 21
  • 22. UCON Protection After the Initial UCON Security Classification Check-Active Phase Blocked RFMs from initial UCON set-up 100 ++ Default CA 37,000++ SAP Business Suite Blocked RFMs/ UCON-protected RFMs from other, new transports or installations © 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 22
  • 23. UCON RFC Security Basic Scenario Coverage of New Remote-Enabled Function Modules
  • 24. UCON Protection After Initial Security Classification Check-active Phase Development Protected/ blocked RFMs Default Communication Assembly Exposed RFMs © 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 24
  • 25. New RFMs Arrive at a UCON-Protected System Check-active phase Development Over time: New RFMs in transports, SPs, EhPs … © 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 25
  • 26. New RFMs on Their Way to UCON Protection – Logging Phase Logging phase Evaluation phase Access allowed Access blocked UCON protection Check-active phase Access allowed New RFMs are automatically assigned to the logging phase © 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 26
  • 27. New RFMs on Their Way to UCON Protection – Evaluation Phase Logging phase Access allowed Access blocked UCON protection Evaluation phase Check-active phase Access allowed © 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 27
  • 28. New RFMs Have Achieved UCON Protection – Check-Active Phase Logging phase Evaluation phase Access blocked UCON protection Check-active phase Access allowed © 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 28
  • 29. The Ever-Growing Scope of UCON Protection Blocked RFMs from initial UCON set-up Default CA SAP Business Suite Blocked RFMs from other, new transports or installations © 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 29
  • 30. UCON RFC Security Basic Scenario How to Cope With the Restrictions of Productive Systems
  • 31. UCON and the Restrictions in a Productive System Challenges PROD Assignment of relevant RFMs to default CA and UCON UCON Phase Tool phases Collection of RFC call statistics and UCON protection Authorizations and system change options in Productive Systems are not sufficient for UCON Operations © 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 31
  • 32. UCON and the Restrictions in a Productive System Solution DEV PROD UCON Phase Tool Assignment of relevant RFMs to default CA and UCON UCON Phase Tool phases Collection of RFC call statistics and UCON protection Delegate UCON operations to DEV Slide 32 © 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 32
  • 33. UCON and the Restrictions in a Productive System How to Delegate UCON Operations to DEV - Step 1 DEV PROD UCON Phase Tool Import RFC call statistics from PROD to DEV UCON Phase Tool RFC call statistics .csv 1 © 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 33
  • 34. UCON and the Restrictions in a Productive System How to Delegate UCON Operations to DEV - Step 2 DEV PROD UCON Phase Tool Import RFC call statistics from PROD to DEV UCON Phase Tool RFC call statistics .csv Assign relevant RFMs to default CA and to next phase 1 2 © 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 34
  • 35. UCON and the Restrictions in a Productive System How to Delegate UCON Operations to DEV - Step 3 DEV PROD UCON Phase Tool UCON Phase Tool Import RFC call statistics from PROD to DEV UCON Phase Tool RFC call Assign relevant RFMs to default CA and to next phase UCON Phase Tool statistics .csv Phase and CA assignment of RFMs R3Trans 1 2 3 © 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 35
  • 36. UCON and the Restrictions in a Productive System How to Delegate UCON Operations to DEV in a Nutshell DEV PROD UCON Phase Tool Assignment of relevant RFMs to default CA and UCON UCON Phase Tool RFC call statistics phases Phase and CA assignment of RFMs Collection of RFC call statistics and UCON protection © 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 36
  • 37. UCON RFC Security Basic Scenario Summary
  • 38. UCON - Summary It is simple to set up and configure Unified Connectivity (UCON) • The UCON framework offers a simple, straightforward approach for enhancing the security of your RFCs. It allows you to minimize the number of RFMs on ABAP-based servers exposed to other clients and systems, reducing the available attack surface in your RFC communications. • The UCON phase tool guides and supports the administrator in the three-step setup and the three-phased process. • UCON covers new function modules entering the system via Support Packages, Enhancement Packages, transports, or new developments. • UCON is fully enabled for life-cycle management to ensure consistent RFC security across your system landscape. © 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 38
  • 39. Get More Information Community Network Get more information, videos and updates Unified Connectivity (UCON) http://scn.sap.com/docs/DOC-53844 SAP NetWeaver Security Community http://scn.sap.com/community/security © 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 39
  • 40. © 2014 SAP SE or an SAP affiliate company. All rights reserved. No part of this publication may be reproduced or transmitted in any form or for any purpose without the express permission of SAP SE or an SAP affiliate company. SAP and other SAP products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of SAP SE (or an SAP affiliate company) in Germany and other countries. Please see http://global12.sap.com/corporate-en/legal/copyright/index.epx for additional trademark information and notices. Some software products marketed by SAP SE and its distributors contain proprietary software components of other software vendors. National product specifications may vary. These materials are provided by SAP SE or an SAP affiliate company for informational purposes only, without representation or warranty of any kind, and SAP SE or its affiliated companies shall not be liable for errors or omissions with respect to the materials. The only warranties for SAP SE or SAP affiliate company products and services are those that are set forth in the express warranty statements accompanying such products and services, if any. Nothing herein should be construed as constituting an additional warranty. In particular, SAP SE or its affiliated companies have no obligation to pursue any course of business outlined in this document or any related presentation, or to develop or release any functionality mentioned therein. This document, or any related presentation, and SAP SE’s or its affiliated companies’ strategy and possible future developments, products, and/or platform directions and functionality are all subject to change and may be changed by SAP SE or its affiliated companies at any time for any reason without notice. The information in this document is not a commitment, promise, or legal obligation to deliver any material, code, or functionality. All forward-looking statements are subject to various risks and uncertainties that could cause actual results to differ materially from expectations. Readers are cautioned not to place undue reliance on these forward-looking statements, which speak only as of their dates, and they should not be relied upon in making purchasing decisions. © 2014 SAP SE or an SAP affiliate company. All rights reserved. Public 40