1.Business processes executed using XI have to be done
in a secure manner. XML messages which contain
confidential business data need to be transported over
a secure connection
2.Security requirements also apply to communicating XI
components- securing information like user names and
passwords.
3.The messaging system has to be sited securely in the
network environment.
As the central infrastructure for exchanging business documents, XI has to make
sure that business processes can be executed in a secure manner. Particular
security requirements have to be considered if business partners communicate
over the Internet.
XML messages may contain confidential business data. In order to protect them
against eavesdropping and unauthorized access, the communication lines as well
as the storage locations of XML messages need to be made secure.
In addition to the business data exchanged using XI, the various components of XI
need to communicate with each other on a technical level in order to keep the
infrastructure running. Security requirements apply to these technical
communications as well, because confidential information such as user names
and passwords may have to be sent or stored or both.
The XI must be sited in a secure location, and protected properly on the network.
Sensitive information is stored on the XI and it must not be accessible to
unauthorized access.
Security is everybody’s concern – not just the Systems Administrator. Every IT
professional who comes in contact with the SAP Exchange Infrastructure has a
responsibility to understand the security mechanisms built into the system, and to
insure that they are implemented completely and correctly
All components of XI 3.0 that run on the SAP
Web AS use the underlying infrastructure
provided by the Web AS for the following:
User management
Administration
Authorizations
Authentication
(The only exception is for the J2SE adapters)
For all components of the SAP Exchange Infrastructure that run on the SAP Web
AS, the solutions of the underlying SAP Web AS are used for user management,
administration, authorizations and authentication.
An exception to this rule are the J2SE-based adapters which lack the SAP Web
AS infrastructure
User Administration And Authentication
User Store:
Standard: Users are maintained in the ABAP user store
Can also be integrated with LDAP based user administration
Certificate Store:
XI and RNIF protocols support message level security based
on digital signature
RNIF protocol also supports encryption
The required certificates to be used need to be entered into
the key store of the J2EE engine
In the Integration Directory these certificates are referred by
the name of the key store view and the certificate name
Recommended to store CA certificates in the TrustedCAs view
Each XI component that resides on an SAP Web AS refers to the user
management of the ABAP part of this SAP Web AS. XI Java applications running
on an SAP Web AS authenticate against the users maintained in the ABAP part. If
required, it can be integrated with an LDAP-based user administration. This
applies to both service users and dialog users.
The XI and RNIF protocols support message level security by digital signature and
encryption. Message-level security processing is generally done in the Java part
of the SAP Web Application Server (AS). Therefore, the certificates as well as the
CA certificates to be used need to be entered into the key store of the J2EE
Engine that executes the security handling at runtime. In the Integration Builder:
Configuration, these certificates can be referred to by stating the name of the key
store view and the name of the entry for that certificate.
SAP recommends that you store CA certificates in the TrustedCAs view. This
allows you to equip service users who send messages with less authorization than
would be necessary otherwise.
Users
With respect to authentication and authorization, we distinguish two
major scenarios:
During design and configuration, dialog users communicate
through the Integration Builder with XI.
At runtime the actors are computer systems rather than humans!
Each system is represented by a dedicated service user. All users are SAP
standard users.
Dialog Users
>>Dialog users represent human users that log
on through the various UIs of the Integration
Builder
>>Dialog users are generally maintained in the
ABAP part of the SAP Web AS
>>The roles for the different dialog users are
predefined and shipped with the installation
Dialog users represent human users (as opposed to service users) that log on
through the various UIs of the Integration Builder. As with service users, dialog
users are generally maintained in the ABAP part of the SAP Web AS.
Service Users:
>Service users provide dialog free access to XI components
>Service users have the SAP user roles on the ABAP part of the Web
Application Server
>They are made available on the J2EE part as user groups
>>Service users have the required authorizations to access the required
services on the addressed XI components
>>Service users are created during installation
>>Names and passwords can be assigned
during installation
Within the Exchange Infrastructure the roles provide you with all the authorizations
required by the respective component for dialog-free access to the other
components of the Exchange Infrastructure. They are therefore also available on
the J2EE side. For accessing the J2EE components, corresponding authorization
assignments (security roles) on the J2EE server are required. These are
automatically performed when the J2EE components are deployed.
For the installation, the password XIPASS is specified for these users. Do not
change this password. If you make changes, you have to make them in
transaction SU01 first and then again in the exchange profile.
For all J2EE applications (in other words, the Integration Repository, Integration
Directory, Runtime Workbench, System Landscape Directory, and sender Java
applications), password changes to any of the above users will not take effect until
the system is restarted.
For sender ABAP applications, any password changes must also be made in the
involved HTTP destinations.
Service Users During Design And Configuration:
XIREPUSER – Access the XI Repository for Design
XIDIRUSER – Access the XI Directory for Configuration
XIISUSER - Get Cache-updates from XI Directory to RuntimeCache
XILDUSER - Get Business System Name from System Landscape Directory
All these service users are created during the XI installation
All these service users must be available on the xi server client during DESIGN
AND CONFIGURATION (TA: SU01)
All these service users and passwords are stored in the exchange profile, too.
(http://
XI Service Users In Use During Runtime:
XILDUSER – Get Business System Name from System Landscape Directory
XIRWBUSER – Get monitoring information to Runtime Workbench
XIISUSER – Get Cache-updates from XI Directory to Runtime Cache
XIAPPLUSER – Access XI Engines for message processing (SAP template)
XIAFUSER – Access Adapter Framework
XI Server:
All these service users are created during the XI installation
All these service users must be available on the xi server client during runtime
(TA: SU01)
All these service users and passwords are stored in the exchange profile, too.
(http://
For application systems based on Web AS version 6.20 or higher with a local XI
engine, the following users must be maintained:
XILDUSER must be maintained in transaction SLDAPICUST to connect to System Landscape
Directory to read own Business system name
XIAPPLUSER (or equivalent with correct role) must be maintained to receive messages.
Default Service Users In XI Systems And Their Roles:
Created automatically at installation time.
Referenced in the Exchange Profile.
In the future it will be possible to create custom UserIDs at
installation time
User Maintenance:
Users and roles are maintained via the standard Web AS
ABAP user management (SU01)
After a short delay, the updated users are automatically
replicated to the J2EE engine
J2EE User maintenance
in Visual Administrator tool Security provider
service
UME (User Management Engine) available as part of
J2EE engine
For example, if you want a user MILLER to be entitled to define interfaces, you
have to create this user on the ABAP part of the SAP Web Application Server (AS)
on which the Integration Repository is deployed, and assign the role
SAP_XI_DEVELOPER to this user. After logging on to the Integration Builder
(which is implemented in Java), the J2EE part of the SAP Web AS authenticates
user MILLER against the ABAP part.
Users for the Java stack can be maintained either in the J2EE Visual
Administration tool (maintain the security provider service) or in the User
Management Engine (UME), an integral part of the SAP Web Application Server
(J2EE engine).