AWS IAM Identity Center (successor to AWS SSO) Integration Guide for SAP Fiori ABAP
Introduction
This document helps you configure IAM Identity Center to facilitate single sign-on (SSO) for SAP Fiori ABAP using SAML.
Topics
Prerequisites
You’ll need the following to set up SSO access to SAP Fiori ABAP:
-
Access to the IAM Identity Center console with permissions to manage applications.
-
An SAP Fiori ABAP implementation along with an administrator account to configure SAML SSO.
-
SAP Fiori ABAP supports only Service Provider (SP) initiated flow.
Setup instructions
- On the Configure page, in the Details section, fill in the Display name and the Description(optional) of the application.
Note
We suggest that you choose a unique display name if you plan to have more than one of the same application.
Note
The instructions shared in this example is setting up in SAP Fiori ABAP.
-
Login to your SAP ABAP as an administrator.
-
In the command box, go to transaction rz10 by typing in rz10. Then open the DEFAULT profile.
-
Select Extended maintenance, then choose Change.
-
Add the following parameters :
Parameter Name | Parameter Value |
---|---|
login/create_sso2_ticket | 2 |
login/accept_sso2_ticket | 1 |
login/ticketcache_entries_max | 1000 |
login/ticketcache_off | 0 |
login/ticket_only_by_https | 1 |
icf/set_HTTPonly_flag_on_cookies | 0 |
icf/user_recheck | 1 |
http/security_session_timeout | 1800 |
http/security_context_cache_size | 2500 |
rdisp/plugin_auto_logout | 1800 |
rdisp/autothtime | 60 |
-
In the command box, go to transaction smicm by typing in smicm. Ensure the HTTPS protocol is in an active state.
-
In the command box, go to transaction sicf by typing in sicf. Activate the two required services by, right clicking on SAML2 and cdc_ext_service then choose Activate Service.
-
Next, In the command box, go to transaction SAML2 by typing in SAML2.
-
Login to the SAML2 page with your administrator account.
-
Select Enable SAML 2.0 Support, then choose Create SAML 2.0 Local Provider.
-
Enter the Provider Name, example AWSSSO, then choose Next.
-
For the Miscellaneous, choose Next.
-
For the Service Provider Settings, choose Finish.
-
Download the metadata, by clicking on Metadata, then choose Download Metadata.
-
Download the IAM Identity Center Metadata file from the URL below:
-
Click on the Trusted Providers tab, choose Add, then upload IAM Identity Center metadata file downloaded in previous step. Choose Next.
-
Add Alias example AWSSSO, then choose Next, then Next again.
-
For Single Sign-On Endpoints choose HTTP-POST, choose Next.
-
For Single Log-Out Endpoints choose HTTP-Redirect, choose Next.
-
For Artifact endpoints, choose Next, then choose Finish.
-
Choose the Trusted Providers tab, click Edit, add Unspecified, then choose Ok.
-
Then under Details of NameID Format "Unspecified", Next to User ID Mapping Mode, choose Email. Then Save and Enable.
-
Go back to the IAM Identity Center console page where you are configuring the Application.
-
Under Application Properties, enter the SAP Fiori ABAP URL in the Application start URL field:
Field | Value |
---|---|
Application start URL | SAP Fiori ABAP URL |
-
Under Application metadata, choose Browse and select the Metadata downloaded in step 14.
-
Choose Save Changes.
-
Assign a user to the application in IAM Identity Center.
-
Login to SAP ABAP as an administrator, in the command box, go to transaction su01.
-
Next, create a new or edit an existing user. In the properties of the user, fill in the E-mail Address field. Ensure the E-mail Address entered matches the email address of the user assigned to the SAP application in IAM Identity Center.
Verification
Use the following sections to verify the SSO integration.
Note
Ensure that the user performing the verification is logged out of both IAM Identity Center and the application before performing the steps in each section.
Verifying SSO from IAM Identity Center
-
Access the AWS access portal using the credentials of a user assigned to the SAP Fiori ABAP application.
-
In the list of applications, choose SAP Fiori ABAP to initiate a login to SAP Fiori ABAP.
-
Click on Continue.
-
If login was successful you will be signed-in to the SAP Fiori ABAP account.
Troubleshooting
If sign in was not successful, please see the troubleshooting steps.
Troubleshooting
Error | Issue | Solution |
---|---|---|
Other | When IAM Identity Center creates a SAML Assertion for a user, it uses the value of the 'email' field (if they are present) from the connected directory to populate the 'Email' in the SAML assertion. Many service providers expect these attributes to contain the user’s email address. By default your directory is configured to send 'windowsUPN' in both fields. | Your directory may be configured to contain the users email in the 'Email' attribute instead. If so, you may need to change this in your Connected directory settings. |
For general troubleshooting problems, please refer to Troubleshooting Guide.
User Provisioning Types
There are two user provisioning you need to aware of:
-
Preprovisioned users
Preprovisioned users, means users must already exist in the downstream SaaS application. For instance, you may need to create SaaS users with the same subject as the AD users.
-
JIT users
JIT (or Just-In-Time) users, means users do not necessarily exist in the downstream SaaS application, and will be provisioned/created/registered the first time the user federates. You may need to enable JIT option in your SaaS application for the AD domain.