Skip to content

Latest commit

 

History

History
executable file
·
128 lines (75 loc) · 5.86 KB

File metadata and controls

executable file
·
128 lines (75 loc) · 5.86 KB

Configure Custom Identity Provider

Introduction

In this section, we would configure a custom Identity Provider which has the users/employees to login to the SAP Business Technology Platform subaccount. Depending on your global account, you might see the default identity provider, which is configured automatically. This cannot be deleted, it can only be enabled or disabled.

Persona: Cloud Administrator

Step-by-Step

An SAML service provider interacts with an SAML 2.0 identity provider to authenticate users signing in by means of a single sign-on (SSO) mechanism. In this scenario, the SAP UAA service (User Account and Authentication Service) acts as a service provider representing a single subaccount. To establish trust between an identity provider and a subaccount, you must provide the SAML details for web-based authentication in the identity provider itself. Administrators must configure trust on both sides, in the subaccount of the service provider and in the SAML identity provider. Here we assume that the customer has purchased a tenant for SAP Cloud Identity Authentication service.

There are two ways to establish a trust between the IDP and your SAP BTP account:

  • Recommended option: Automatic trust using Open ID Connect (OIDC) --> see this guide.

  • Setup manual trust with SAML 2.0 --> see the following steps:

Register SAP BTP subaccount in the Custom SAML 2.0 Identity Provider

You can manage trust configurations for a global account only if you have created the global account or if you are an SCP Administrator of the account and you are an Administrator in your company's Identity and Authentication Tenant(SAP IAS).

  1. Select your Subaccount.

  2. Choose Security > Trust Configuration from left pane.

  3. Choose SAML Metadata button and download the XML file.

    Download XML

  4. Now, open your company's Identity and Authentication Tenant (SAP IAS) and login to the same.

  5. Select Application & Resources > Applications from left pane.

  6. Choose Create.

    Add App

  7. Enter the Display Name for example ExtendUI_IDP, choose SAP BTP solution as Type and the SAML 2.0 protocol. Select Create.

    Save App

  8. In the Trust section choose SAML 2.0 Configuration

    Configure SAML

  9. Choose Browse to upload the Metadata file of your SAP BTP subaccount. Choose the metadata xml file downloaded from previous step number 3.

    Save SAML

  10. Choose Save button.

  11. Choose Subject Name Identifier

    Subject NameID

  12. Choose basic attribute as E-mail and Choose Save button.

    Save Subject NameID

  13. Select Attributes. In the Self-defined Attributes section, select Add and add a new entry Groups with the source Identity Directory and value Groups. Save your settings.

    Assertion Attributes

  14. In the Home view select User Groups

    User Groups

  15. Create an Extension Developer group.

    • Select Create
    • Set Name = ExtensionDeveloper
    • Set Display name = ExtensionDeveloper
    • Enter a description
    • Press Create

    User Groups

  16. Create an Extension Administrator group. Same steps as before.

    • Select Create
    • Set Name = ExtensionAdministrator
    • Set Display name = ExtensionAdministrator
    • Enter a description
    • Press Create
  17. Map the group to a user which should have the UX extension developer role.

    • Choose User Management
    • Select the user you want to assign the developer role
    • Choose User Groups
    • Select Assign Groups

    User Groups

  18. Check the ExtensionDeveloper group and choose Save.

    User Groups

    Repeat the last 2 steps for all user that needs the extension developer privilege.

  19. Repeat steps 18 and 19 by mapping the ExtensionAdministrator group to all users that should have the UX extension administrator role.

Establish Trust with a custom SAML 2.0 Identity Provider in your Subaccount

You have your company's SAML 2.0 identity provider, for example, SAP Cloud Identity Authentication service. This is where your business users are stored. You must establish a trust relationship with your custom SAML 2.0 identity provider in your subaccount in SAP BTP. The following procedure describes how you establish trust in the SAP Cloud Identity Authentication service.

  1. Choose Application & Resources > Tenant settings.

  2. Select SAML 2.0 Configuration.

    Download SAML

  3. Choose Download Metadata File button.

    Download SAML1

  4. Now, login again to your CF subaccount and choose Security > Trust Configuration.

  5. Choose New Trust Configuration button.

    Configure Trust

  6. Choose Upload to upload metadata file. Choose the Tenant metadata file downloaded from previous step.

  7. Enter Name. For eg., ExtendUI-Tenant

    Configure Trust

  8. Choose Save.

  9. Now assign the created Identity Provider groups with the role collections of your subaccount in SAP BTP by following the steps Map IDP Groups with Role Collection.

References

Check the official SAP Help documentation.