Skip Headers
Oracle® Access Manager Integration Guide
10g (10.1.4.0.1)

Part Number B25347-01
Go to Documentation Home
Home
Go to Book List
Book List
Go to Table of Contents
Contents
Go to Index
Index
Go to Master Index
Master Index
Go to Feedback page
Contact Us

Go to previous page
Previous
Go to next page
Next
View PDF

12 Integrating mySAP Applications

This chapter describes the integration of Oracle Access Manager with mySAP.com e-business platform.

This chapter covers the following topics:

12.1 About Integrating Oracle Access Manager with mySAP

Integrating Oracle Access Manager with mySAP enables the use of Oracle Access Manager functionality across all mySAP Web-based applications and other Oracle Access Manager-protected enterprise resources and applications.

Integrating Oracle Access Manager with mySAP provides the following Oracle Access Manager features to mySAP implementations:

12.2 SAP Components

The integration of Access System single sign-on with mySAP involves the SAP components described in the following sections.

12.2.1 SAP Internet Transaction Server

SAP Internet Transaction Server (ITS) is a mySAP.com component that provides a Web front-end and allows access to data from the SAP R/3 applications. SAP R/3 provides Enterprise Resource Planning (ERP) functionality for the mySAP.com e-business platform.

SAP ITS consists of two major components: AGate and WGate.

The AGate is responsible for session management including mapping of SAP R/3 screens or function modules to HTML. AGate manages Web sessions including timeout handling and SAP R/3 connection pooling. Based on SAP R/3 information, it generates HTML documents that are forwarded to WGate.

The WGate passes requests to AGate and receives HTML pages back from AGate. The WGate supports various HTTP server interfaces such as Apache, Netscape Server Application Programming Interface (NSAPI), and Internet Server Application Programming Interface (ISAPI).

12.2.2 Pluggable Authentication Service

The Pluggable Authentication Service (PAS) is a part of the Internet Transaction Server that is used for single sign-on between SAP and third-party security providers. PAS enables Oracle Access Manager to authenticate users who attempt to access SAP.com resources.

12.2.3 Integration Architecture

The following figure illustrates the integration between Oracle Access Manager and SAP ITS and the SAP Enterprise Portal. The process overview that follows describes a scenario where the user first authenticates to a resource that is protected by the Access System. The user is then granted access to an SAP resource.

Process overview of the SAP integration.

Process overview: Integration with SAP ITS

  1. A user attempts to access content or an application on a company's server.

  2. The WebGate intercepts the request and queries the Access Server for the security policy that determines if the resource is protected.

    The security policy consists of an authentication scheme, authorization rules, and allowed operations. Based on the authentication and authorization success or failure, specified actions are performed.

  3. If the resource is protected, the WebGate prompts the user for authentication credentials.

    The credentials that the WebGate requests depend on the authentication scheme configured in the Access System, for example, Basic over LDAP or Form-based authentication.

  4. If the credentials are validated, the Access System authenticates the user and sets an encrypted ObSSOCookie in the user's browser.

  5. After authenticating, the authorization rules defined in the Access System are applied based on the security policy.

    Specific actions are performed based on the authorization rules. If the user is authorized, access to the requested content is allowed.

    If the user is not authenticated or authorized, he or she is denied access and redirected to another URL, as determined by the administrator.

  6. The user enters the URL for the Oracle Access Manager-specific ITS PAS service.

    For integration with mySAP, an ITS-specific HTTP header variable is created and filled with unique Oracle Access Manager-SAP R/3-mapped user ID information.

  7. The Oracle Access Manager-specific ITS service uses the sapextauth module to extract the HTTP header variable and identify the Oracle Access Manager-SAP R/3-mapped user ID.

  8. Optionally, the SAP Workplace Server maps the external Oracle Access Manager user ID to the SAP System ID.

    It is recommended that Oracle Access Manager extract the correct SAP user ID from the LDAP directory that is used for the initial authenticated user. In this case, no lockup table is required in the SAP system.

  9. If mapping is successful, the AccessGate issue the user an SAP Logon Ticket and redirects the user to either the Workplace service or any other ITS service. Future ITS URLs will use issued SAP Logon Tickets for passing logon information to the SAP R/3 system.

12.3 Supported Versions and Platforms

Oracle Access Manager supports the following versions of SAP Server and the SAP Enterprise Portal:

SAP SAP Portal
SAP R3 v4.6DSAP ITS v6.10 and v6.20 v 6.0 SP2

12.4 Preparing to Integrate Oracle Access Manager with SAP

Before you can integrate Oracle Access Manager with SAP, you must complete the following tasks.

To prepare for the integration with SAP

  1. Install the following SAP applications:

    • SAP ITS v 6.10 with Patch Level 11, Compilation 4 with Patch Level 340 or later (refer to SAPNet Note: 494984).

    • An SAP ITS component configured to talk to the R3 System through Secure NetWork Communications (SNC).

      SNC is required to generate SSO2 security tickets.

    • sapntauth library (refer to SAPNet Note: 493107).

      Refer to SAP documentation for information on installing SAP applications and components.

  2. Install the following Oracle Access Manager components:

    • Identity Server

    • WebPass

    • Access Server

    • Policy Manager

    • WebGate

    See the Oracle Access Manager Installation Guide for information on installation.

  3. For each Web server instance that has ITS installed, install and configure a WebGate.

  4. Ensure that mySAP and Oracle Access Manager components are able to communicate with each other through TCP/IP.

  5. Ensure that the servers on which SAP ITS and Oracle Access Manager components are installed have a fully qualified domain name.

    For example, integrate-1.oblix.net.

  6. Synchronize the time on all servers where SAP and Oracle Access Manager components are installed.

  7. Ensure that the users exist in the Oracle Access Manager LDAP directory as well as on the SAP R3 system database.

    The user ID in Oracle Access Manager and SAP must be same or be mapped to each other. Any attribute in a user's profile can be configured as the SAP ID and passed directly to SAP. Alternatively, SAP can be configured to map the SAP ID to any user attribute that it receives from Oracle Access Manager.

  8. Configure the Web browser to allow cookies.

12.5 Setting up Oracle Access Manager Single Sign-on for mySAP

Setting up Oracle Access Manager single sign-on for mySAP requires the installation and configuration of several SAP and Oracle Access Manager components.

Task overview: Setting Up Oracle Access Manager single sign-on for mySAP

  1. Set up SAP, including the following items, as described in "Setting Up SAP for Integration with Oracle Access Manager":

    • Install the SAP GUI.

    • Install and configure Web server instances for SAP ITS.

    • Install SAP ITS.

    • Test connections between ITS and SAP R/3.

    • Install and configure SAP SNC.

    • Configure SAP PAS for Access System header variables.


    Note:

    For instructions on installing SAP components, refer to your SAP documentation.

  2. Set up the Access System, including the following items, as described in "Setting Up Oracle Access Manager for Integration with SAP".

    • Install a WebGate

    • Create access control policies in the Access System to protect SAP resources

  3. Complete activities in "Testing Integration Between Oracle Access Manager and SAP".

12.5.1 Setting Up SAP for Integration with Oracle Access Manager

The following procedures describe setting up SAP for the integration.

To set up SAP for integration with Oracle Access Manager

  1. Install the SAP Graphic User Interface (GUI) on the client machine.

    This is the Web interface for SAP R/3 applications. It dynamically converts SAP transaction screens to HTML pages.

  2. Install and configure two Web server instances; one instance for administrative (ADM) purposes and the second instance as an interface to SAP R/3 applications.

After you have configured the instances, test the connection from ITS to SAP R/3 for both instances.

To test the ADM instance installation

  1. Open a Web browser and enter the URL to log in to the ADM instance; for example:

    http://host:port/scripts/wgate/admin/!

    or

    http://host:port/scripts/wgate/adminremote/!

    where host is a fully qualified name of the host machine such as xyz.domain.com, and port is the port number of the host machine.

To test SAP R/3 instance installation

  1. Open a Web browser and enter the following URL to access the GUI of the SAP R/3 instance:

    http://host:port/scripts/wgate/webgui/!

    Where host is a fully qualified name of the host machine such as xyz.domain.com and port is the port number of the host machine.

    The mySAP.com login screen appears.

  2. Install and configure SAP Secure Network Communication (SNC).

    SAP SNC provides secure connectivity from the AGate to the SAP R/3 applications. SNC is recommended because Oracle Access Manager provides an authenticated user ID to SAP.

    If the WGate is installed on a different server than the AGate, it is recommended that you configure SAP SNC between the two servers.

To set up SAP PAS for integration with Oracle Access Manager

  1. Configure the SAP PAS system to use Header Variables for SSO:

    Configure WGate to pass the Access System header variables to AGate. To do this, use the parameter PassHeader located in the wgate.conf file.

    For example:

    Ex.PassHeader             HTTP_SAPUID
    
    

    Refer to the SAP documentation for the location of the wgate.conf file.

  2. Define the information that PAS requires to use the Access System as an external authentication provider.

    To do this, you must configure the PAS Service for Oracle Access Manager in the Oblix.srvc file located in SAP_install_dir\ITS\2.0\ITSInstanceName\templates

    Where SAP_install_dir is the directory where you installed SAP, and ITSInstanceName is the name of the ITS instance that you configured.

  3. Create and configure PAS templates to handle login, error, and redirect actions that may occur when using the Access System's authentication service.

    Save these templates in the SAP_install_dir\ITS\2.0\ITSInstanceName\templates directory.

    Create the directory structure and files as follows:

    <Name of Service> <Name of Theme> login.html extautherror.html redirect.html

    Name of Service is the name of the service file; for example, oblix.srvc.

    Name of Theme is the name of the theme parameter in the oblix.srvc file.

12.5.2 Setting Up Oracle Access Manager for Integration with SAP

The following procedures describe setting up Oracle Access Manager for this integration.

To set up Oracle Access Manager for integration with SAP

  1. Install a WebGate on the Web server instance supporting the ITS connection to the SAP R/3 system.

    See the Oracle Access Manager Installation Guide for information on installing a WebGate.

  2. In the Access System, create a policy domain to protect SAP resources under /scripts/wgate.

    To do this, create a policy domain that protects the Web servers where SAP ITS and WebGate are installed. The Access System sets header variables that are passed on to the Oracle Access Manager-specific ITS service, allowing access only to specified users.

    See the Oracle Access Manager Access Administration Guide for information on creating policy domains.

  3. In the Authentication Rule, Actions page of the policy domain, configure the action to set an Access System header variable uid to the SAP uid.

    The following example maps uid to the SAPUID:

    HeaderVar                 HTTP_SAPUID                                                uid
    
    
  4. In the Authorization Rules, Allow Access page of the policy domain, select the Oracle Access Manager/SAP users to whom you want to grant access to the resources that are protected by the policy domain.

    The single sign-on configuration is now complete.

12.5.3 Testing Integration Between Oracle Access Manager and SAP

After you have integrated Oracle Access Manager with SAP, test for successful Access System authentication and single sign-on with mySAP.

The following procedures test the following scenarios:

  • A valid login to an SAP R/3 application with a user ID that is authorized both in the Access System and in SAP.

  • A valid login to an SAP R/3 application with a user ID that is authorized in the Access System but is unauthorized in SAP.

  • A valid login to the Identity System and an SAP R/3 application with a user ID that is authorized in both the Access System and SAP.

  • A valid login to the Identity System and an SAP R/3 application with a user ID that is authorized in the Access System but is unauthorized in SAP.

If Access System authentication was set up correctly, as an authorized user in both Oracle Access Manager and SAP, you will be allowed to access the Identity System as well as any SAP R/3 application. If you are an authorized user only in Oracle Access Manager, you will be allowed to access only the Identity System but not a SAP R/3 application.

If single sign-on has been set up correctly in the Access System, as an authorized user in both Oracle Access Manager and SAP you will need to authenticate to Oracle Access Manager only once. After successful authentication, you will be able to access the Identity System and multiple SAP R/3 applications without authenticating again.

To test Access System authentication

  1. Access any SAP R/3 application.

    If integration was successful, the Access System will challenge you for your credentials.

  2. Log in with an authorized Oracle Access Manager/SAP user ID.

    You will be allowed to access the R/3 application.

  3. Attempt to log in to a SAP R/3 application with a user ID that is authorized in Oracle Access Manager but is unauthorized in SAP.

    Login will fail with message stating that your password is invalid.


Note:

The message is incorrect. The message should state that your user ID is invalid.

To test Oracle Access Manager single sign-on

  1. Access any SAP R/3 application.

    If the integration was successful, the Access System will challenge you for credentials.

  2. Log in with an authorized Oracle Access Manager/SAP user ID.

    You will be allowed to access the R/3 application.

  3. Attempt to log in to the Identity System.

    If single sign-on is successful, you will be able to log in to the Identity System without being challenged by the Access System.

  4. Attempt to log in to the Identity System and a SAP R/3 application with a user ID that is authorized in Oracle Access Manager but is unauthorized in SAP.

    You will be able to log in to the Identity System but not into SAP. SAP will display a message stating that your password is invalid.

12.6 Integrating the SAP Enterprise Portal 6.0

A portal provides a single point of access to enterprise data and applications, presenting a unified and personalized view of information to employees, customers, and business partners.

The SAP Enterprise Portal, which runs on top of SAP R/3, provides unified information from enterprise applications, data warehouses, unstructured document collections, and the Internet.

Integrating Oracle Access Manager with the SAP Portal provides the following Oracle Access Manager functionality:

This section discusses the following topics:

12.6.1 Architecture for the Integration with SAP Enterprise Portal 6.0 SP2

The following diagram illustrates this integration:

Illustration of SAP integration.

Process overview: Integration with SAP ITS and SAP Enterprise Portal 6.0 SP2

  1. A user attempts to access content via the SAP Enterprise Portal.

    For example, the user may enter the following URL to access an HR application through a proxy server:

    https://host:port/irj

  2. The WebGate intercepts the request and queries the Access Server for the security policy that determines if the resource is protected.

    The security policy consists of an authentication scheme, authorization rules, and allowed operations. Based on the authentication and authorization success or failure, specified actions are performed.

    The Access System security policy for the SAP /irj login URL is applicable to all resources accessed via the https://host:port/irj URL.

    Note that the SAP Enterprise Portal has its own authorization system that can be configured to set user access to iViews.

  3. If the resource is protected, the WebGate prompts the user for authentication credentials.

    The credentials that the WebGate requests depend on the authentication scheme configured in the Access System, for example, Basic over LDAP or Form-based authentication.

  4. If the credentials are validated, the Access System authenticates the user and sets an encrypted ObSSOCookie in the user's browser.

  5. After authenticating, the authorization rules defined in the Access System are applied based on the security policy.

    Specific actions are performed based on the authorization rules. If the user is authorized, access to the SAP Portal login (the requested content) is allowed. For SAP Enterprise Portal header variable integration, the Access Server sets the authenticated user ID in a header variable.

    If the user is not authenticated or authorized, he or she is denied access and redirected to another URL, as determined by the administrator. For example, the user may be redirected to an "invalid credentials" page.

  6. For the integration with SAP Enterprise Portal, the proxy Web server redirects the request to the SAP Enterprise Portal internal Web server that contains the header variable details.

  7. SAP Enterprise Portal uses the header variable value to check the mapping of the user ID against the configured back-end, for example, SAP R/3.

    Both the Oracle Access Manager and SAP Enterprise Portal back-ends must contain the same user ID value.

  8. Upon successful mapping, SAP Enterprise Portal allows the user to access the requested resource.

    SAP Enterprise Portal sends a response to the proxy, and the proxy redirects to the client browser.

  9. All interaction with the SAP Enterprise Portal takes place through the proxy server.

12.6.2 Supported Platforms for Integrating with SAP Enterprise Portal 6.0 SP2

The following tables list the supported platforms.

Table 12-1 Integration with Oracle Access Manager 6.x

SAP Enterprise Portal Oracle Access ManagerIdentity Server SAP Enterprise Portal Proxy Oracle Access ManagerAccess Server

SAP Enterprise Portal 6.0 SP2 patch 4 or higher on Windows

6.5.x

Apache 1.3.x on AIX

6.1.1.x WebGate (SSL or non-SSL)

SAP Enterprise Portal 6.0 SP2 patch 4 or higher on Windows

6.5.x

Apache 2.0.x on Windows

6.5.2 WebGate


Table 12-2 Integration with Oracle Access Manager 7.x

SAP Enterprise Portal Oracle Access ManagerIdentity Server SAP Enterprise Portal Proxy Oracle Access ManagerAccess Server

SAP Enterprise Portal 6.0 SP2 patch 4 or higher on Windows

7.0.4

Apache 1.3.x on AIX

7.0.4 WebGate (SSL or non-SSL)

SAP Enterprise Portal 6.0 SP2 patch 4 or higher on Windows

7.0.4

Apache 2.0.x on Windows

7.0.4 WebGate


12.6.3 SAP Enterprise Portal 6.0 Prerequisites

Complete the following tasks before integrating Oracle Access Manager with the SAP Enterprise Portal 6.0.

Task overview: Integration prerequisites for SAP Portal 6.0 integration:

  1. Confirm the installation of SAP Enterprise Portal 6.0 SP2 and its components and applications:

    • Ensure SAP J2EE Engine version 6.2 patch level 26 or higher is installed, according to the instructions in the SAP note 616501.

    • Apply SAP Enterprise Portal 6.0 patch level 4 or higher. This is required for the SAP logout URL redirection functionality.

    • Confirm that SAP Enterprise Portal is functional and able to access the applications.

  2. Ensure that the Identity System and Access System are installed and running.

  3. Ensure that the Oracle Access Manager and the SAP Enterprise Portal back-ends contain the same user ID information.

    This is essential for this integration.

12.6.4 Oracle Access Manager Prerequisites

Complete the following tasks before integrating Oracle Access Manager with the SAP Enterprise Portal 6.0.

Task overview: Integration prerequisites for Oracle Access Manager integration:

  1. Configure a proxy server to access SAP Enterprise Portal 6.0.

  2. Configure Oracle Access Manager for the SAP Enterprise Portal 6.0.

  3. Configure a WebGate on the proxy server.

  4. Configure SAP Enterprise Portal 6.0 for external authentication.

12.6.5 Configuring a Proxy to Access SAP Enterprise Portal 6.0

The following procedure describes how to configure a proxy to access SAP Enterprise Portal 6.0.

To configure Apache Web server 1.3.x or 2.0.1

  1. Set up the Apache proxy in non-SSL mode or SSL mode, as described in the Apache documentation.

    If https communication is used with the SAP Enterprise Portal 6.0, use SSL mode.

  2. To enable the proxy to the SAP Enterprise Portal 6.0, enter the following in httpd.conf:

    ProxyRequests Off
    ProxyPass /irj http://sap_host:port/irj
    ProxyPassReverse /irj http://sap_host:port/irj
    ProxyPreserveHost On
    
    

    Where sap_host is the name of the machine hosting the SAP Enterprise Portal 6.0 instance and port is the listen port for the SAP Enterprise Portal 6.0 instance. This set of directives specifies that all of the requests to this Web server of the form http://apache_host:port/irj or https://apache_host:port/irj are redirected to http://sap_host:port/irj or https://sap_host:port/irj.

  3. Restart the proxy Web server.

  4. Access the following URL:

    Non-SSLhttp://apachehost:port/irj

    SSLhttps://apachehost:port/irj

    This request should be redirected to the SAP Enterprise Portal 6.0 login.

  5. Log in using the SAP Enterprise Portal 6.0 administrator login ID.

    The administrator should be able to perform the available administrative functions.

  6. Log in as a non-administrative user.

    This user should be able to perform non-administrative functions.

12.6.6 Configure Oracle Access Manager for SAP Enterprise Portal 6.0

The following procedure describes configuration of the security policy in Oracle Access Manager to protect logins to SAP Enterprise Portal 6.0. For more information on configuring policy domains, see Oracle Access Manager Access Administration Guide.

To configure Oracle Access Manager for SAP Enterprise Portal 6.0

  1. Log in to the Access System Console as a Master Access Administrator.

  2. Click the Access System Configuration tab.

  3. Click Add New AccessGate in the left navigation pane.

  4. Configure a WebGate that you will install on the proxy server, as follows:

    AccessGate name—Enter any meaningful name, for example, SAP_AG. Use an alphanumeric string, and do not include spaces in the name.

    Host name—Enter the name of the Apache proxy machine.

    Access Management Service—Click the option to enable this service.

  5. Click Save, then click List Access Servers at the bottom of the page to associate this WebGate with a defined Access Server.

  6. Click Host Identifiers in the left navigation pane and configure the host identifiers using the fully qualified proxy machine name and port for the Apache proxy.

  7. Click the link for the Policy Manager at the top of the page.

  8. Click Create Policy Domain in the left navigation pane and create a new policy named SAP EP Security Policy.

  9. Click the Resources tab, click Add, and define the resources for the policy as follows:

    Name—SAP EP Security Policy

    Type—http

    Host identifiers—Enter the proxy host URL prefix: /irj.

    Description—SAP EP Login URL

  10. Click the authorization rules tab, then click Add, and define the authorization rules for the policy as follows:

    Name—SAP Authorization Rule

    Enabled—Yes

    Allow takes precedence—Yes

  11. Click Save, then click the Allow Access tab, then click Add and add a valid user or group list.

  12. Click Save, then click the Actions tab, and configure the following actions:

    Authorization Success Returns—Configure a Type of HeaderVar, a Name of OB_USER, and a Return Attribute of uid.

    Authorization Failure—Configure an appropriate failure action. For example, you can configure a redirect to a proxy URL page that displays an "Invalid login credentials" message.

  13. Click the Default Rules tab, click the Authentication Rule sub-tab, click Add, and define the default authentication rule as follows:

    Name—SAP Authentication Rule

    Authentication Scheme—Select either Basic over LDAP or Form based authentication. Oracle recommends that you use a form-based authentication scheme. If you use the basic authentication scheme, also set the Challenge Redirect field to another WebGate to ensure that the ObSSOCookie is set.

  14. In the Default Rules tab, click the Authorization expression sub-tab, click Add, and create an authorization expression that uses the SAP Authorization Rule.

  15. If you configured a form-based authentication scheme, ensure that a login.html page is configured in the proxy server document root.

    This form will be used to get the user credentials. See the Oracle Access Manager Access Administration Guide for details.

  16. Also, if you configured a form-based authentication scheme, ensure that a logout.html page is present on the proxy Web server document root.

    You can create a custom logout page using HTML, JSP, or a CGI protocol.

    The default logout page, named logout.html, is in the following location:

    WebGate_install_dir\access\oblix\apps\common\bin
    
    

    Where WebGate_install_dir is the directory where the WebGate will be installed. Ensure that the name of the logout page contains the string "logout.".

  17. Ensure that the user ID that is returned by the OB_USER header variable exists in the user management data sources for SAP Enterprise 6.0.

12.6.7 Configure WebGate on the Proxy Server

Install a WebGate on the Web server instance that supports the proxy connection to the SAP Enterprise Portal 6.0 instance. See the Oracle Access Manager Installation Guide for details.

12.6.8 Configure SAP Enterprise Portal 6.0 for External Authentication

The following steps describe enabling external authentication in SAP Enterprise Portal 6.0 using the OB_USER header variable.

For more information on configuring authentication schemes for SAP Enterprise Portal, see the SAP Enterprise Portal 6.0 SP2 Enterprise Postal Security Guide.

To configure SAP Enterprise Portal 6.0 for external authentication

  1. To enable logout from a single sign-on session in both SAP Enterprise Portal 6.0 and Oracle Access Manager, configure a logout URL in SAP Enterprise Portal 6.0 from the administration interface.

    The URL for the administration interface is as follows:

    http://sap_host:port/irj/
    
    

    Where sap_host is the name of the machine hosting the SAP Enterprise Portal 6.0 and port is the listen port for the portal.

  2. From the administration interface, click System Administration, then System Configuration, then UM Configuration, then Direct Editing.

  3. Add the following lines to the end of the configuration file:

    ume.logoff.redirect.url=http(s)://proxy_host:port/logout.html
    ume.logoff.redirect.silent=false
    
    

    Where http(s) is either http or https, proxy_host is the name of the proxy Web server and port is the listen port for the proxy.

  4. Save the changes and log out.

  5. Stop the SAP J2EE dispatcher and server.

  6. Browse to the following directory:

    SAP_J2EE_engine_install_dir\ume

  7. Back up the file authschemes.xml.bak to another directory.

  8. Rename authschemes.xml.bak to authschemes.xml.

  9. Open authschemes.xml in an editor and change the reference of the default authentication scheme to the authentication scheme header as follows:

    <authscheme-refs>
         <authscheme-ref name="default">
              <authscheme>header</authscheme>
         </authscheme-ref>
    </authscheme-refs>
    
    
  10. In the authentication scheme header of authschemes.xml, specify the name of the HTTP header variable where the Access System provides the user ID.

    As described in "Configure Oracle Access Manager for SAP Enterprise Portal 6.0" on page 12-12, this is the OB_USER header variable. You configure this header variable as follows:

    <authscheme name="header">
         <loginmodule>
              <loginModuleName>  
                   com.sap.security.core.logon.imp.HeaderVariableLoginModule 
              </loginModuleName>
                   <controlFlag>REQUISITE</controlFlag>
                   <options>Header=OB_USER</options>
         </loginmodule>
         <priority>5</priority>
         <frontEndType>2</frontEndType>
         <frontEndTarget>com.sap.portal.runtime.logon.header</frontEndTarget>
    </authscheme>
    
    

    The control flag value REQUISITE means the login module must succeed. If login succeeds, authentication continues through the list of login modules. If it fails, control immediately returns to the application and authentication does not continue through the list of login modules.

  11. Restart the portal server and J2EE engine.

    The modified authschemes.xml file will be loaded into the Portal Content Directory (PCD). SAP Enterprise Portal 6.0 will rename it as authschemes.xml.bak.

12.6.9 Testing the Integration with SAP Enterprise Portal 6.0

The following are recommended tests for the integration.

To test the integration

  1. Enter the appropriate URL for your proxy in a browser:

    http(s)://proxy_host:port/irj

    Oracle Access Manager should prompt for user credentials depending on the authentication scheme (form-based or Basic over LDAP).

  2. Enter valid user credentials at the prompt.

    These credentials should belong to a user in Oracle Access Manager who is authorized to access /irj. This user ID must also be present in the SAP Enterprise Portal 6.0 User Management System.

    The user should be logged into the SAP Enterprise Portal 6.0 having supplied the login credentials to Oracle Access Manager.

  3. If the user have administrative privileges in SAP Enterprise Portal 6.0, ensure that the usual administrative functions are available for this user.

    For example, search for other SAP Enterprise Portal users through the user Management System.

  4. Log off from the SAP Enterprise Portal.

    You should be redirected to the logout.html page that you configured. Both the SAP Enterprise Portal and the Oracle Access Manager sessions should end.

  5. Access SAP Enterprise Portal login again in the same browser.

    Oracle Access Manager should prompt for login credentials again.

  6. Access the SAP Enterprise Portal login page without using the proxy by entering the following in a browser:

    https://sap_host:port/irj

    You should receive the following error:

    Cannot logon user defined in header variable!

12.6.10 Troubleshooting the Integration with SAP Enterprise Portal 6.0

The following information is intended to help you troubleshoot issues with this integration.

Problem—The browser has problems displaying the SAP administration interface through the proxy server. You may receive an "object not found" error and related javascript errors.

Solution—See the following SAP document for supported browsers, "SAP NetWeaver '04 SR1 PAM: Browsers for end users and admin functionality." SAP has recommended Internet Explorer 6, and it supports almost all proxy operations. In the case of Internet Explorer, the Microsoft Security patch can sometimes affect the display of the user interface. See SAP Note 785308 for details.