28.01.2013 Views

SAP HANA Developer Guide - Get a Free Blog

SAP HANA Developer Guide - Get a Free Blog

SAP HANA Developer Guide - Get a Free Blog

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Note: Exposed package content can include design-time objects, for example, tables and views.<br />

● Authentication rules<br />

Use the authentication keyword to enable authorization for the requests in URLs either at the application level<br />

or for single packages in an application. The following authentication methods are supported:<br />

○ <strong>SAP</strong> logon tickets<br />

<strong>SAP</strong> logon tickets enable single sign-on across <strong>SAP</strong> boundaries; <strong>SAP</strong> logon tickets can also be used as<br />

authentication for access to third-party applications.<br />

○ Form-based authentication<br />

Redirect the logon request to a form to fill in, for example, on a Web page.<br />

○ Basic (user name and password)<br />

Log on with a recognized user name and password<br />

The authentication methods can also be written as an array, for example, to allow applications to support<br />

multiple authentication methods. The order of the authentication methods in the array should proceed from<br />

strongest to weakest, for example:<br />

1. <strong>SAP</strong> logon ticket<br />

2. Form-based<br />

3. Basic authentication<br />

● Application authorization<br />

Use the authorization keyword in the .xsaccess file to specify which authorization level is required by a user<br />

for access to a particular application package. The authorization levels you can choose from are defined in<br />

the .xsprivileges file, for example, "execute" for basic privileges, or "admin" for administrative privileges<br />

on the specified package.<br />

● URL rewrite rules<br />

Use the rewrite_rules keyword in the .xsaccess file to hide internal URL path details from external users,<br />

clients, and search engines. It is not possible to define global rewrite rules; the rules you define apply to the<br />

specified local application only. Rules are specified as a source-target pair where the source is written in the<br />

JavaScript regex syntax, and the target is a simple string where references to the groups found can be<br />

inserted using $groupnumber.<br />

● Connection security<br />

Use the force_ssl keyword in the .xsaccess file to enforce the use of secure HTTP (SSL/HTTPS) for client<br />

connections. Browser requests that do not use SSL/HTTPS are refused and the 403 Forbidden page is<br />

displayed. Note that if you set the force_ssl option, then you must ensure that the <strong>SAP</strong> Web Dispatcher is<br />

configured to accept and manage HTTPS requests. For more information about configuring the <strong>SAP</strong> Web<br />

Dispatcher to use HTTPS/SSL see the <strong>SAP</strong> <strong>HANA</strong> Administration <strong>Guide</strong>.<br />

Note:<br />

● Entity Tags<br />

<strong>SAP</strong> <strong>HANA</strong> <strong>Developer</strong> <strong>Guide</strong><br />

Setting Up Your Application<br />

If the <strong>SAP</strong> Webdispatcher sends the header “x-sap-webdisp-ap” with the HTTPS port, the request is<br />

redirected to a HTTPS page, for example: http://..:80/test -> https://..:433/test.<br />

Otherwise, a 403 error is displayed.<br />

P U B L I C<br />

© 2012 <strong>SAP</strong> AG. All rights reserved. 51

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!