Skip to content

Commit

Permalink
Update from SAP DITA CMS (squashed):
Browse files Browse the repository at this point in the history
commit 8a0e5a476a8e6dd8fc06bf22f20fe58d68046016
Author: REDACTED
Date:   Fri Dec 1 14:25:32 2023 +0000

    Update from SAP DITA CMS 2023-12-01 14:25:32
    Project: dita-all/jjq1673438782153
    Project map: c2f780f61c744155b0bd42b6f38fb70c.ditamap
    Language: en-US

commit cc87510dc5d9a2b513cd1209d75784fca6dc40e8
Author: REDACTED
Date:   Fri Dec 1 14:05:30 2023 +0000

    Update from SAP DITA CMS 2023-12-01 14:05:30
    Project: dita-all/jjq1673438782153
    Project map: c2f780f61c744155b0bd42b6f38fb70c.ditamap
    Language: en-US

commit f6803420b3bca8589374baa3a59808d0d7c271d6
Author: REDACTED
Date:   Fri Dec 1 09:47:10 2023 +0200

    Delete docs directory

commit b3a5f7554df8f37674e42c8fe2055f34b104ec95
Author: REDACTED
Date:   Fri Dec 1 05:31:32 2023 +0000

    Update from SAP DITA CMS 2023-12-01 05:31:32
    Project: dita-all/jjq1673438782153
    Project map: c2f780f61c744155b0bd42b6f38fb70c.ditamap
    Language: en-US

##################################################
[Remaining squash message was removed before commit...]
  • Loading branch information
ditaccms-bot committed Dec 4, 2023
1 parent af82530 commit c65a06d
Show file tree
Hide file tree
Showing 4 changed files with 68 additions and 3 deletions.
Original file line number Diff line number Diff line change
Expand Up @@ -50,7 +50,7 @@ Descrption
</td>
<td valign="top">

Authentication is implemented over the OpenID Connect \(OIDC\) protocol, and delegated to an Identity Authentication tenant. The credentials users need to present depend on the tenant settings. See [](https://help.sap.com/viewer/ea72206b834e4ace9cd834feed6c0e09/Cloud/en-US/084c6fbf9c984a0292183b41120e7cb4.html "") :arrow_upper_right:.
Authentication is implemented over the OpenID Connect \(OIDC\) protocol, and delegated to an Identity Authentication tenant. The credentials users need to present depend on the tenant settings. See [OpenID Connect Authentication](openid-connect-authentication-084c6fb.md).

> ### Note:
> You cannot combine this option with *Trusted SAML 2.0 identity provider* and *Application-to-Application SSO*.
Expand Down
2 changes: 1 addition & 1 deletion docs/60-security-neo/authentication-e637f62.md
Original file line number Diff line number Diff line change
Expand Up @@ -67,7 +67,7 @@ OpenID Connect provider
</td>
<td valign="top">

Users will log in using a user name and password pair that existis in the Identity Authentication tenant used as OpenID Connect \(OIDC\) provider. You need to configure it using the*OpenID Conect Authentication* section in the SAP BTP cockpit \(see[](https://help.sap.com/viewer/ea72206b834e4ace9cd834feed6c0e09/Cloud/en-US/084c6fbf9c984a0292183b41120e7cb4.html "") :arrow_upper_right:\).
Users will log in using a user name and password pair that existis in the Identity Authentication tenant used as OpenID Connect \(OIDC\) provider. You need to configure it using the*OpenID Conect Authentication* section in the SAP BTP cockpit \(see[OpenID Connect Authentication](openid-connect-authentication-084c6fb.md)\).

</td>
<td valign="top">
Expand Down
65 changes: 65 additions & 0 deletions docs/60-security-neo/openid-connect-authentication-084c6fb.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,65 @@
<!-- loio084c6fbf9c984a0292183b41120e7cb4 -->

# OpenID Connect Authentication

Protect your applications on SAP BTP, Neo environment with OpenID Connect \(OICD\) authentication method using an Identity Authentication tenant as an OpenID Connect provider.



<a name="loio084c6fbf9c984a0292183b41120e7cb4__prereq_cb1_fr2_jzb"/>

## Prerequisites

- You have administrative rights over your subaccount in the Neo environment.
- You have an Identity Authentication tenant for this subccount. See [\(Identity Authentication documentation\) Initial Setup](https://help.sap.com/docs/identity-authentication/identity-authentication/initial-setup?version=Cloud).
- You have enabled Beta features for this subaccount. See [Account Model](https://help.sap.com/viewer/65de2977205c403bbc107264b8eccf4b/Cloud/en-US/8ed4a705efa0431b910056c0acdbf377.html#loio8ed4a705efa0431b910056c0acdbf377 "Learn more about the different types of accounts on SAP BTP and how they relate to each other.") :arrow_upper_right: \(subsection *Using Beta Features with Subaccounts*\).



## Context

> ### Note:
> This is a beta feature. Beta features aren't part of the officially delivered scope that SAP guarantees for future releases. For more information, see [Important Disclaimers and Legal Information](https://help.sap.com/viewer/disclaimer).
With the OpenID Connect authentication method, your application's users will authenticate using a user name/e-mail address and password pair that exist in an Identity Authentication tenant based on the OpenID Connect protocol.

More information about the OpenID Connect scenarios supported by Identity Authentication service: [\(Identity Authentication documentation\) OpenID Connect](https://help.sap.com/docs/identity-authentication/identity-authentication/openid-connect?version=Cloud).



## Procedure

1. In the SAP BTP cockpit, navigate to your subaccount. See [Navigate in the Cockpit](https://help.sap.com/viewer/65de2977205c403bbc107264b8eccf4b/Cloud/en-US/0874895f1f78459f9517da55a11ffebd.html "Learn how to navigate to your global accounts and subaccounts in the SAP BTP cockpit.") :arrow_upper_right:.

2. Navigate to *Security* \> *Trust* \> *OpenID Connect Authentication*.

3. Click *Select OpenID Connect Provider*.

4. In the list of Identity Authentication tenants that appears, choose the tenant that you want to use as OpenID Connect provider.

The required application configuration for OpenID Connect is automatically created on the tenant side.

> ### Note:
> If you remove this OpenID Connect provider or switch to another one, the created application configuration on the Identity Authentication tenant will be deleted.
5. If required, configure further the created OpenID Connect application configuration for your scenario.

See:

- [\(Identity Authentication documentation\) OpenID Connect](https://help.sap.com/docs/identity-authentication/identity-authentication/openid-connect?version=Cloud)
- [\(Identity Authentication documentation\) Tenant OpenID Connect Configurations](https://help.sap.com/docs/identity-authentication/identity-authentication/tenant-openid-connect-configurations?version=Cloud)

6. In your application code, declare usng `OICD` authentication method in the `web.xml`. See [Declarative Authentication](authentication-e637f62.md#loioe36c712efa844e8199a9c4bd681cb4e0).

7. \(Optional\) If required, change the authentication configuration \(authentication stack\). See [Authentication Configuration](authentication-configuration-4a46723.md).


**Related Information**


[\(Identity Authentication documentation\) OpenID Connect](https://help.sap.com/docs/identity-authentication/identity-authentication/openid-connect?version=Cloud)

[\(Identity Authentication documentation\) Tenant OpenID Connect Configurations](https://help.sap.com/docs/identity-authentication/identity-authentication/tenant-openid-connect-configurations?version=Cloud)

[\(OpenID specification\) OpenID Connect Core 1.0](https://openid.net/specs/openid-connect-core-1_0.html)

2 changes: 1 addition & 1 deletion docs/index.md
Original file line number Diff line number Diff line change
Expand Up @@ -676,7 +676,7 @@
- [Using an SAP System as an On-Premise User Store](60-security-neo/using-an-sap-system-as-an-on-premise-user-store-71fdf1c.md)
- [Using Microsoft Active Directory as an On-Premise User Store](60-security-neo/using-microsoft-active-directory-as-an-on-premise-user-store-28a03e4.md)
- [Basic Authentication](60-security-neo/basic-authentication-a2c696b.md)
- [084c6fbf9c984a0292183b41120e7cb4.xml](084c6fbf9c984a0292183b41120e7cb4.md)
- [OpenID Connect Authentication](60-security-neo/openid-connect-authentication-084c6fb.md)
- [Authentication Configuration](60-security-neo/authentication-configuration-4a46723.md)
- [Securing HTML5 Applications](60-security-neo/securing-html5-applications-55f7c9d.md)
- [Authentication](60-security-neo/authentication-3996010.md)
Expand Down

0 comments on commit c65a06d

Please sign in to comment.