In the XSA Web Interface, go to SAML Identity Provider. The user who signs in must have permissions to perform SAML administration tasks. In the default configuration, the URL redirects the request to a sign-in screen, which requires the credentials of an authenticated SAP HANA database user. To configure single sign-on on the SAP HANA side, sign in to your HANA XSA Web Console by going to the respective HTTPS endpoint. In the Add Assignment dialog, click the Assign button.If no role has been set up for this app, you see "Default Access" role selected. If you are expecting a role to be assigned to the users, you can select it from the Select a role dropdown.In the Users and groups dialog, select B.Simon from the Users list, then click the Select button at the bottom of the screen.Select Add user, then select Users and groups in the Add Assignment dialog.In the app's overview page, find the Manage section and select Users and groups.In the applications list, select SAP HANA.In the Azure portal, select Enterprise Applications, and then select All applications.In this section, you'll enable B.Simon to use Azure single sign-on by granting access to SAP HANA.
In the User name field, enter the For example, Select the Show password check box, and then write down the value that's displayed in the Password box.In the User properties, follow these steps:.Select New user at the top of the screen.From the left pane in the Azure portal, select Azure Active Directory, select Users, and then select All users.In this section, you'll create a test user in the Azure portal called B.Simon.
On the Set up Single Sign-On with SAML page, in the SAML Signing Certificate section, click Download to download the Federation Metadata XML from the given options as per your requirement and save it on your computer. From the Parameter 1 list, select user.mail. From the Transformation list, select ExtractMailPrefix().Ĭ. Click Edit icon to open the Manage user claims dialog.ī. In the User attributes section on the User Attributes & Claims dialog, perform the following steps:Ī. On the Set up Single Sign-On with SAML page, click Edit button to open User Attributes dialog. You can manage the values of these attributes from the User Attributes section on application integration page. Configure the following claims for this application. SAP HANA application expects the SAML assertions in a specific format. You can also refer to the patterns shown in the Basic SAML Configuration section in the Azure portal. Contact SAP HANA Client support team to get the values.
Update the value with the actual Reply URL. In the Reply URL text box, type a URL using the following pattern: On the Basic SAML Configuration section, enter the values for the following fields: On the Set up single sign-on with SAML page, click the pencil icon for Basic SAML Configuration to edit the settings.
On the Select a single sign-on method page, select SAML. In the Azure portal, on the SAP HANA application integration page, find the Manage section and select single sign-on.
Navigate to Enterprise Applications and then select All Applications.On the left navigation pane, select the Azure Active Directory service.Sign in to the Azure portal using either a work or school account, or a personal Microsoft account.To configure the integration of SAP HANA into Azure AD, you need to add SAP HANA from the gallery to your list of managed SaaS apps. Identifier of this application is a fixed string value so only one instance can be configured in one tenant.