Skip to main content

Angles for SAP IT Management Console

Authentication

By assigning trusted Web Servers, you can set up a trusted relationship between the Application Server and one or more Web Servers. Only trusted Web Servers are allowed to create new user sessions and to specify a value for the client IP address. Open the IT Management Console and navigate to Global settingsAuthentication to assign a trusted Web Server by adding its IP address to the list of trusted Web Servers.

For each authentication provider, the following data is shown:

Setting

Description

Provider

Shows if the authentication provider is enabled or not.

Default

Here you can select the default authentication provider.

For the default authentication provider, users can login with their username and password only. For non-default authentication providers users need to add <name of the authentication provider> in front of their username. For example: EVERYANGLE\msmith

ID

The ID used by the Application Server for the authentication provider.

Type

The type of authentication provider. Angles for SAP supports the following types of authentication providers:

  • Active Directory (AD)

  • Active Directory Federation Services (ADFS)

  • Security Assertion Markup Language (SAML)

Description

Description of the authentication provider.

Action

Button that allows you to edit and/or delete the authentication provider.

Adding an authentication provider

To add an authentication provider
  1. Open the IT Management Console and navigate to Global settingsAuthentication.

  2. Click Add new authentication provider.

  3. Select an authentication provider.

  4. The information you now need to enter depends on the selected provider:

Setting

Description

ID

The ID used by the Application Server for the authentication provider.

Description

Description of the authentication provider.

Type

The type of authentication provider. Angles for SAP supports the following types of authentication providers:

  • Active Directory (AD)

  • Active Directory Federation Services (ADFS)

  • Security Assertion Markup Language (SAML)

Enabled

This setting indicates whether the authentication provider is an active provider or not.

Automatically create users

If this setting is selected, a new Angles for SAP user account is automatically created when a user from this authentication provider logs in to Angles for SAP for the first time. This Angles for SAP user will then be assigned the default roles as defined on this page. For ADFS and SAML, this option is selected by default.

Sync roles to groups

If this setting is selected, the Application Server will always check AD group membership when a user logs in. When an AD group exists as a role in Angles for SAP, this role will be assigned to the user during the session. Note that the group name may not contain any spaces.

Default roles

These roles will be assigned to new user accounts from this authentication provider. Setting a default role is mandatory unless you use Sync roles to groups. Click the cell to add or remove roles by selecting or deselecting roles in the drop-down list. The drop-down list contains all available system and model roles. Hover over a role to see which model it belongs to.

Domain

The domain name of the active directory.

User container (DN)

In a default Active Directory hierarchy structure, users are located in the "Users" container. This container is always on the main level of your domain. If you leave this field empty, the Angles for SAP Application Server will retrieve users from this default location.

If you want to retrieve the users from a different container, enter the Distinguished Name (DN) of this container here.

An Active Directory browsing tool can help you find the correct DN syntax for the container. For example, Ldap Admin is a free Windows LDAP client that lets you browse the Active Directory and copy the DN.

Example DN: CN=External users, DC=Contoso, DC=com

Target

Holds the target of the ADFS.

During a login challenge resulting from a URL link into the instance that requires an Single Sign-On session, the referring URL often needs to be supplied to the Single Sign-On provider so that after authentication, it can be passed back to our instance and linked to the correct resource.

The target is built with the elements: <Service><address of service>, for example, https://adfs.example.com/adfs/identity/.

Identity

Holds the identity of the ADFS.

The identity consists of the elements <service> and <address of service>, for example: https://ea2auth.<client-domain name>.

Identity provider issuer

Holds the SAML identity provider issuer.

Identity provider single sign on URL

Holds the SAML identity provider single sign on URL.

Identity provider certificate string

Holds the SAML identity provider certificate string.