_________________________________ _________________________________ _________________________________ _________________________________ _________________________________ A How-To Guide for Putting Your Self-Service and Other HR Functionality y on the Web _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ Jacob Crane EPI-USE America _________________________________ _________________________________ © 2012 Wellesley Information Services. All rights reserved. _________________________________ In This Session … • • • • • • _________________________________ Learn what it means to Web-enable your self-service functionality See what can be put online and what can be gained by doing so Learn about the complexities and support challenges associated with ith running i an Internet-facing I t t f i portal t l See what kinds of architectural changes are needed to realize a solution Learn about making SAP available on mobile devices and the changes involved Learn about things g to consider when designing g g yyour solution _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ 1 _________________________________ What We’ll Cover … • • • • • • _________________________________ What is an Internet-facing portal? What are people putting on the Internet and why? What challenges arise from implementing an Internet-facing portal? t l? What are the technical components and steps involved? Mobility solutions Wrap-up _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ 2 _________________________________ What Is an Internet-Facing Portal? • • • • _________________________________ A portal solution that is accessible from outside of your company’s network via the Internet Portal can be accessed by a URL without VPN or special access All Allows external t l users to t connectt remotely t l Allows employees to connect from home _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ 3 _________________________________ How Is an Internet-Facing Portal Realized? • _________________________________ Technically, this is very simple Open a port up to allow your portal to be accessed from outside of the network Register R i t an address dd andd associate i t it tto your portal t l f www.myportal.com You are now on the Internet _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ 4 _________________________________ How Is an Internet-Facing Portal Realized the Right Way? • _________________________________ In practice, this is actually challenging Security concerns f Architecture f Policies Legal implications and compliance f Data privacy laws and policies f Laws and policies affecting your system design Deciding what to offer online f Scope S off services i f Ways of accessing systems Support _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ 5 _________________________________ Putting Your Portal on the Internet • • • • _________________________________ SAP provides an External-Facing Portal solution Lightweight framework for improved Web performance KM integration for sharing documents and pages Employee and Manager Self-Service are not compatible with the External-Facing Portal Until recently, only a handful of companies had internet-facing solutions for ESS and MSS Today an increasing number of companies are making their portals accessible over the Internet p More benefits Better technology _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ 6 _________________________________ Reasons Businesses Put the Portal on the Internet • • • • _________________________________ Return on Investment There are several services that can quickly provide a measurable ROI Greater G t exposure gives i companies i th the bi biggestt bang b for f their buck Convenience Allow working from home Improved service Allow greater access to information to more users Reduced support costs In some cases costs can be reduced by providing a more costeffective way to support users _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ 7 _________________________________ What We’ll Cover … • • • • • • _________________________________ What is an Internet-facing portal? What are people putting on the Internet and why? What challenges arise from implementing an Internet-facing portal? t l? What are the technical components and steps involved? Mobility solutions Wrap-up _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ 8 _________________________________ What Are Businesses Putting on the Portal? • • • • • • • • _________________________________ Employee Self-Service Manager Self-Service SAP E-Recruiting SAP SRM Identity Management SAP CRM KM content Custom services _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ 9 _________________________________ Employee Self-Service • • • • _________________________________ Most all of ESS can easily be put online Biggest issue is legal and security issues More and more proposals are asking for all of ESS to be available Biggest focus areas are paper reduction Online statements Reduced printing costs Biggest other driver is convenience and access to data for all _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ 10 _________________________________ Employee Self-Service Pay Statement • • Eliminating paper pay statements will save money and can pay for the cost of the portal If employees can get the statements from home, they don’t need to receive them in the mail or as hard copies Eliminates costs f Security paper f Printing f Packaging f Mailing _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ 11 _________________________________ Employee Self-Service — Open Enrollment • • • _________________________________ Reduce the number of enrolment guides printed Allow employees to enroll at home on their own time at their own pace Easier E i for f employees l Less costly for employers Allow simple access to plan information and other enrollment information in a central location _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ 12 _________________________________ Employee Self-Service — Other Forms • Any situation where you have information that is regularly checked and used by employees Increased convenience for employees Less L resources spentt using i th the fforms on th the jjob b and/or d/ printing i ti them at work _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ 13 _________________________________ Manager Self-Service • • • Similar reasons for exposing as ESS Biggest gains come from allowing remote access from the road or home to non-VPN users L l and Legal d compliance li iissues are magnified ifi d with ith MSS functionality, making it necessary to take a more cautious approach to enabling MSS _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ 14 _________________________________ E-Recruiting • • • _________________________________ Allow external candidates to browse jobs Post your jobs on the internet so they can be accessed by anyone All external Allow t l candidates did t and d employees l tto apply l ffor jjobs b Employees can browse and apply on their own time Allow external users to apply and enter their data directly into SAP without intermediate systems SAP-provided external-facing functionality is not delivered through g the p portal but instead through g the SAP NetWeaver® Web Application Server _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ 15 _________________________________ Other Areas • • • • _________________________________ SAP SRM Supplier Self-Service (SUS) functionality Allows suppliers to work with the SRM system, confirm shipping, view orders Participate P ti i t in i auctions ti Upload catalogs Identity Management SAP CRM Allow external customers into the system External facing portal External-facing Use SAP to deliver content via KM _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ 16 _________________________________ Why External? • • • _________________________________ Improved access Home, remote, non-integrated locations External candidates and partners Cost savings Reduced printing and mailing costs Increased convenience Improvements in access mentioned above Simplicity of access f No N VPN Access at any time the system is available instead of only during onsite work hours _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ 17 _________________________________ What We’ll Cover … • • • • • • _________________________________ What is an Internet-facing portal? What are people putting on the Internet and why? What challenges arise from implementing an Internet-facing portal? t l? What are the technical components and steps involved? Mobility solutions Wrap-up _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ 18 _________________________________ What Challenges Lie Ahead? • • • _________________________________ Implementing and maintaining an Internet-facing portal brings many additional challenges and complexities Careful planning and execution with disciplined follow-up and adherence to procedures are key to successfully implementing and operating an internet-facing portal Challenges relate to several areas Security Legal/compliance Support/maintenance pp _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ 19 _________________________________ Additional Factors — Former Showstoppers • • _________________________________ Bandwidth Bandwidth is a concern, as ESS and MSS services are notoriously slow and resource-intensive However, H computers t and d Internet I t t connections ti have h improved i d and continue to do so, minimizing the impact f Most users are now on broadband and can utilize rich content and applications User training and acceptance User training g is always y a concern New employees already have the skills to utilize Web functionality and are ready to embrace what you can offer The need to offer basic operational training is rapidly decreasing _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ 20 _________________________________ Security Issues • • • • _________________________________ Exposing the portal to the Internet opens it to attack Planning, testing, and proactive maintenance are required to mitigate the risks Ad i i t t mustt monitor Administrators it and d actt proactively ti l tto address dd security risks Managing users becomes more complicated, especially if varying levels of access are granted internally and externally More work is required of the Basis team and your network administrators to maintain the portal _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ 21 _________________________________ Legal and Compliance Issues • • • • _________________________________ Increasing attention is being paid to data privacy and security around the world International, National, and State laws are being passed constantly that could affect your policies, policies procedures procedures, and designs Most companies have legal teams who may be looking at these laws and forming corporate or organizational policies that affect your decision to put your portal on the Internet It is important to be aware of the laws and policies that affect your d i i decisions and d design d i _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ 22 _________________________________ Data Privacy Laws • • • • There are numerous laws, old and new, that can affect your design and decisions At face value, many of these laws do not directly affect you or may not be applicable to basic functionality like Employee Self-Service However, advanced functionality that can expose other employees’ data often falls under the scope of these laws Reporting Access to the backed Many of the laws can affect corporate policies, especially in global companies _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ 23 _________________________________ What Laws Are Out There? • • • International EU Data Protection Directive 95/46/EC UK Data Protection Act 1998 Payment Card Industry Data Security Standard National The Health Insurance Portability and Accountability Act (HIPAA) f Health Information Technology for Economic and Clinical Health Act (HITECH) Federal Information Security Management Act (FISMA) State Massachusetts 201 CMR 17.00 Nevada Revised Statutes 603A-Security of Personal Information Many others … _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ 24 _________________________________ What Is the Scope of These Laws? • • • • • _________________________________ Protection of personal information PII – Personally Identifiable Information Protection of credit card information Important in Travel Management Movement of information across borders Policies for documentation, training, and administration Policies for storage and handling of data Older laws are more general and provide guidelines open to interpretation and internal policy Newer laws are starting to be more specific about architecture, encryption, and software used _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ 25 _________________________________ What Are the Implications? • • • • _________________________________ Policies defined to cover all areas can become restrictive and detailed Architecture changes may be needed Mandated M d t d architecture hit t coupled l d with ith requirements i t to t meett encryption and network needs Functionality may need to be restricted Access to reporting may need to be limited or more carefully controlled Transfer of data to other countries restricted GUI access may need to be restricted and/or security maintained by region _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ 26 _________________________________ Design Mandates — The Next Step • • • _________________________________ New laws are becoming more specific in what is required New Massachusetts law requires firewalls, hard disk encryption, regular software updates, anti-malware software Recommendations R d ti toward t d two-factor t f t authentication th ti ti and d password security are showing up As data privacy and security on the Web becomes a more visible topic and issue, more laws will start to address specific requirements If you intend to expose the portal and SAP to the Internet it will become increasingly important to stay aware of the laws that affect you in order to remain in compliance _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ 27 _________________________________ How Laws Can Affect Your Design • _________________________________ Access to personal data Reports containing data like Social Security Numbers and even birth dates may not be able to be used over the Internet without additional security HTML GUI access may need to be restricted to avoid inadvertently allowing the possibility of seeing data over the Internet f Transactions that use the GUI can allow users to run additional transactions which they have access to on the b k end, back d causing i an iissue when h power users h have access to the portal _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ 28 _________________________________ How Laws Can Affect Your Design (cont.) • • • Network design Firewalls mandated by law HTTPS mandated by law Authentication needs may further affect design Authentication and security Though not explicitly mandated by law yet, policies may require different populations of users to use VPN or different authentication methods to access data due to enhanced access These changes could affect single sign sign-on on and other areas Support and operations Updates, antivirus software, backup storage, and other factors are covered by laws and policies _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ 29 _________________________________ Supporting an Internet-Facing Portal • • • • _________________________________ Supporting an Internet-facing portal brings many new challenges Users have different hardware and software combinations that may not be supported U Users will ill bbe on th the system t dduring i hhours th they would ld previously i l be absent If users access the portal from home, they may lock records during an off-hours payroll run Additional factors like networks are outside of your control _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ 30 _________________________________ Computers Outside of Your Control • • • _________________________________ In an enterprise environment, you can control the hardware and software a user has However, home users could have almost anything Users U may access the th portal t l ffrom unsupported t dh hardware d or software versions Automatic updates may install software that is not yet supported by SAP You have no control of the network after you leave your internal network _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ 31 _________________________________ Adapting to the Challenges • • • _________________________________ Reset expectations Clearly communicate to end users what is supported and what is not supported B flexible Be fl ibl Prepare to offer additional support hours or resources Provide online help materials Be prepared Know that your support desk will face new challenges and ensure that the organization is prepared before go go-live live _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ 32 _________________________________ What We’ll Cover … • • • • • • _________________________________ What is an Internet-facing portal? What are people putting on the Internet and why? What challenges arise from implementing an Internet-facing portal? t l? What are the technical components and steps involved? Mobility solutions Wrap-up _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ 33 _________________________________ How to Implement an Internet-Facing Portal • • • _________________________________ Design and build Network Portal options Testing Maintenance and operations _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ 34 _________________________________ Design — The Goals • • _________________________________ Provide open access to information and applications Allow the right people to see the information they need Provide unobtrusive security f Users should know data is secure f Users should not be unnecessarily burdened by security Maintain the highest levels of security and compliance Prevent direct access to back-end systems Prevent unauthorized access to secure networks Eliminate Eli i t the th possibility ibilit off data d t privacy i breaches b h Prevent unencrypted sensitive information from being accessed _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ 35 _________________________________ Network Design — Preventing Access • • • _________________________________ Firewalls can be used to prevent users from accessing your network Firewalls block traffic from flowing into and out of networks by limiting the ports that traffic can flow through Firewalls should be deployed on each network zone _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ 36 _________________________________ How Many Firewalls? • • • _________________________________ At minimum, you need two firewalls to form the demilitarized zone (DMZ) One between the Internet and your DMZ One O b between t th the DMZ and d your secure area SAP recommends at least an inner and outer DMZ Outer DMZ holds reverse proxy Inner DMZ holds the portal application servers f Some recommend putting the portal in the secure area Secure area holds the back end Often, people use additional firewalls Between portal and back end Between back end and database Others _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ 37 _________________________________ Preventing Direct Access — Reverse Proxies • • • _________________________________ Reverse proxies are used to obscure the destination of requests Calls to back-end systems can be routed through a reverse proxy so that servers are never directly exposed R Reverse proxies i should h ld be b usedd in i front f t off any production d ti SAP server Commonly used proxies include SAP Web Dispatcher f Often chosen to combine load balancing with proxy functionalityy Apache _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ 38 _________________________________ Other Network Devices • • • _________________________________ Many additional network devices exist that handle firewall and/or reverse proxy requirements while providing additional protection Filtering with whitelists and blacklists Maintain M i t i lists li t off allowed ll d URL URLs and d blocked bl k d URL URLs f Whitelists are used for allowing only access to desired applications All other traffic is blocked f Blacklists are used to block access to URLs Useful for blocking sensitive servers or applications SAP Web Dispatcher supported Learning firewalls Firewalls that analyze traffic and block abnormal requests f Useful for preventing hacking attempts _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ 39 _________________________________ A Simple Example — Exposing Portal Applications • _________________________________ Only firewalls and a reverse proxy are needed, at minimum, in front of a portal when only portal applications are exposed _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ 40 _________________________________ Exposing the SAP NetWeaver Application Server • • • _________________________________ When exposing the SAP NetWeaver Application Server, it becomes more important to add layers of protection because the back end is now exposed The backed is exposed anytime something running on SAP ERP is used in the portal Transaction iViews ABAP Web Dynpro applications Be sure to consider the way URLs are configured and generated for your applications when using a proxy The address of the proxy must replace the address of the WAS _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ 41 _________________________________ Enhancement Pack 5 and Beyond • • • • _________________________________ Enhancement Pack 5 moves more functionality to Web Dynpro ABAP Users are connected to the back-end WAS instead of the portal F t applications Future li ti will ill also l use more W Web bD Dynpro ABAP Plan for securing the WAS when running EHP5 or later, or performing an upgrade to an existing Internet-facing solution Check out SAP’s guide on best-practices for securing the WAS (link in the resources slide) _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ 42 _________________________________ Securing the Web Application Server _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ 43 _________________________________ Additional Considerations • • _________________________________ Blade servers Segregation of network zones across blades f It is important to ensure that different blades in different zones have h iindependent d d t subnets b t Network interfaces f Often additional network hardware must be installed on the blade server to ensure blades and networks are isolated Virtualization Never put reverse proxies or firewalls on virtual machines f If one is compromised, all are compromised Never host servers that are on different zones on the same virtual machine _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ 44 _________________________________ SAP E-Recruiting • • _________________________________ E-Recruiting needs to be on the Internet to allow candidates to access jobs Especially problematic when E-Recruitment is running on the SAP ERP HCM instance SAP offers an external front end for exposing E-Recruitment to the Internet Separate WAS for SAP E-Recruiting functionality _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ 45 _________________________________ E-Recruiting (cont.) _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ 46 _________________________________ SAP E-Recruiting — What to Do? • • • • • _________________________________ Combining instances reduces the overall maintenance effort and lowers costs Separating the WAS is always more secure, but adds an additional server to maintain Combining SAP ERP HCM and SAP E-Recruiting simplifies the interfaces between the systems and reduces or eliminates the need for SAP NetWeaver Process Integration to handle communications between the two If there is not sensitive data in SAP E-Recruiting, SAP ER Recruiting iti could ld bbe placed l d in i the th DMZ Otherwise, use the external front end _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ 47 _________________________________ A Complete Solution _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ 48 _________________________________ HTTP, HTTPS, and Your Network • • • • Hypertext Transfer Protocol Secure (HTTPS) is mandatory for your internet traffic How far into your network do you need/want to go? D i with Design ith encryption ti iin mind i d and d consider id where h tto d do your Secure Sockets Layer (SSL) offloading Somewhat resource-intensive if done on the portal itself Consider sticky sessions and the need to preserve session and header data as traffic is routed through your network Needed to p preserve Java session in portal p Needed to determine the URL in Web Dynpro _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ 49 _________________________________ Security Design Considerations • • _________________________________ Sensitive content and functionality should be disabled in the portal when exposing it to the internet Sensitive data Sensitive S iti applications li ti and d transactions t ti Administration tools Administration functions should be disabled Use separate IDs that are blocked from the Internet Use filtering to prevent administration functionality from being accessed _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ 50 _________________________________ Security Design Considerations (cont.) • • _________________________________ Audit existing roles for issues Was S_RFC, S_SERVICE, or S_ICF left open? Ensure existing roles are really secure before opening up access Consider vulnerabilities in custom applications and custom code _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ 51 _________________________________ Testing • • • _________________________________ Testing is the only way to be sure you are secure Employ penetration testing and auditing to ensure security holes are closed and policies are in place to maintain a sufficient level of security Penetration testing Experts attempt to hack into your system using know exploits and by searching for new security holes Tools are available for ongoing testing and auditing, but should not be relied on as your only source of testing f Nikto f XSSploit Make sure to coordinate with IT before trying anything _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ 52 _________________________________ Maintenance and Operation • • _________________________________ Patches must be installed more frequently to maintain security Threats are constantly evolving and must be addressed immediately Waiting W iti for f end-of-year d f or quarterly t l patches t h may nott be b sufficient to keep up with new threats Download patches on Patch Tuesday Patch everything in the Internet-facing landscape, not just SAP Downtime windows and testing cycles for patches will need to be scheduled more frequently q y when dealing g with an Internet-facing g solution Problematic when dealing with production environments It may make sense to separate your SAP ERP HCM instance when looking at Internet-facing ESS and MSS _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ 53 _________________________________ Portal Options for Managing Content • • • It may be necessary to offer different functionality and content inside and outside of your network Federated portals A consumer portal t l can be b sett up as Internet-facing I t t f i th thatt can pullll only certain content from your Internal portal, separating the content Filtering SAP has new functionality available that allows content to be filtered based on the portal desktop Users coming from outside use a different alias and can then be assigned a different desktop Only roles with the matching filter value are accessible _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ 54 _________________________________ What We’ll Cover … • • • • • • _________________________________ What is an Internet-facing portal? What are people putting on the Internet and why? What challenges arise from implementing an Internet-facing portal? t l? What are the technical components and steps involved? Mobility solutions Wrap-up _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ 55 _________________________________ Mobile Access • • • _________________________________ The next step beyond opening access to Internet users is offering access to mobile users Many of the concerns and architectural changes brought on by Internet access are valid for mobile access, access as well Mobile solutions are running over the Internet and interfacing with the SAP system SAP offers several products to allow for mobile access and security _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ 56 _________________________________ Mobile Solutions • • • _________________________________ Sybase Unwired Platform SAP NetWeaver Gateway Mobile Business ByDesign _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ 57 _________________________________ Sybase Unwired Platform (SUP) • • • • _________________________________ SUP is a platform used to provide applications on a variety of mobile devices SUP is a Mobile Enterprise Application Platform (MEAP) that connects to SAP and the mobile device Uses a relay server in the DMZ to separate itself from the SAP back-end system Afaria is available for device management and enhanced security _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ 58 _________________________________ Sybase Unwired Platform (SUP) (cont.) _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ 59 _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ 60 _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ 61 _________________________________ Mobile Business ByDesign • • • _________________________________ Business ByDesign provides mobile applications and the ability to develop applications using its platform Everything is cloud-based N hhardware No d changes h are needed d d tto allow ll th the use off the th ByDesign mobile solutions _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ 62 _________________________________ What We’ll Cover … • • • • • • _________________________________ What is an Internet-facing portal? What are people putting on the Internet and why? What challenges arise from implementing an Internet-facing portal? t l? What are the technical components and steps involved? Mobility solutions Wrap-up _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ 63 _________________________________ Additional Resources • • • • _________________________________ http://help.sap.com/saphelp_nw73/helpdata/en/fe/a7b5386f64b555 e10000009b38f8cf/frameset.htm Network and Communications Security www.sdn.sap.com/irj/scn/weblogs?blog=/pub/wlg/2992 d /i j/ / bl ?bl / b/ l /2992 How to ... Configure SAP Web Dispatcher as a reverse proxy http://help.sap.com/saphelp_nw73/helpdata/en/48/8fe37933114e6f e10000000a421937/frameset.htm SAP Web Dispatcher http://help sap com/saphelp nw70/helpdata/en/59/31ae42e0fac911 http://help.sap.com/saphelp_nw70/helpdata/en/59/31ae42e0fac911 e10000000a1550b0/frameset.htm URL Generation in an AS-ABAP – Web Dispatcher Configuration _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ 64 _________________________________ Additional Resources (cont.) • • _________________________________ www.sdn.sap.com/irj/scn/index?rid=/library/uuid/f0d2445f-509d2d10-6fa7-9d3608950fee Secure Configuration SAP NetWeaver Application Server ABAP htt // i t t/ ikt 2 http://cirt.net/nikto2 Nikto – Web server scanner _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ 65 _________________________________ 7 Key Points to Take Home • • • • • • • Allowing access to the portal over the Internet can provide improved service while reducing costs Be aware of legal and policy implications before deciding what to offer and designing your solution Thoroughly test your solution before connecting it to the Internet Be extra diligent about installing updates and support packs to keep up-to-date with the latest security fixes Ensure firewalls are deployed between network zones and that there is always a proxy between the Internet and your servers Consider advanced protection methods like whitelists, blacklists, learning firewalls, security appliances, and other tools available to you in order to maximize security Mobile solutions need to be protected just like Internet solutions _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ 66 _________________________________ Your Turn! _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ How to contact me: Jacob Crane jacob.crane@us.epiuse.com _________________________________ _________________________________ 67 _________________________________ Disclaimer SAP, R/3, mySAP, mySAP.com, SAP NetWeaver®, Duet®, PartnerEdge, and other SAP products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of SAP AG in Germany and in several other countries all over the world. All other product and service names mentioned are the trademarks of their respective companies. Wellesley Information Services is neither owned nor controlled by SAP. _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ _________________________________ 68 Wellesley Information Services, 20 Carematrix Drive, Dedham, MA 02026 Copyright © 2012 Wellesley Information Services. All rights reserved.
© Copyright 2024