Employing Connectivity Options

Objective

After completing this lesson, you will be able to use connectivity options in SAP Integration Suite.

Connectivity Options

In this lesson, we will cover the following topics:

  • Standard Adapters
  • Non-SAP Connectors
  • Custom Adapters (via the Adapter Development Kit)
  • Inbound and Outbound Security

Connectivity Options in SAP Integration Suite

This lesson explores the connectivity options provided by SAP Integration Suite, enabling seamless integration with SAP and non-SAP systems. You learn about standard adapters, non-SAP connectors, and the flexibility of custom adapter development.

Connectivity Options Overview

SAP Integration Suite offers a wide range of connectivity options to integrate with various systems and applications effectively. These options include:

  • Standard Adapters
  • Non-SAP Connectors
  • Custom Adapters (via the Adapter Development Kit)

Standard Adapters

Standard adapters are prebuilt connection tools that allow you to connect SAP Integration Suite to different systems using specific technical protocols.

  • Technical Adapters: Support remote connections using protocols such as HTTPS, FTP, SFTP, and RFC.
  • Application-Specific Adapters: Enable connectivity with applications like SAP SuccessFactors, Twitter, and ELSTER.

Their benefits are:

  • Ready-to-use, reducing integration setup time.
  • Support secure and reliable communication.

Non-SAP Connectors

SAP Integration Suite provides a catalog of over 170 non-SAP connectors to integrate with various third-party applications, such as Dropbox Business, Evernote, and Gmail.

How it works?

  • Each Connector acts as an Application Programming Interface (API), offering methods to access resources and data within the connected application.
  • Use the OpenConnectors adapter to link your SAP Integration Suite tenant with these connectors.

Their benefits are:

  • Simplifies integration with popular non-SAP applications.
  • Leverages a broad catalog to expand your system’s integration capabilities.

Use case: For example, integrate your Gmail account to automate e-mail notifications within a business process or connect Dropbox Business to exchange files securely.

Custom Adapters via Adapter Development Kit

The Adapter Development Kit (ADK) allows you to create custom adapters for unique integration scenarios.

  • Design and deploy custom adapters within your tenant.
  • Extend SAP Integration Suite's capabilities to meet specific business requirements.

Use Case: Develop a custom adapter to connect with a proprietary system not covered by standard adapters or non-SAP connectors.

Inbound and Outbound Security in SAP Integration Suite

Security is a critical aspect of any integration scenario, ensuring data confidentiality, integrity, and protection from unauthorized access. This lesson provides an overview of inbound and outbound security measures within SAP Integration Suite and how to implement them effectively.

What are Inbound and Outbound Security?

  • Inbound Security: Refers to securing messages received by SAP Integration Suite from external systems (senders).
  • Outbound Security: Refers to securing messages sent from SAP Integration Suite to external systems (receivers).

Both directions require robust mechanisms to ensure secure communication, prevent data breaches, and meet compliance requirements.

Inbound Security

Inbound security protects messages as they enter SAP Integration Suite. Key components include:

Authentication

Verifies the identity of the sender to ensure that only authorized systems can send messages. The options to secure are:

  • Basic Authentication: requires a username and password.
  • OAuth 2.0: uses tokens to authenticate secure API access.
  • Certificate-Based Authentication: verifies the sender using x.509 certificates.

Data Encryption

Ensures that messages are encrypted during transmission to protect sensitive data from unauthorized access.

Transport Layer Security (TLS): Encrypts data transmitted between the sender and SAP Integration Suite.

Message Integrity

Ensures that the message has not been altered during transmission.

Digital signatures: Allow verification of message authenticity and integrity.

Access Control

Controls which systems or users can send data to SAP Integration Suite.

  • IP White listing: Limits access to specific IP addresses.
  • Policies: Define rules for message acceptance.

Outbound Security

Outbound security focuses on protecting messages as they leave SAP Integration Suite. The key components include:

Authentication with the Receiver

Ensures that SAP Integration Suite is communicating with the intended system.

  • Basic Authentication: Supported by many receiver systems.
  • OAuth 2.0: for secure, token-based authentication.
  • Certificate-based Authentication: uses digital certificates to establish trust.

Data Encryption

Protects messages from unauthorized access during transmission to the receiver.

Transport Layer Security (TLS): Encrypts the connection between SAP Integration Suite and the receiver system.

Message Integrity and Confidentiality

Ensures secure message content.

  • Signed Messages: Verify that the message is unaltered and authentic.
  • Encrypted Messages: Protect the content from unauthorized access.

Custom Headers and Policies

Allows the addition of security headers or policies for enhanced outbound message protection.

Best Practices for Securing Inbound and Outbound Communication

  • Use HTTPS: Always use HTTPS for secure communication between systems.
  • Rotate Credentials Regularly: Update passwords, certificates, and tokens periodically.
  • Enable Monitoring and Login: Monitor integration flows for unauthorized access or unusual activity.
  • Apply SAP API Management: Apply additional layers of security, such as rate limiting and throttling, for APIs exposed via SAP Integration Suite.
  • Test Security Measures: Regularly test your integration scenarios to identify vulnerabilities.

Summary

SAP Integration Suite provides over 80 standard adapters for seamless integration with SAP-specific and technical connections. Also, it supports more than 170 non-SAP connectors, enabling integration with third-party applications via APIs.

For custom integration needs, the Adapter Development Kit allows the creation of bespoke adapters. Security is a key aspect, with inbound security protecting incoming messages and outbound security safeguarding outgoing communications.

Robust authentication mechanisms such as OAuth 2.0 and certificates ensure secure communication. Data encryption via TLS and digital signatures help maintain message integrity.

Following security best practices—including continuous monitoring, thorough testing, and regular credential rotation—is essential to maintain a secure and reliable integration environment.