In this lesson, the following topics are discussed:
- Outbound Security for Adapters.
- Establishing a secure connection to the receiver using certificates.
- Implement the required authentication and authorization process for the OData adapter to communicate with the receiver.
Outbound Security for Adapters
The procedures for implementing authentication and authorization against the receiver vary depending on the type of adapter used, and sometimes, can be different. However, there are similarities when using TCP-based adapters. The process involves creating an HTTPS connection via certificates and performing real authentication. In practice, it means that the recipient's certificate must be imported into the Cloud Integration tenant.
The establishment of a secure TCP connection requires the use of TLS with certificates. SAP provides a dedicated tool for verifying and importing the necessary certificates specific to the recipient.
The authentication and authorization process is adapter-specific and is described below for the OData adapter.
Establishing a Secure Connection to the Receiver involves using Certificates
How can we ensure that the message is delivered to the recipient properly? In this scenario, the connection is established directly between the receiver adapter and the receiver.

To establish a secure connection with the receiver, it is necessary to perform authentication and authorization. This process also involves setting up an HTTPS connection through certificates, which can be used for more authentication and authorization. Ultimately, the type of authentication and authorization used is decided by the receiver.
We demonstrate it again with the example of the OData adapter. In this training's exercises, we have set up policies for the API Management to avoid the need for authentication.
Locate and Import the Certificates for the Receiver and the Certificate Chain for the Server
We can use a helpful tool in cloud integration called Test Connectivity to find and import the required receiver certificates and their server certificate chain.
Procedure
- Navigate to Monitor → Integrations → Manage Security → Test Connectivity.
- Choose your protocol.
- Fill in the necessary data.
- Choose the Send button.
- Download the certificates.
- Import the certificates at Monitor → Integrations → Manage Security → Manage Keystore → Add → Certificate.
Note
The following screenshots address twitter.com as receiver.Further explanations:
- Choose the Protocol and Enter all Necessary Data
Choose the protocol and enter all necessary data:
Choosing the Send button provides the certificates. Choose the Download button:
Decompress the downloaded file:
Navigate to Monitor → Integrations → Manage Security → Manage Keystore → Add → Certificate. Add all certificates separately from your decompressed file.
The server certificates chain:
The Twitter certificate:
The imported certificates:
A secure HTTPS connection to twitter.com can now be established from your integration flow.
Implement the Necessary Authentication and Authorization Against the Receiver for OData Adapters
As previously mentioned, certificates are primarily used to establish the HTTPS connection. So, more procedures are often required for authentication and authorization.
The Connection tab of the OData Adapter offers various options for authentication and authorization.
These are:
- Basic
- Client Certificate
- None
- OAuth2 Client Credentials
- OAuth2 SAML Bearer Assertion
All these options must first be configured under Monitor → Integrations → Manage Security → Manage Security Material. Except for the client certificate, all authentication options can be found there.

Implement an API key based authentication and authorization
It is common to use an API key for authentication and authorization, even though there is no configuration option for it in the setting options of the OData Adapter. It is demonstrated here:
Procedure
- Copy the API key from your API.
- Place and configure an Content Modifier in front of the call component with the OData adapter.
- Enter an Message Header with the API key value.
- Configure the OData adapter at the Connection tab at Authentication with None.
- At the Processing tab, enter the APIkey in the Request headers fields.




Summary
The process of establishing secure connections and authentication must be distinguished. Initially, a TSL connection is established, similar to the inbound case. However, in this scenario, the communication, and exchange of certificates occur directly between the Cloud Integration tenant (subaccount) and the receiver. To identify and import these certificates, SAP provides a Test Connection tool. The actual authentication is performed by the adapter, and various options are available, such as those provided by the OData adapter.
- Basic
- Client Certificate
- None
- OAuth2 Client Credentials
- OAuth2 SAML Bearer Assertion