<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>Question Re: SSO two domains, no trust, logon via logon group in Technology Q&amp;A</title>
    <link>https://community.sap.com/t5/technology-q-a/sso-two-domains-no-trust-logon-via-logon-group/qaa-p/13852906#M4881691</link>
    <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;We had a similar scenario with two different domains, but we are not using the old kerberos naming in the snc/identity_as. We have users going via the load balancer as described in note&amp;nbsp;&lt;A href="https://me.sap.com/notes/3250948" target="_blank"&gt;https://me.sap.com/notes/3250948&lt;/A&gt;&amp;nbsp;and parameter configured as per&amp;nbsp;&lt;A href="https://me.sap.com/notes/1696905/E" target="_blank"&gt;https://me.sap.com/notes/1696905/E&lt;/A&gt;&lt;/P&gt;&lt;P&gt;So our identity_as looks like p:CN=&amp;lt;SID&amp;gt;, OU.... The system will pick the first part of the certificate and you need to use SPNs for your AD users with SAP/&amp;lt;SID&amp;gt;. This is much simpler to configure and will support certificates also. From a naming perspective the use of certificates in the SNC naming looks also nicer than Kerberos names, I like to see certificates in STRUST with real certificate names and not using&amp;nbsp;@ and weird symbols just to make SSO work&lt;/P&gt;&lt;P&gt;Hope it helps.&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
    <pubDate>Tue, 03 Sep 2024 12:06:43 GMT</pubDate>
    <dc:creator>dyaryura</dc:creator>
    <dc:date>2024-09-03T12:06:43Z</dc:date>
    <item>
      <title>SSO two domains, no trust, logon via logon group</title>
      <link>https://community.sap.com/t5/technology-q-a/sso-two-domains-no-trust-logon-via-logon-group/qaq-p/13851223</link>
      <description>&lt;P&gt;Hi guys,&lt;/P&gt;&lt;P&gt;we are migrating to separate active directory and using SSO (with Secure Login Client).&lt;BR /&gt;So in future there will be two active directories with NO trust to be useful in SAP for SSO.&lt;BR /&gt;Wh did add both AD service user (SPN) to SPNEGO and adjusted for the relevant user the SNC parameter in SU01 + SAPUILandscape.xml entries&lt;BR /&gt;(for users/client in the new domain, old users/clients will be untouched).&lt;BR /&gt;So far everything is working good.&lt;/P&gt;&lt;P&gt;Only one problem:&lt;BR /&gt;When using logon with logongroup (messageserver) the SNC parameter for SAP GUI are placed automatically (due to snc/identity/as I assume?).&lt;BR /&gt;Every user is getting the value for old domain: "p:CN=SAP/Kerberos&amp;lt;SID&amp;gt;@OLDDOMAIN.COM".&lt;BR /&gt;But of course the new domain users do need the new parameter "p:CN=SAP/Kerberos&amp;lt;SID&amp;gt;@NEWDOMAIN.COM".&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 02 Sep 2024 08:40:44 GMT</pubDate>
      <guid>https://community.sap.com/t5/technology-q-a/sso-two-domains-no-trust-logon-via-logon-group/qaq-p/13851223</guid>
      <dc:creator>Mark17</dc:creator>
      <dc:date>2024-09-02T08:40:44Z</dc:date>
    </item>
    <item>
      <title>Re: SSO two domains, no trust, logon via logon group</title>
      <link>https://community.sap.com/t5/technology-q-a/sso-two-domains-no-trust-logon-via-logon-group/qaa-p/13852367#M4881631</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;OSS note&amp;nbsp;&lt;A href="https://me.sap.com/notes/2338952/E" target="_blank"&gt;https://me.sap.com/notes/2338952/E&lt;/A&gt;&amp;nbsp;might help here. With the replacement parameters of the CommonCryptoLib you can adjust the name coming from the Kerberos token before the SNC name mapping takes place.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Best regards,&lt;BR /&gt;Christian&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 03 Sep 2024 07:59:41 GMT</pubDate>
      <guid>https://community.sap.com/t5/technology-q-a/sso-two-domains-no-trust-logon-via-logon-group/qaa-p/13852367#M4881631</guid>
      <dc:creator>Christian_Cohrs1</dc:creator>
      <dc:date>2024-09-03T07:59:41Z</dc:date>
    </item>
    <item>
      <title>Re: SSO two domains, no trust, logon via logon group</title>
      <link>https://community.sap.com/t5/technology-q-a/sso-two-domains-no-trust-logon-via-logon-group/qaa-p/13852795#M4881671</link>
      <description>And i would not use snc/identity/as = p:CN=SAP/Kerberos&amp;lt;SID&amp;gt;@OLDDOMAIN.COM in any case. I recommend you change that to p:CN=Kerberos&amp;lt;SID&amp;gt; which means the domain part will be used from the current users domain and the SAP/ will always be used by default, so in this case your SPN SAP/Kerberos&amp;lt;SID&amp;gt; dont have to be changed at all. Check out this blog for some more details: &lt;A href="https://xiting.com/en/sap-single-sign-on-insider-tips-volume-4/" target="_blank"&gt;https://xiting.com/en/sap-single-sign-on-insider-tips-volume-4/&lt;/A&gt;</description>
      <pubDate>Tue, 03 Sep 2024 10:53:58 GMT</pubDate>
      <guid>https://community.sap.com/t5/technology-q-a/sso-two-domains-no-trust-logon-via-logon-group/qaa-p/13852795#M4881671</guid>
      <dc:creator>Colt</dc:creator>
      <dc:date>2024-09-03T10:53:58Z</dc:date>
    </item>
    <item>
      <title>Re: SSO two domains, no trust, logon via logon group</title>
      <link>https://community.sap.com/t5/technology-q-a/sso-two-domains-no-trust-logon-via-logon-group/qaa-p/13852906#M4881691</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;We had a similar scenario with two different domains, but we are not using the old kerberos naming in the snc/identity_as. We have users going via the load balancer as described in note&amp;nbsp;&lt;A href="https://me.sap.com/notes/3250948" target="_blank"&gt;https://me.sap.com/notes/3250948&lt;/A&gt;&amp;nbsp;and parameter configured as per&amp;nbsp;&lt;A href="https://me.sap.com/notes/1696905/E" target="_blank"&gt;https://me.sap.com/notes/1696905/E&lt;/A&gt;&lt;/P&gt;&lt;P&gt;So our identity_as looks like p:CN=&amp;lt;SID&amp;gt;, OU.... The system will pick the first part of the certificate and you need to use SPNs for your AD users with SAP/&amp;lt;SID&amp;gt;. This is much simpler to configure and will support certificates also. From a naming perspective the use of certificates in the SNC naming looks also nicer than Kerberos names, I like to see certificates in STRUST with real certificate names and not using&amp;nbsp;@ and weird symbols just to make SSO work&lt;/P&gt;&lt;P&gt;Hope it helps.&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Tue, 03 Sep 2024 12:06:43 GMT</pubDate>
      <guid>https://community.sap.com/t5/technology-q-a/sso-two-domains-no-trust-logon-via-logon-group/qaa-p/13852906#M4881691</guid>
      <dc:creator>dyaryura</dc:creator>
      <dc:date>2024-09-03T12:06:43Z</dc:date>
    </item>
  </channel>
</rss>

