Technology Blog Posts by Members
cancel
Showing results for 
Search instead for 
Did you mean: 
Senthil9
Explorer
1,615

BTP Neo to Cloud Foundry ADS Migration.

Forms Service by Adobe:

Adobe Forms Service in SAP Business Technology Platform (BTP) is a cloud-based service that allows organizations to create, manage, and process interactive forms efficiently.

The primary reason for migrating from SAP Neo to SAP Cloud Foundry is that SAP Neo is being decommissioned. As SAP focuses its future development and support on Cloud Foundry, Neo will no longer be actively maintained or receive new updates. Migrating to Cloud Foundry ensures continued access to new features, improvements, and support within the SAP Business Technology Platform (BTP).

1.In existing Neo Environment, Create a Subaccount for ADS

Senthil9_85-1742293633324.png

 

2.Goto Subaccount you have Created -> Entitlements -> Edit -> Add Service Plan -> Search Forms Service by Adobe

2.1 Add these below Service Plans
             Standard
             Default (Application)

Senthil9_86-1742293680571.png

3.Goto Subaccount -> Enable Cloud Foundry Environment
Since no services won’t support in NEO environment, enable cloud foundry

Senthil9_87-1742293752059.png


4.In right Pane, you can able to see Create Space-> Give the name and assign the specific roles mentioned

Senthil9_89-1742293846919.png

5.Upon Creation of the Space, in top right Create Instance for the plan Standard and Default

Senthil9_90-1742293889682.png

Senthil9_91-1742293906040.pngSenthil9_92-1742293929187.png

Senthil9_93-1742293949198.png

6.Upon Subscribing to the Forms Service by Adobe, assign the roles to the user.

Senthil9_94-1742294008213.png

7.As we’re not able to see the roles with respect to ADS in the role collection, Create the role collection

Senthil9_95-1742294026061.png

8.Click Edit and in the Role name, Click the icon.

Senthil9_96-1742294047708.png

9.Click the Search Help Icon

Senthil9_97-1742294074934.png

10.In the application identifier -> Drop Down -> Select ads

Senthil9_98-1742294111463.png

9.1 Select these both role and add it to the user

Senthil9_99-1742294135989.png

11.Copy the Subaacount ID.

Senthil9_101-1742294177685.png


Cloud Connector Configurations:

1.Go to Cloud Connector -> Add subaccount

Senthil9_102-1742294381891.png

Issue:

We can’t able to see the GCP - Damam region in drop down


Resolution:

The region KSA (Damman) - cf.sa30.hana.ondemand.com uses the DigiCert TLS RSA4096 Root G5 as root CA. Furthermore, it is not yet listed as region in Cloud Connectors available for download from https://tools.hana.ondemand.com/#cloud. If you want to add a subaccount for it, you need to do 2 things before being able to do so. Firstly, run Cloud Connector using a JVM that trusts this root CA, secondly you need to add a custom region for it. The steps are as follows,

Upgrade to a JVM trusting the the DigiCert TLS RSA4096 Root G5 certificate following the procedure explained in https://help.sap.com/docs/connectivity/sap-btp-connectivity-cf/update-java-vm to one JVM of at least the version listed below
1.SAP JVM 8.1.097
2.SapMachine 11.0.22
3.SapMachine 17.0.10
4.SapMachine 21.0.2
5.Oracle JVM 8u401
Add the custom region KSA (Damman) - cf.sa30.hana.ondemand.com following the procedure explained in https://help.sap.com/docs/connectivity/sap-btp-connectivity-cf/configure-custom-regions

Go to Configuration -> Cloud -> Add Custom Region

Senthil9_103-1742294403806.png


2.We can able to see the Region, now add the subaccount which we have created in BTP

Senthil9_104-1742294432651.png

 

3.Go to the added Subaccount -> Click Cloud to On-Premise

Senthil9_105-1742294446071.png

 

Senthil9_106-1742294515233.png

4.Add the backend system Ip and Port

Senthil9_107-1742294538950.png

Senthil9_108-1742294550089.png


5.Add the resource and check whether it is reachable or not

Resource as /sap -> Paths and Sub-Paths

Backend Configuration:

1.Go to Backend System and activate the following Services

SICF -> Activate the below Services

1.fp
2.Fpads
3.OA2C_GRANTAPP
4.OAUTH2_AUTHORIRY
5.OAUTH2_CONFIG
6.OAUTH2_REVOCATION
7.OA2C_CONFIG
8.OAUTH2_REVOKE_ADM

2.Goto BTP -> Click the ADS Subaccount -> Connectivity -> Destination -> Add Destination (FP_ICF_DATA_<SID>)

Senthil9_111-1742294648310.png

3.Create the User in SU01 and assign these roles

Senthil9_112-1742294666235.png

Senthil9_113-1742294683804.png

Senthil9_114-1742294700858.png

4.Click Instance & Subscription -> Instance -> Click three dots -> Create Service Key

Senthil9_115-1742294717633.png

Senthil9_116-1742294780664.png

Senthil9_117-1742294819376.png

5.Copy the Client ID, Client Secret and URL

Senthil9_118-1742294860310.png

6.Use the below link to download the Digicert Certificate

https://www.digicert.com/digicert-root-certificates.htm

Download below certificates and import them under SSL Client Standard and SSL Client Anonymous.
 
DigiCert Global Root CA
DigiCert Global Root G2

OAUTH CONFIGURATION:

1.Tcode : OA2C_CONFIG

2.Click Create OAUTH Profile which will be used in RFC

Senthil9_119-1742294895546.png

Senthil9_120-1742294901834.png

3.Paste the URL which you have copied in Service key
Authorization Endpoint : <url>/oauth/authorization
Token Endpoint : <url>/oauth/token

Senthil9_121-1742294923391.png

 

Senthil9_122-1742294963204.png

Senthil9_123-1742294970794.png

Creating RFC:

1.Create RFC Connection SM59 -> Create ‘G’ Type

Senthil9_124-1742294994243.png

2.Allow(Whitelist) the Destination from Backend System

Senthil9_125-1742295016275.png

3.Click Logon & Security -> Click OAUTH Settings -> Give the OAUTH Profile we have created

Senthil9_126-1742295029203.png

Senthil9_127-1742295036387.png

4.Give Connection Test

Senthil9_128-1742295042587.png

Senthil9_129-1742295050888.png

Validation:

1.SE38 -> FP_TEST_00

Senthil9_130-1742295076130.png

Senthil9_131-1742295082762.png

 

Senthil9_132-1742295088846.png

 

1 Comment