SAP Single Sign-On

SAP Single Sign-On gives users secure access to SAP and non-SAP applications with a single password. Enhance the user experience, strengthen cybersecurity, and streamline administration.

Featured Content

Security at SAP TechEd 2019

Come visit us at SAP TechEd 2019, featuring a wealth of sessions on enterprise security in the cloud and in hybrid landscapes. Check out our security-related sessions now.

Get the details

Configure Network Edge Authentication

The network edge authentication feature, based on SAP’s web dispatcher and SAP Single Sign-On, provides integrated, simple, and secure web access control for SAP solutions by controlling access to on-premise systems from untrusted networks.

Read the blog

Webinar Recording Available

The recording of the recent knowledge transfer webinar about SAP Single Sign-On is now available! Learn about typical single sign-on scenarios and the latest enhancements of the current product version 3.0 Support Package 2.

Watch the recording

Expert Content

Kerberos/SPNEGO

You can use Kerberos/SPNEGO authentication tokens to easily implement a single sign-on solution for your SAP systems. This requires little implementation effort, but provides a considerable simplification to your employees' authentication processes.

Learn more

Digital Certificates

Implement single sign-on with digital certificates (X.509) for your SAP and non-SAP systems. Use our out-of-the box solution via the Secure Login Server or your own public key infrastructure (PKI).

Learn more

SAML 2.0

Use the identity provider component of SAP Single Sign-On to establish single sign-on across company domains or in the cloud using Security Assertion Markup Language (SAML) 2.0.

Learn more

Mobile Single Sign-On

SAP Single Sign-On supports single sign-on from mobile devices, offering both a simple and secure solution for mobile access to your corporate business processes.

Learn more

Enterprise Security

SAP Single Sign-On offers support for advanced security solutions that will help you to improve your corporate security, such as two-factor and risk-based authentication, RFID-based authentication, digital signatures, network edge authentication, and certificate lifecycle management.

Get started now