If your extension application needs to do read and write operations from/to an SAP ByD tenant, you must configure the connectivity to enable the use of ByD OData APIs.
The connectivity configuration, which is common to all the extension applications that are deployed in an SAP CP Cloud Foundry subaccount, is defined at SAP CP subaccount level. This ensures consistency in the integration configuration between the extension applications deployed in an SAP CP subaccount and SAP ByD tenant.
If the ByD extension application requires no user propagation or requires no UI integration, which means the embedding of the SAP ByD extension application UIs in SAP ByD standard UIs, then HTTP destination with basic authentication can be used to configure the connectivity between the SAP CP subaccount and SAP ByD tenant.
The connectivity configuration steps, which are outlined below, are required to set up HTTP destination with basic authentication.
Configuring Connectivity with Basic Authentication
On the SAP ByD side:
Create a user with authorization to access SAP ByD OData APIs. Such a user in SAP ByD is a business user with access rights to the work centers and work center views. For detailed information regarding users and access right assignments refer to Business Users Quick Guide. This user will be used to configure an HTTP destination with basic authentication.
On the SAP CP side:
Follow the steps below to create an HTTP destination with basic authentication using the credentials of the user that you created on the SAP ByD side.
Logon to the SAP CP cockpit and select your Cloud Foundry subaccount.
Select the Connectivity → Destinations and click on New Destinations.
Configure the setting as shown in the table below.
Enter meaningful name
Enter meaningful description (Optional)
https:// my< ByD tenant name>.sapbydesign.com
Enter the user name of SAP ByD User that you have created previously
Enter the password of the SAP ByD User that you have created previously
Configure the required additional property. To do so, in the Additional Properties panel, choose New Property, and enter the following property:
Select the Use default JDK truststore checkbox.
Save the entries.
Follow the link below to go to the next blog post in the blog post series: