SAP Supplier Lifecycle Management 2.0: Document Version: 1.1 - 2014-08-18
SAP Supplier Lifecycle Management 2.0: Document Version: 1.1 - 2014-08-18
SAP Supplier Lifecycle Management 2.0: Document Version: 1.1 - 2014-08-18
PUBLIC
Copyright 2014 SAP AG. Alle Rechte vorbehalten. All rights reserved. Tous droits rservs.
.
Weitergabe und Vervielfltigung dieser Publikation oder von Teilen daraus sind, zu welchem Zweck und in welcher
Form auch immer, ohne die ausdrckliche schriftliche Genehmigung durch SAP AG nicht gestattet. In dieser
Publikation enthaltene Informationen knnen ohne vorherige Ankndigung gendert werden.
No part of this publication may be reproduced or transmitted in any form or for any purpose without the express
permission of SAP AG. The information contained herein may be changed without prior notice.
No part of this publication may be reproduced or transmitted in any form or for any purpose without the express
permission of SAP AG. The information contained herein may be changed without prior notice.
Some software products marketed by SAP AG and its distributors contain proprietary software components of
other software vendors.
Microsoft, Windows, Excel, Outlook, and PowerPoint are registered trademarks of Microsoft Corporation.
IBM, DB2, DB2 Universal Database, System i, System i5, System p, System p5, System x, System z, System z10,
System z9, z10, z9, iSeries, Speries, xSeries, zSeries, eServer, z/VM, z/OS, i5/OS, S/390, OS/390, OS/400, AS/
400, S/390 Parallel Enterprise Server, PowerVM, Power Architecture, POWER6+, POWER6, POWER5+, POWER5,
POWER, OpenPower, PowerPC, BatchPipes, BladeCenter, System Storage, GPFS, HACMP, RETAIN, DB2
Connect, RACF, Redbooks, OS/2, Parallel Sysplex, MVS/ESA, AIX, Intelligent Miner, WebSphere, Netfinity, Tivoli
and Informix are trademarks or registered trademarks of IBM Corporation.
Linux is the registered trademark of Linus Torvalds in the U.S. and other countries.
Adobe, the Adobe logo, Acrobat, PostScript, and Reader are either trademarks or registered trademarks of Adobe
Systems Incorporated in the United States and/or other countries.
Oracle is a registered trademark of Oracle Corporation.
UNIX, X/Open, OSF/1, and Motif are registered trademarks of the Open Group.
Citrix, ICA, Program Neighborhood, MetaFrame, WinFrame, VideoFrame, and MultiWin are trademarks or
registered trademarks of Citrix Systems, Inc.
HTML, XML, XHTML and W3C are trademarks or registered trademarks of W3C, World Wide Web Consortium,
Massachusetts Institute of Technology.
Java is a registered trademark of Sun Microsystems, Inc.
JavaScript is a registered trademark of Sun Microsystems, Inc., used under license for technology invented and
implemented by Netscape.
SAP, R/3, xApps, xApp, SAP NetWeaver, Duet, PartnerEdge, ByDesign, SAP Business ByDesign, and other SAP
products and services mentioned herein as well as their respective logos are trademarks or registered trademarks
of SAP AG in Germany and in several other countries all over the world. All other product and service names
mentioned are the trademarks of their respective companies. Data contained in this document serves
informational purposes only. National product specifications may vary.
These materials are subject to change without notice. These materials are provided by SAP AG and its affiliated
companies (SAP Group) for informational purposes only, without representation or warranty of any kind, and
SAP Group shall not be liable for errors or omissions with respect to the materials. The only warranties for SAP
Group products and services are those that are set forth in the express warranty statements accompanying such
products and services, if any. Nothing herein should be construed as constituting an additional warranty.
Some components of this product are based on Java. Any code change in these components may cause
unpredictable and severe malfunctions and is therefore expressly prohibited, as is any decompilation of these
components.
Any Java Source Code delivered with this product is only to be used by SAPs Support Services and may not be
modified or altered in any way.
PUBLIC
Copyright 2014 SAP AG.
All rights reserved.
Typographic Conventions
Table 1
Example
Description
<Example>
Angle brackets indicate that you replace these words or characters with appropriate entries
to make entries in the system, for example, Enter your <User Name>.
Example
Example
Arrows separating the parts of a navigation path, for example, menu options
Example
Example
Words or characters that you enter in the system exactly as they appear in the
documentation
www.sap.com
/example
Quicklinks added to the internet address of a homepage to enable quick access to specific
content on the Web
123456
Example
Words or characters quoted from the screen. These include field labels, screen titles,
pushbutton labels, menu names, and menu options.
Example
File and directory names and their paths, names of variables and parameters, and
names of installation, upgrade, and database tools
EXAMPLE
Technical names of system objects. These include report names, program names,
transaction codes, database table names, and key concepts of a programming language
when they are surrounded by body text, for example, SELECT and INCLUDE
EXAMPLE
PUBLIC
Copyright 2014 SAP AG.
All rights reserved.
Document History
Caution
Before you start the implementation, make sure you have the latest version of this document. You can find the
latest version at the following location: service.sap.com/securityguide.
The following table provides an overview of the most important document changes.
Table 2
Version
Date
Description
1.0
2014-07-28
Initial version of the Security Guide for SAP Supplier Lifecycle Management 2.0.
1.1
2014-08-18
Chapter Data Protection: Paragraphs added about blocking of personal data (business
partner) and about sample configuration for read access logging (RAL).
PUBLIC
Copyright 2014 SAP AG.
All rights reserved.
Content
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
15
5
5.1
5.2
5.3
29
29
31
31
Authorizations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
8
8.1
8.2
10
11
11.1
11.2
Data Protection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54
Deletion of Personal Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55
Read Access Logging . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56
12
57
13
59
14
15
PUBLIC
Copyright 2014 SAP AG.
All rights reserved.
38
PUBLIC
Copyright 2014 SAP AG.
All rights reserved.
Introduction
Caution
This guide does not replace the administration or operation guides that are available for productive operations.
This guide is not included as part of the Installation Guides, Configuration Guides, Technical Operation Manuals,
or Upgrade Guides. Such guides are only relevant for a certain phase of the software life cycle, whereas the
Security Guides provide information that is relevant for all life cycle phases.
Recommendation
We strongly recommend that you additionally consult the SAP NetWeaver Security Guide.
PUBLIC
Copyright 2014 SAP AG.
All rights reserved.
service.sap.com/securityguide
Guides
SAP NetWeaver
SAP Security
See
Guides
service.sap.com/securityguide
SAP Security
SAP SRM
See
or higher
Guides
service.sap.com/securityguide
SAP Security
SAP ERP
See
service.sap.com/securityguide
Guides
SAP Security
Governance
See
help.sap.com
Cloud
SAP Jam
Administrator
Guide
For a complete list of the available SAP Security Guides, see service.sap.com/securityguide on the SAP Service
Marketplace.
Title
Comment
2027120
Installation: RIN
517484
Communication Framework
PUBLIC
Copyright 2014 SAP AG.
All rights reserved.
Title
Comment
1251255
BATCH)
In addition, you can find a list of security-relevant SAP Hot News and SAP Notes on SAP Service Marketplace at
service.sap.com/securitynotes.
Configuration
The steps you must perform to configure SAP Supplier Lifecycle Management in a secure manner are mentioned
in this document. For more information, see SAP Help Portal at help.sap.com/slc <release> Configuration
and Deployment Information Configuration Guide Basic Settings for SAP Supplier Lifecycle Management
Technical Basic Settings
Additional Information
For more information about specific topics, see the Quick Links as shown in the table below.
Table 5: Quick Links to Additional Information
Content
Security
sdn.sap.com/irj/sdn/security
Security Guides
service.sap.com/securityguide
service.sap.com/notes
service.sap.com/securitynotes
Released Platforms
service.sap.com/pam
Network Security
service.sap.com/securityguide
service.sap.com/solutionmanager
SAP NetWeaver
sdn.sap.com/irj/sdn/netweaver
PUBLIC
Copyright 2014 SAP AG.
All rights reserved.
The following graphic gives an overview of a possible technical system landscape of SAP Supplier Lifecycle
Management (SAP SLC). As an example, the system landscape for the standalone deployment is used.
Figure1: System Landscape for Standalone Deployment of SAP Supplier Lifecycle Management
SAP Supplier Lifecycle Management is split into the sell side and the buy side. Suppliers operate only outside the
firewall (sell side), whereas purchasers only operate behind the firewall (buy side). To enable communication
between the buy side and the sell side, you have the following options:
Point-to-Point communication via asynchronous enterprise services, using Web Services Reliable Messaging
(WSRM).
Communication via asynchronous enterprise services, using SAP NetWeaver Process Integration (SAP
NetWeaver PI)
For an overview of all supported deployment modes, see the Master Guide for SAP Supplier Lifecycle
Management on SAP Service Marketplace at service.sap.com/slc-inst.
The following graphic gives an overview of the user interface components in SAP Supplier Lifecycle Management
(SAP SLC):
10
PUBLIC
Copyright 2014 SAP AG.
All rights reserved.
The table below gives an overview of the user interface components used in SAP Supplier Lifecycle Management
and where you can find more information in the SAP NetWeaver Security Guide that is available on the SAP Help
Portal at help.sap.com/netweaver SAP NetWeaver Platform <release> Security Information .
Table 6
Comment
More Information
SAP NetWeaver Security Guide
Security
(BSP)
Technologies
side.
WebClient UI Framework
(Web CUIF)
Guide
Security
Portal Security
PUBLIC
Copyright 2014 SAP AG.
All rights reserved.
11
Comment
More Information
Client (NWBC)
NetWeaver Platform
Enhancement Package 2
NetWeaver
BSP screens.
Technology
Client
SAP
SAP
7 Security Aspects
ABAP
Registering Suppliers
Qualifying Suppliers
Within the DMZ, we recommend that you use the SAP Web Dispatcher as an application gateway and as a reverse
proxy between the Internet and your SAP Supplier Lifecycle Management system that consists of one or more
SAP NetWeaver Application Servers. Thus, you have only a single point of access for HTTP(S) requests in your
system.
An application gateway allows you to ensure that your URLs and ports for the systems are not known to users
outside the external firewall, while you can configure them to fit your requirements behind the internal firewall. In
this way, the SAP Supplier Lifecycle Management security concept follows the general SAP security standards
used worldwide.
SAP Web Dispatcher is connected to the Internet Communication Manager (ICM) using the internal firewall of the
DMZ. SAP Web Dispatcher also balances the load so that the request is always sent to the server with the greatest
capacity.
For more information about SAP Web Dispatcher, see SAP Help Portal at help.sap.com/netweaver SAP
NetWeaver Platform SAP NetWeaver 7.0 including Enhancement Package 2 Application Help SAP Library
SAP NetWeaver SAP NetWeaver by Key Capability Solution Life Cycle Management by Key Capability System
Management SAP Web Dispatcher or the corresponding documentation for higher releases of SAP
NetWeaver.
Data Exchange Between SAP SLC Buy Side and SAP SLC Sell Side
Customers often want to run individual components of the software in different network zones for security
reasons. Here, our target applications are the Internet-facing applications (the applications that can be accessed
by individuals or organizations over the public Internet). The graphic below shows the network zones used in SAP
Supplier Lifecycle Management.
12
PUBLIC
Copyright 2014 SAP AG.
All rights reserved.
Only data relevant for suppliers is replicated to the sell side of SAP Supplier Lifecycle Management. All other data
is only stored on the buy side. The replication of data is performed using SOA, WSRM, or RFC. If you transfer data
using SOA or WSRM and you want to influence the data that is transferred to the sell side, you can use the BAdIs
from the corresponding inbound SOA implementations on the sell side.
More Information:
Information about the data transferred using RFC connections can be seen in the signature of the function
modules used. For a list of the RFC function modules used in SAP Supplier Lifecycle Management, see
section Network Communications.
Documentation about the data transferred using SOA messages is available on the SAP Help Portal at
help.sap.com/slc <release> Application Help SAP Supplier Lifecycle Management Technical
Concepts Enterprise Services .
More Information
For more information about the technical system landscape, see the resources listed in the table below.
Table 7
Topic
Guide/Tool
Master Guide
service.sap.com/srm-inst
www.sdn.sap.com/irj/sdn/ha
Solutions
PUBLIC
Copyright 2014 SAP AG.
All rights reserved.
13
Topic
Guide/Tool
www.sdn.sap.com/irj/sdn/landscapedesign
Security
www.sdn.sap.com/irj/sdn/security
14
PUBLIC
Copyright 2014 SAP AG.
All rights reserved.
This chapter gives an overview of the security mechanisms that are available in the business processes of SAP
Supplier Lifecycle Management. It also describes how you can modify the existing mechanisms and take
additional measures, if required. The business processes of SAP Supplier Lifecycle Management are:
Registering Suppliers
Qualifying Suppliers
Classifying Suppliers
Managing Activities
Registering Suppliers
The figure below shows the data flow of the Registering Suppliers process:
PUBLIC
Copyright 2014 SAP AG.
All rights reserved.
15
The table below lists the process steps and the security mechanisms available:
Table 8
Step
Description
Security Mechanism
side.
User
Integration of CAPTCHA .
n/a
n/a
n/a
16
PUBLIC
Copyright 2014 SAP AG.
All rights reserved.
Step
Description
An approval step on the buy side determines whether the An approval workflow is available that allows you to
registration data is accepted or rejected.
Security Mechanism
Application Help
Technical Concepts
Approval
Processes .
7
n/a
system sends the data of the potential supplier to the sell communication with a technical user who is assigned a
side.
10
n/a
The sell-side system automatically creates a user (can be When you create your own role for this task, ensure that
displayed in transaction SU01) with the Initial Supplier (/
Details.
13
generated by the system (can be displayed in transaction By default, the user ID and password are valid for 31
SU01).
days. If required, you can change the validity period. You
can do this in Customizing for SAP Supplier Lifecycle
Management under
Sell Side
Supplier Registration
PUBLIC
Copyright 2014 SAP AG.
All rights reserved.
17
Step
Description
Security Mechanism
Maintain Customer Settings for Supplier Registration .
For more information, see SAP Note 1876166.
15
administrator account.
generated user ID. This alias must be used for all further
log-on activities of the administrator.
16
EMPLOYEE_ADMINISTRATOR)
SUPPLIER_MASTER_DATA)
QUALIFICATION_EXPERT)
17
n/a
You can add your own fields or hide SAP-delivered fields used for Registering Suppliers by extending the SAP
screens. Users doing this must have the role Buy-Side/ Sell-Side: Administrator for Extensibility (SRMSMC/
ADMINISTRATOR). For more information about the extensibility concept, see SAP Help Portal at
slc <release> Configuration and Deployment Information
Interface by Adding Customer Fields.
help.sap.com/
Company data
Contact details
Employee data
Attachments
Certificates
18
PUBLIC
Copyright 2014 SAP AG.
All rights reserved.
The table below lists the process steps and the security mechanisms available:
Table 9
Step
Description
Security Mechanism
n/a
When the user saves the entries, the data is stored in the database on the
n/a
sell side. The status of the data is Update Pending until the change is
confirmed on the buy side.
3
The updated supplier data is transferred to the buy side using RFC, SAP
Additional Applications.
For information about workflow in
SAP Supplier Lifecycle Management,
see SAP Help Portal at
help.sap.com/slc
<release>
Application Help
SAP Supplier
PUBLIC
Copyright 2014 SAP AG.
All rights reserved.
19
Step
Description
Security Mechanism
Lifecycle Management
Concepts
5a
5b
Technical
Approval Processes .
If the change of the supplier data is approved, the data is updated on the
database and transferred to the sell side and the back-end system(s). The
supplier data is also updated on the sell side. The sell-side system sends an
e-mail to the supplier, informing him about the approval of the data
changes.
Communication Destinations.
If the change of the supplier data is rejected, the changes on the sell side are n/a
discarded. An e-mail is sent from the sell side to the supplier about the
rejection of the changes.
You can add your own fields or hide SAP-delivered fields used for Maintaining Supplier Data by extending the SAP
screens. Users doing this must have the role Buy-Side/ Sell-Side: Administrator for Extensibility (SRMSMC/
ADMINISTRATOR). For more information about the extensibility concept, see SAP Help Portal at
slc <release> Configuration and Deployment Information
Interface by Adding Customer Fields..
help.sap.com/
Qualifying Suppliers
The figures below shows the data flow of the Qualifying Suppliers process.
20
PUBLIC
Copyright 2014 SAP AG.
All rights reserved.
The table below lists the process steps and the security mechanisms available:
Table 10
Step
Description
Security Mechanism
n/a
n/a
request.
Note: If the qualification is triggered automatically after
the approval of a registration request, steps 1 and 2 are
performed automatically by the buy side of SAP Supplier
Lifecycle Management.
3
n/a
database.
A copy of the qualification request is transferred to the
sell side.
4
n/a
PUBLIC
Copyright 2014 SAP AG.
All rights reserved.
21
Step
Description
Security Mechanism
n/a
n/a
10, 11
12
13
n/a
n/a
Evaluating Suppliers
You can use the following variants of the Evaluating Suppliers process:
22
PUBLIC
Copyright 2014 SAP AG.
All rights reserved.
The appraiser has a valid user ID with the Appraiser role (/SRMSMC/EVALUATION_APPRAISER).
The appraiser has no user ID but a valid e-mail address. The appraiser is then automatically logged on with a
service user that is common to all appraisers without system user ID. This user requires the role Appraiser
without User ID (/SRMSMC/EVL_APPRAISER_NON_USER). To ensure that each appraiser can only fill out
questionnaires that are intended for him or her, a hash function has been implemented.
For more information about the configuration of supplier evaluation by appraisers without user ID, see SAP
Help Portal at help.sap.com/slc <release> Configuration and Deployment Information Configuration
Guide SAP Supplier Lifecycle Management , section Configuring Supplier Evaluation for Appraisers Without a
User ID.
By default, access for appraisers without system users is deactivated. You can activate this function in
Customizing for SAP Supplier Lifecycle Management under Buy Side Supplier Evaluation Basic Settings
for Supplier Evaluation Activate Appraisers Without User ID .
The figures below show two variants of the data flow of the Managing the Supplier Portfolio process:
PUBLIC
Copyright 2014 SAP AG.
All rights reserved.
23
Figure9: Managing the Supplier Portfolio Leading System: SAP SLC Buy Side
The system connection between SAP SLC buy side and the back-end systems is based on RFC.
Figure10: Managing the Supplier Portfolio Leading System: SAP ERP or MDG
24
PUBLIC
Copyright 2014 SAP AG.
All rights reserved.
If you use SAP ERP or Master Data Governance (MDG) as the leading system, you can create suppliers in these
systems. The system connections between SAP SLC buy side and the leading systems is based on the following
technologies:
SOA (WSRM or SAP NetWeaver PI) between SAP SLC buy side and MDG
The system users that enable the RFC connections must be assigned one of the following roles, as applicable:
Buy-Side RFC Inbound Processing when Transferring the Supplier Data (/SRMSMC/
RFC_SUP_MNGT_BUYSIDE)
Sell-Side RFC Inbound Processing when Transferring the Supplier Data (/SRMSMC/
RFC_SUP_MNGT_SELLSIDE)
RFC Inbound Processing in ERP with CVI when Transferring Supplier Data from SLC
(SAP_ERP_SLC_RFC_SUP_MNGT_BP)
RFC Inbound Processing in ERP when Transferring Supplier Data from SLC (SAP_ERP_SLC_RFC_SUP_MNGT)
RFC Inbound Processing in SRM IC when Transferring Supplier Data from SLC
(SAP_SRM_SLC_RFC_SUP_MNGT)
For more information, see section Communication Destinations. For more information about how to implement
RFC connections, about RFC users, and about the roles required, see SAP Help Portal at help.sap.com/slc
<release> Configuration and Deployment Information Configuration Guide Basic Settings for SAP Supplier
Lifecycle Management Technical Basic Settings Define RFC Connections Defining Process-Specific RFC
Connections .
To modify the data transfer to the receiving systems, you can use the BAdIs that are available in the following
places:
Customizing for the SAP ERP integration component under SAP Customizing Implementation Guide
Integration with Other SAP Components SAP Supplier Lifecycle Management Business Add-Ins
(BAdIs) Supplier Integration
Customizing for the SAP SRM integration component under SAP Implementation Guide Integration with
Other SAP Components SAP Supplier Lifecycle Management Business Add-Ins (BAdIs) Supplier
Integration
Buy Side
PUBLIC
Copyright 2014 SAP AG.
All rights reserved.
25
Classifying Suppliers
In this process, all activities are carried out on the buy side of SAP Supplier Lifecycle Management. There is no
data transfer to the sell side or the back-end systems.
Security Measures
Implement a virus scanner that scans the attachments before they are uploaded by classification managers. For
more information, see section Security for Additional Applications. For all other security aspects, the standard
security mechanisms provided by SAP NetWeaver are sufficient.
Two roles are available for the Classifying Suppliers process:
Users with the Classification Manager (/SRMSMC/CLASSIFICATION_MANAGER) role can create classification
profiles and edit classification data.
Users with the Display Role for Classification (/SRMSMC/CLASSIFICATION_DISPLAY) can display but not
create or edit classification data.
For more information about the business process, see SAP Help Portal at help.sap.com/slc <release>
Configuration and Deployment Information Configuration Guide Business Processes Classifying Suppliers .
26
PUBLIC
Copyright 2014 SAP AG.
All rights reserved.
Figure12
The table below lists the process steps and the security mechanisms available:
Table 11
Step
Description
Security Mechanism
n/a
n/a
n/a
Processor (/SRMSMC/SUPPLIER_TSK_PROCESSOR)
applicable.
6
database.
PUBLIC
Copyright 2014 SAP AG.
All rights reserved.
27
Step
Description
Security Mechanism
is saved on the database. For more information, see
section Security for Additional Applications.
n/a
Security Measures
For the Managing Activities process, the following roles are available on the buy side:
Note that the corresponding Portal roles are not delivered by SAP. If you run SAP Supplier Lifecycle Management
in an SAP NetWeaver Portal environment, you must create the Portal roles as described in SAP Note 1685257 Upload of SAP delivered NWBC Roles to SAP NetWeaver Portal.
28
PUBLIC
Copyright 2014 SAP AG.
All rights reserved.
SAP Supplier Lifecycle Management applies the user management and authentication mechanisms provided with
the SAP NetWeaver platform, in particular the SAP NetWeaver Application Server ABAP. Therefore, the security
recommendations and guidelines for user administration and authentication as described in the Security Guide
for SAP NetWeaver Application Server ABAP are also valid for SAP Supplier Lifecycle Management. You can find
these guidelines on the SAP Help Portal at help.sap.com/netweaver SAP NetWeaver Platform SAP NetWeaver
7.0 including Enhancement Package 2 Application Help SAP Library SAP NetWeaver SAP NetWeaver by
Key Capability Security User Authentication and Single Sign-On or the corresponding documentation for
higher releases of SAP NetWeaver.
In addition to these guidelines, you can find information that applies specifically to SAP Supplier Lifecycle
Management in the following sections of this guide:
User Management
This sections lists the tools for user management, the types of users required, and the standard users that
are delivered with SAP Supplier Lifecycle Management.
5.1
User Management
For an overview of how the security mechanisms available in SAP NetWeaver apply to SAP Supplier Lifecycle
Management, see the sections below.
Tool
Description
Transaction PFCG
PUBLIC
Copyright 2014 SAP AG.
All rights reserved.
29
Tool
Description
SUP_SELFREG_SELLSIDE).
The initial user creates an administrator account for his
administration screens/
default_host/sap/bc/bsp/srmsmc/SRMSMC/
ROS_EXT_2.
On the sell side, users with the role Supplier Master Data
delete, lock, and unlock users for their company. These users
default_host/sap/bc/bsp/srmsmc/SRMSMC/
Tool
Description
More Information
SAP
Package 2
Library
Application Help
by Key Capability
contact persons.
Management
SAP NetWeaver
SAP
SAP NetWeaver
Security
Identity
of AS ABAP
SAP
Package 2
Library
Application Help
SAP NetWeaver
by Key Capability
Management
Security
SAP
SAP NetWeaver
Identity
or the corresponding
User Types
It is often necessary to specify different security policies for different types of users. For example, your policy may
foresee that individual users who perform tasks interactively have to change their passwords on a regular basis.
For users enabling background processing this may not be required.
The user types that are required for SAP Supplier Lifecycle Management include the following technical users:
30
A system user for the execution of the workflow. You must create such a system user, for example WFBATCH.
Caution
This user should not be assigned the authorization profile SAP_ALL.
Instead, this user should be assigned the following roles:
For more information about the above user types, see User Types in the SAP NetWeaver Application Server ABAP
Security Guide.
Integration of CAPTCHA
You can use a BAdI to implement a confirmation prompt to prevent denial-of-service attacks. The BAdI enables
you to include any third-party CAPTCHA product to your Supplier Registration web page. CAPTCHA asks users to
read a string of distorted characters and type them correctly. (CAPTCHA is the acronym for Completely
Automated Public Turing test to tell Computers and Humans Apart). You can implement the BAdI in Customizing
for SAP Supplier Lifecycle Management under Sell Side Supplier Registration Business Add-Ins
Implementation of the CAPTCHA Function .
5.2
If you use the Central User Administration (CUA) or SAP Identity Management for distributing users to the sell
side, you must do the following either manually or using a BAdI to use the distributed user accounts:
Create a business partner of type Contact Person for the user in the sell-side system.
5.3
SAP Supplier Lifecycle Management supports the Single Sign-On (SSO) mechanisms provided by SAP NetWeaver
AS ABAP. Therefore, the security recommendations and guidelines for user administration and authentication as
PUBLIC
Copyright 2014 SAP AG.
All rights reserved.
31
described in the SAP NetWeaver Application Server ABAP Security Guide also apply to SAP Supplier Lifecycle
Management.
For more information about the available authentication mechanisms, see SAP Help Portal at help.sap.com/
netweaver SAP NetWeaver Platform SAP NetWeaver 7.0 including Enhancement Package 2 Application
Help SAP Library SAP NetWeaver SAP NetWeaver by Key Capability Security User Authentication and
Single Sign-On or the corresponding documentation for higher releases of SAP NetWeaver.
32
PUBLIC
Copyright 2014 SAP AG.
All rights reserved.
Authorizations
SAP Supplier Lifecycle Management uses the authorization concept provided by SAP NetWeaver AS ABAP.
Therefore, the recommendations and guidelines for authorizations as described in the SAP NetWeaver Security
Guide also apply to SAP Supplier Lifecycle Management. The SAP NetWeaver authorization concept is based on
assigning authorizations to users based on roles. For role maintenance, use the profile generator (transaction
PFCG) on the AS ABAP. For more information, see SAP Help Portal at help.sap.com/netweaver SAP NetWeaver
Platform SAP NetWeaver 7.0 including Enhancement Package 2 Application Help SAP Library SAP
NetWeaver SAP NetWeaver by Key Capability Security Identity Management User and Role Administration
of AS ABAP or the corresponding documentation for higher releases of SAP NetWeaver.
Standard Roles
The table below shows the business roles that are available for the buy side of SAP Supplier Lifecycle
Management.
Table 14: Standard Roles Buy Side
Role
Description
/SRMSMC/CATEGORY_MANAGER
Category Manager
/SRMSMC/CLASSIFICATION_MANAGER
Classification Manager
/SRMSMC/CLASSIFICATION_DISPLAY
/SRMSMC/QUESTIONNAIRE_MANAGER
Questionnaire Manager
/SRMSMC/CERTIFICATE_MANAGER
Certificate Manager
/SRMSMC/ACTIVITY_MANAGER
Activity Manager
/SRMSMC/ACTIVITY_PARTICIPANT
Participant in Activity
/SRMSMC/EVALUATION_APPRAISER
Appraiser
/SRMSMC/APPROVER
Approver
/SRMSMC/TRANSLATOR
Translator
/SRMSMC/ADMINISTRATOR
Administrator
The table below shows the business roles that are available for the sell side of SAP Supplier Lifecycle
Management.
Table 15: Standard Roles Sell Side
Role
Description
/SRMSMC/SUPPLIER_INITIAL
Initial Supplier
/SRMSMC/EMPLOYEE_ADMINISTRATOR
Employee Administrator
/SRMSMC/SUPPLIER_MASTER_DATA
/SRMSMC/QUALIFICATION_EXPERT
Qualification Expert
PUBLIC
Copyright 2014 SAP AG.
All rights reserved.
33
Role
Description
/SRMSMC/SUPPLIER_TSK_PROCESSOR
/SRMSMC/ADMINISTRATOR
Administrator
The table below shows the technical roles that are available for the buy side and the sell side of SAP Supplier
Lifecycle Management.
Table 16: Technical Roles Buy Side or Sell Side
Role
Description
/SRMSMC/EVL_APPRAISER_NON_USER
/SRMSMC/REPORT_EXEC_ADMIN
/SRMSMC/SUP_SELFREG_SELLSIDE
For more information about the roles listed above, see SAP Help Portal at help.sap.com/slc
Application Help SAP Supplier Lifecycle Management Technical Concepts Roles .
<release>
Point-to-Point Enablement
34
PUBLIC
Copyright 2014 SAP AG.
All rights reserved.
actions are defined in the sell-side system in Customizing for SAP Supplier Lifecycle Management under Sell
Side Determine Actions . You define which screens and activities users can access by assigning them a role
containing this authorization object and selecting the corresponding actions, for example action
employee.detail.edit, or certificates, or others. This approach is comparable to the transaction
authorization in SAPGUI, or to the S_START authorization in Web Dynpro for ABAP.
As the type of business object that the user can access, you can specify the following:
Questionnaire (/SRMSMC/BO_QNR)
Certificate (/SRMSMC/MO_CRT)
Activity (/SRMSMC/BO_ACT)
Task (/SRMSMC/BO_TSK)
As actions that the user can perform, you can specify, for example, Display, Edit, and Create.
The authorization object is used in the Category Manager, Questionnaire Manager, Translator, Classification
Manager, Certificate Manager, and Questionnaire Expert roles, for example. This has the following effect:
Category managers can display all objects in the question library (sections, questions, and groups), but they
cannot create or edit question library objects.
Category managers can display but not create and edit questionnaires.
Questionnaire managers can display, create, and edit objects in the question library.
Translators cannot create any objects but can edit questions, sections, and certificate types.
Activity managers can display, create, and edit activities and tasks.
Participants in activities can display activities, and they can display and edit tasks.
When users access business objects from a POWL, the main business object is always called in Edit mode.
Other business objects appearing in the same POWL are called in Display mode.
When users access a business object as a result of navigating from another business object, it is called in
Display mode.
PUBLIC
Copyright 2014 SAP AG.
All rights reserved.
35
Setting one of the above checkboxes in a role has the following effects on users to whom the role has been
assigned:
The users can perform the activities intended for this role. Note that, in addition to the checkbox in the
personalization object, performing these activities also depends on the authorization objects assigned to the
role.
Only users for whom the personalization object checkbox is selected are considered during a search, for
example for an Appraiser, a Purchaser Responsible.
Example
For a user to be found in a search for Purchaser Responsible, the Category Manager Role , the
Classification Manager Role, the Questionnare Manager Role or the Activity Manager
Role checkboxes are required, depending on the process where the search is performed.
36
PUBLIC
Copyright 2014 SAP AG.
All rights reserved.
Critical Combinations
We recommend that you do not assign the Appraiser and the Category Manager role to the same person. Under
exceptional circumstances, such as Category Managers filling out questionnaires for other colleagues, you can
grant both roles to the same person.
PUBLIC
Copyright 2014 SAP AG.
All rights reserved.
37
To increase security and prevent access to the SAP logon ticket and security session cookie(s), you must activate
secure session management via https. SAP Supplier Lifecycle Management only supports Secure Sockets Layer
(SSL) technology to protect the network communications where security-relevant cookies are involved.
Profile Parameter
Recommended Value
Comment
icf/set_HTTPonly_flag_on_cookies
Client-dependent
login/ticket_only_by_https
Not client-dependent
HTTPS connections
For more information, a list of the relevant profile parameters, and detailed instructions, see SAP Help Portal at
help.sap.com/netweaver SAP NetWeaver Platform SAP NetWeaver 7.0 including Enhancement Package 2
Application Help SAP Library SAP NetWeaver SAP NetWeaver by Key Capability Security User
Authentication and Single Sign-On Authentication on the AS ABAP Using SAML 2.0 Activating HTTP Security
Session Management on AS ABAP or the corresponding documentation for higher releases of SAP NetWeaver.
38
PUBLIC
Copyright 2014 SAP AG.
All rights reserved.
Your network infrastructure is extremely important in protecting your system. Your network needs to support the
communication that is required for your business without allowing unauthorized access. A well-defined network
topology can eliminate many security threats based on software flaws (at both the operating system and
application level) or network attacks such as eavesdropping. If users cannot log on to your application or database
servers at the operating system or database layer, there is no way for intruders to compromise the machines and
gain access to the backend systems database or files. Additionally, if users are not able to connect to the server
LAN (local area network), they cannot exploit well-known bugs and security holes in network services on the
server machines.
The network topology for SAP Supplier Lifecycle Management is based on the topology used by the SAP
NetWeaver platform. Therefore, the security guidelines and recommendations described in the SAP NetWeaver
Security Guide also apply to SAP Supplier Lifecycle Management.
For more information, see the following information on the SAP Help Portal at help.sap.com/netweaver SAP
NetWeaver Platform SAP NetWeaver 7.0 including Enhancement Package 2 Security Information SAP
NetWeaver Security Guide or in the corresponding documentation for higher releases of SAP NetWeaver:
Details about network and communication security that are specific to SAP Supplier Lifecycle Management are
described in the following sections of this document.
8.1
To establish the communication between SAP Supplier Lifecycle Management buy side and sell side, you have the
following options:
Point-to-Point communication via asynchronous enterprise services, using Web Services Reliable Messaging
(WSRM)
Communication via asynchronous enterprise services, using SAP NetWeaver Process Integration (SAP
NetWeaver PI)
Note
From a security point of view, the options using asynchronous enterprises services are preferable.
Communication between SAP Supplier Lifecycle Management and its back-end systems, SAP ERP and
SAP SRM, or with a leading SAP ERP system is always based on remote function calls (RFCs).
Communication between SAP Supplier Lifecycle Management and Master Data Governance (MDG) can be
based on WSRM or SAP NetWeaver PI.
More Information
For more information about SAP NetWeaver Process Integration, see the section Enterprise Services
Security.
PUBLIC
Copyright 2014 SAP AG.
All rights reserved.
39
For information about the configuration of the above communication channels, see SAP Help Portal at
help.sap.com/slc SAP NetWeaver 7.0 including Enhancement Package 2 Configuration and Deployment
Information Configuration Guide Basic Settings for SAP Supplier Lifecycle Management or the
corresponding documentation for higher releases of SAP NetWeaver under:
Point-to-Point Enablement
The table below shows the communication paths used by SAP Supplier Lifecycle Management, the protocol used
for the connection, and the type of data transferred.
Table 18: Communication Paths
Communication Path
Protocol Used
HTTPS
browser to AS ABAP
Communication between sell
side and buy side
WSRM
The Dynamic Information and Action Gateway (DIAG) and RFC connections can be protected using Secure
Network Communications (SNC). HTTPs connections are protected using the Secure Sockets Layer (SSL)
protocol.
More Information
For more information about SNC and SSL, see SAP Help Portal at help.sap.com SAP NetWeaver Platform SAP
NetWeaver 7.0 including Enhancement Package 2 Application Help SAP Library SAP NetWeaver SAP
NetWeaver by Key Capability Security Network and Transport Layer Security Transport Layer Security on the
AS ABAP or the corresponding documentation for higher releases of SAP NetWeaver.
For more information about bgRFCs, see SAP Help Portal at help.sap.com SAP NetWeaver Platform SAP
NetWeaver 7.0 including Enhancement Package 2 Application Help SAP Library SAP NetWeaver SAP
NetWeaver by Key Capability Application Platform by Key Capability Platform-Wide Services Connectivity
Components of SAP Communication Technology Classical SAP Technologies (ABAP) RFC Background
Communication bgRFC (Background Remote Function Call) or the corresponding documentation for higher
releases of SAP NetWeaver.
40
PUBLIC
Copyright 2014 SAP AG.
All rights reserved.
8.2
Communication Destinations
To establish the communication between SAP Supplier Lifecycle Management buy side and sell side, you have the
following options:
Point-to-Point communication via asynchronous enterprise services, using Web Services Reliable Messaging
(WSRM)
Communication via asynchronous enterprise services, using SAP NetWeaver Process Integration (SAP
NetWeaver PI)
Cross-system communication is required to enable the following processes running between the buy side and the
sell side:
Supplier registration
Supplier qualification
For more information, see chapter 4, Security Aspects of Data, Data Flow, and Processes.
User
System
Process
PFCG Role
Buy side
Supplier
registration
SRMSMC/SOA_SUP_REG_BUYSIDE)
This user is required to execute inbound SOA calls that transfer
the supplier registration request from the sell side to the buy side.
Sell side
Supplier
registration
(/SRMSMC/SOA_SUP_REG_SELLSIDE)
This user is required to execute inbound SOA calls that trigger the
rejection e-mail to be sent to potential suppliers after they have
been rejected on the buy side, for example, as the negative result
of an approval workflow on the buy side.
Buy side
Supplier data
maintenance,
Data (/SRMSMC/SOA_SUP_MNGT_BUYSIDE)
including task
processing, in
activity
side.
management
<SOA User 4>
Sell side
Supplier data
maintenance,
Data (/SRMSMC/SOA_SUP_MNGT_SELLSIDE)
including task
This user is required to execute inbound SOA calls on the sell side.
processing, in
PUBLIC
Copyright 2014 SAP AG.
All rights reserved.
41
activity
management
<SOA User 5>
Buy side
Supplier
qualification
SRMSMC/SOA_SUP_QUAL_BUYSIDE)
This user is required to execute inbound SOA calls that transfer
the supplier qualification response from the sell side to the buy
side.
Sell side
Supplier
qualification
SRMSMC/SOA_SUP_QUAL_SELLSIDE)
This user is required to execute inbound SOA calls that transfer
the supplier qualification request from the buy side to the sell
side.
Note
The above roles only contain the required business authorizations. Depending on the technology you use for
system communication, the following additional roles are required:
For point-to-point (P2P) communication using WSRM, also assign the Web Service Consumer role
(SAP_BC_WEBSERVICE_CONSUMER) to the technical users.
For communication through an SAP NetWeaver Process Integration Server, assign the Exchange
Infrastructure: Service User for Application Systems role (SAP_XI_APPL_SERV_USER).
RFC Communication
In SAP Supplier Lifecycle Management, you can use RFC connections as an alternative to SOA communication to
enable communication between the sell side and the buy side, and also between SAP Supplier Lifecycle
Management and its back-end systems. For the RFC connections to work, they must have been assigned to their
respective communication process types in the target systems, that is, in SAP ERP, SAP SRM, or on the sell side
of SAP Supplier Lifecycle Management.
To enable cross-system communication between the buy side and the sell side of SAP SLC and between the buy
side of SAP SLC and its back-end systems, you must create several technical users of the user type Service in all
systems that are involved in the communication. Note that, for security reasons, you must create a separate
technical user for each communication process type. The roles that you assign to these technical users are
specific to the combination of a communication process type and the target system of the RFC. These RFC roles
contain authorizations to execute RFCs (authorization object S_RFC) as well as application-specific authorizations
for inbound processing in the receiving system.
Note
42
The RFC connections listed below mostly use background RFCs (bgRFCs).
The entries in the S/A column indicate whether an RFC call is synchronous (S) or asynchronous (A).
PUBLIC
Copyright 2014 SAP AG.
All rights reserved.
Table 20: Communication Destinations Specific to the Registering Suppliers Process (Communication Process Type Supplier
Registration)
Process Step
Direction of RFC
S/A
Call
Transfer registration
to buy side
/SRMSMC/ROS_REQUEST_INBOUND
to buy side
Suppliers
(/SRMSMC/
RFC_SUP_REG_BUYSIDE)
Send rejection e-mail if
/SRMSMC/
ROS_REGISTRATION_RESP
Processing in Registering
Suppliers
(/SRMSMC/
RFC_SUP_REG_SELLSIDE)
Table 21: Communication Destinations Specific to the Qualifying Suppliers Process (Communication Process Type Supplier
Qualification)
Process Step
Call
Transfer qualification
/SRMSMC/SQQ_CREATE
to sell side
Suppliers
(/SRMSMC/
RFC_SUP_QUAL_SELLSIDE
)
Transfer qualification
to buy side
/SRMSMC/SQR_UPDATE
to buy side
Suppliers
(/SRMSMC/
RFC_SUP_QUAL_BUYSIDE)
Reopen qualification
/SRMSMC/SQR_REOPEN
Suppliers
(/SRMSMC/
side
RFC_SUP_QUAL_SELLSIDE
)
Update qualification
to buy side
/SRMSMC/SQR_RESUBMIT
Suppliers
(/SRMSMC/
side
RFC_SUP_QUAL_BUYSIDE)
PUBLIC
Copyright 2014 SAP AG.
All rights reserved.
43
Table 22: Communication Destinations for Transfer of Supplier Data between SAP SLC Buy Side and Sell Side (Communication
Process Type Supplier Data Management)
Process Step
Call
Initial upload of
deployed on SUS
/SRMSMC/SUPPLIER_GETLIST
/SRMSMC/SUPPLIER_GETDATA
side is deployed on
SUS
RFC_SUP_MNGT_SELLSIDE
)
changes to supplier
/SRMSMC/SUPPLIER_MAIN_CONF
buy side
(/SRMSMC/
RFC_SUP_MNGT_SELLSIDE
)
Upon approval of
registration request on
/SRMSMC/SUPPLIER_CREATE
/SRMSMC/
SUP_CREA_SSIDE_RFCWRAP
RFC_SUP_MNGT_SELLSIDE
side
Transfer standard
product classification
/SRMSCM/SPC_PUBLISH
sell side
(/SRMSMC/
RFC_SUP_MNGT_SELLSIDE
)
Transfer changes to
/SRMSMC/SUPPLIER_MAIN_REQ
RFC_SUP_MNGT_BUYSIDE)
Transfer supplier
/SRMSMC/ATTACHMENT_SEND
RFC_SUP_MNGT_BUYSIDE)
Transfer changes to
side
/SRMSMC/SUPPLIER_CHANGE
/SRMSMC/
SUP_CHG_SSIDE_RFCWRAP
44
PUBLIC
Copyright 2014 SAP AG.
All rights reserved.
Process Step
Call
RFC_SUP_MNGT_SELLSIDE
)
Transfer key mapping
/SRMSMC/
SUPPL_CHANGE_CALLBACK
(/SRMSMC/
changes to supplier
RFC_SUP_MNGT_BUYSIDE)
data
Table 23: Communication Destinations for Upload and Transfer of Supplier Data Between SAP Supplier Lifecycle Management
and SAP ERP (Communication Process Type Supplier Data Management)
Process Step
Call
If Customer Vendor
Integration (CVI) is
SMC_SUPPLIER_GETLIST_BP
SMC_SUPPLIER_GETDATA_BP
upload of suppliers
_RFC_SUP_MNGT_BP)
SLC
If CVI is used:
SMC_SUPPLIER_CREATE_BP
to SAP ERP
_RFC_SUP_MNGT_BP)
If CVI is used:
Distribute changes to
SMC_SUPPLIER_CHANGE_BP
SMC_SUPPLIER_CHANGE_BP_RFCW
RAP
ERP
_RFC_SUP_MNGT_BP)
If CVI is used:
Distribute updates to
SMC_SUPPLIER_UPDATE_BP
SMC_SUPPLIER_UPDATE_BP_RFCW
RAP
ERP
_RFC_SUP_MNGT_BP)
Transfer key mapping
/SRMSMC/
SUPPL_CHANGE_CALLBACK
RFC_SUP_MNGT_BUYSIDE)
PUBLIC
Copyright 2014 SAP AG.
All rights reserved.
45
Process Step
Call
If CVI is not used:
SMC_SUPPLIER_GETLIST
SMC_SUPPLIER_GETDATA
RFC_SUP_MNGT)
If CVI is not used:
SMC_SUPPLIER_CREATE
to SAP ERP
RFC_SUP_MNGT)
If CVI is not used:
Transfer of changes to
SMC_SUPPLIER_CHANGE
SMC_SUPPLIER_CHANGE_RFCWRAP
RFC_SUP_MNGT)
Request creation of
supplier data in
SMC_SUPPLIER_CREATE_MD
RFC_SUP_MNGT)
Request changes to
supplier data in
SMC_SUPPLIER_UPDATE_MD_RFCW
RAP
RFC_SUP_MNGT)
Transfer of changes of
/SRMSMC/
SUPPL_MODIFY_BY_MD_SYS
(/SRMSMC/RFC_
SUP_MNGT_BUYSIDE)
Transfer of changes of
SMC_SUPPLIER_MODIFY_SLC
46
PUBLIC
Copyright 2014 SAP AG.
All rights reserved.
Process Step
Call
Replicate certificate
/SRMSMC/CRT_REPLICATE
RFC_SUP_MNGT_SELLSIDE
)
Replicate purchasing
/SRMSMC/PUC_REPLICATE
side
RFC_SUP_MNGT_SELLSIDE
)
purchasing
BBP_RFC_READ_TABLE
organization and
(SAP_ERP_SLC_
RFC_SUP_MNGT)
purchasing
BBP_OM_FIND_PURCH_ORG_EXT
organization and
accounting group in
(SAP_SRM_
SLC_RFC_SUP_MNGT)
Table 24: Communication Destinations for Upload and Transfer of Supplier Data Between Buy Side of SAP Supplier Lifecycle
Management and SAP SRM (Communication Process Type Supplier Data Management)
Process Step
Call
Perform initial upload
BBP_SUPPLIER_GETLIST
BBP_SUPPLIER_GETDATA
PUBLIC
Copyright 2014 SAP AG.
All rights reserved.
47
Process Step
Call
RFC_SUP_MNGT)
Distribute supplier data SAP SLC buy
from SAP SLC buy side
BBP_SUPPLIER_CREATE
to SAP SRM
RFC_SUP_MNGT)
Transfer changes to
BBP_SUPPLIER_CHANGE
BBP_SUPPLIER_CHANGE_RFCWRAP
person)
RFC_SUP_MNGT)
/SRMSMC/
SUPPL_CHANGE_CALLBACK
response to transfer of
(/SRMSMC/
changes to supplier
RFC_SUP_MNGT_BUYSIDE)
purchasing
BBP_OM_FIND_PURCH_ORG_EXT
it available as input
(SAP_SRM_SLC_
help in Customizing
RFC_SUP_MNGT)
Process Step
Direction of RFC
S/A
/SRMSMC/SRS_CREATE_ASYNC
Call
Creation of follow-on
documents to supplier
Processing in Supplier
evaluation requests
system
Evaluation
(/SRMSMC/BG_SUP_
EVAL_BUYSIDE)
Trigger of creation of
Back-end system
S/A
/SRMSMC/EV_EVENT_INBOUND
Processing in Supplier
Evaluation
non-SAP system,
depending on
customer's BAdI
48
PUBLIC
Copyright 2014 SAP AG.
All rights reserved.
(/SRMSMC/BG_SUP_
EVAL_BUYSIDE)
Process Step
Direction of RFC
S/A
Call
implementation) to
SAP SLC buy-side
system
Table 26: Communication Destinations Specific to the Managing Activities Process (Communication Process Type "Supplier
Data Management"
Process Step
Call
Transfer task from buy
/SRMSMC/TSK_REPLICATE
RFC_SUP_MNGT_SELLSIDE
)
Submit task from sell
to buy side
/SRMSMC/TSK_INT_REPLICATE
(/SRMSMC/
side
RFC_SUP_MNGT_BUYSIDE)
/SRMSMC/TSK_RESEND
(/SRMSMC/
RFC_SUP_MNGT_SELLSIDE
clarification)
/SRMSMC/TSK_INT_RESEND
to buy side
(/SRMSMC/
(clarification from
RFC_SUP_MNGT_BUYSIDE)
supplier)
Description of Role
Name of Role
/SRMSMC/RFC_SUP_MNGT_BUYSIDE
Supplier Data
Sell-Side RFC Inbound Processing when Transferring the
/SRMSMC/RFC_SUP_MNGT_SELLSIDE
Supplier Data
Buy-Side RFC Inbound Processing in Qualifying Suppliers
/SRMSMC/RFC_SUP_QUAL_BUYSIDE
/SRMSMC/RFC_SUP_QUAL_SELLSIDE
PUBLIC
Copyright 2014 SAP AG.
All rights reserved.
49
Description of Role
Name of Role
/SRMSMC/RFC_SUP_REG_BUYSIDE
/SRMSMC/RFC_SUP_REG_SELLSIDE
/SRMSMC/BG_SUP_EVAL_BUYSIDE
SAP_ERP_SLC_RFC_SUP_MNGT_BP
SAP_ERP_SLC_RFC_SUP_MNGT
Note
This role can also be used when SAP ERP is the leading
system.
RFC Inbound Processing in SRM IC when Transferring
SAP_SRM_SLC_RFC_SUP_MNGT
For more information about how to implement RFC connections, about RFC users, and about the roles required,
see SAP Help Portal at help.sap.com/slc <release> Configuration and Deployment Information
Configuration Guide Basic Settings for SAP Supplier Lifecycle Management Technical Basic Settings Define
RFC Connections Defining Process-Specific RFC Connections .
50
PUBLIC
Copyright 2014 SAP AG.
All rights reserved.
The security concept for users accessing Internet Communication Framework (ICF) services involves the
following:
You can avoid modifying SAP content; modifications can be overwritten by future software updates. For
example, if you define logon data directly on the ICF service, this data could be overwritten. In SAP
Supplier Lifecycle Management, you have to specify logon data for the following services:
Table 28
/default_host/sap/bc/bsp/srmsmc/
ros_ext
/default_host/sap/bc/bsp/srmsmc/
eva_cmn
Without User ID
Note
For these ICF services, XSRF protection must be deactivated.
You can create several external aliases for one service. This can be useful, for example, in a system
where the same ICF service is used in several clients.
For information about how to do this and for configuration of these services, see SAP Help Portal at
help.sap.com/slc <release> Configuration and Deployment Information Configuration Guide
Important Settings for ICF Services .
If your firewalls use URL filtering, note the URLs used for the services and adjust your firewall settings accordingly.
For more information, see SAP Help Portal at help.sap.com/netweaver SAP NetWeaver Platform SAP
NetWeaver 7.0 including Enhancement Package 2 Application Help SAP Library SAP NetWeaver SAP
NetWeaver by Key Capability Application Platform by Key Capability Platform-Wide Services Connectivity
PUBLIC
Copyright 2014 SAP AG.
All rights reserved.
51
Components of SAP Communication Technology Communication Between ABAP and Non-ABAP Technologies
Internet Communication Framework Development Server-Side Development Creating and Configuring ICF
Services Activating and Deactivating ICF Services or the corresponding documentation for higher releases of
SAP NetWeaver.
For more information about ICF security, see SAP Help Portal at help.sap.com/netweaver SAP NetWeaver
Platform SAP NetWeaver 7.0 including Enhancement Package 2 Security Information SAP NetWeaver
Security Guide Security Guides for Connectivity and Interoperability Technologies RFC/ICF Security Guide
the corresponding documentation for higher releases of SAP NetWeaver.
52
PUBLIC
Copyright 2014 SAP AG.
All rights reserved.
or
All data is stored in the buy-side and sell-side databases of the SAP Supplier Lifecycle Management system. In
addition, some processes when maintaining supplier master data enable storage of supplier master data and
contact person data in the databases of SAP SRM and SAP ERP.
Attachments
Attachments are stored in the SAP Content Server. This server allows attachment folders to be assigned either of
the following storage categories:
To display the storage category set for your system, see Customizing Implementation Guide under CrossApplication Components Processes and Tools for Enterprise Applications Reusable Objects and Functions for
BOPF Environment Dependent Object Attachment Folder Maintain Attachment Type Schema .
Cookies
The application uses a Web browser. The SAP Web AS must issue cookies and accept them.
PUBLIC
Copyright 2014 SAP AG.
All rights reserved.
53
11
Data Protection
Data protection is associated with numerous legal requirements and privacy concerns. In addition to compliance
with general data privacy acts, it is necessary to consider compliance with industry-specific legislation in different
countries. This section describes the specific features and functions that SAP provides to support compliance
with the relevant legal requirements and data privacy.
This section and any other sections in this Security Guide do not give any advice on whether these features and
functions are the best method to support company, industry, regional or country-specific requirements.
Furthermore, this guide does not give any advice or recommendations with regard to additional features that
would be required in a particular environment; decisions related to data protection must be made on a case-bycase basis and under consideration of the given system landscape and the applicable legal requirements.
Note
In the majority of cases, compliance with data privacy laws is not a product feature.
SAP software supports data privacy by providing security features and specific data-protection-relevant
functions such as functions for the simplified blocking and deletion of personal data.
SAP does not provide legal advice in any form. The definitions and other terms used in this guide are not taken
from any given legal source.
Glossary
Table 29
Term
Definition
Personal data
Business purpose
Blocking
Deletion
Retention period
54
PUBLIC
Copyright 2014 SAP AG.
All rights reserved.
Term
Definition
required for business activities, the system does not block
the customer, supplier, or central business partner. If you still
want to block the data, the dependent data must be deleted
by using the existing archiving and deletion tools or by using
any other customer-specific solution.
Some basic requirements that support data protection are often referred to as technical and organizational
measures (TOM). The following topics are related to data protection and require appropriate TOMs:
Access control: Authentication features as described in section User Administration and Authentication.
Transmission control as described in Security Aspects of Data, Data Flow, and Processes and in Network and
Communication Security
Input Control: The business objects in SAP SLC have fields on the user interface that show which user has
created or changed the business object and when this change was performed. There is no additional logging.
SAP Business Continuity documentation in the SAP NetWeaver Application Help under
Oriented View Solution Life Cycle Management SAP Business Continuity
Function-
Separation by purpose: Is subject to the organizational model implemented and must be applied as part of
the authorization concept.
Caution
The extent to which data protection is ensured depends on secure system operation. Network security,
security note implementation, adequate logging of system changes, and appropriate usage of the system
are the basic technical requirements for compliance with data privacy legislation and other legislation.
11.1
SAP Supplier Lifecycle Management (SAP SLC) might process data (personal data) that is subject to the data
protection laws applicable in specific countries as described in SAP Note 1825544.
SAP SLC uses the standard archiving and deletion functions that is available for the business partner
functionality. For more information, see the application help for SAP SLC on SAP Help Portal at help.sap.com/
slc20 Application Help Buy Side: Activities for Purchasers Managing the Supplier Portfolio Deleting and
PUBLIC
Copyright 2014 SAP AG.
All rights reserved.
55
Archiving Suppliers Deleting Business Partners . Therefore, SAP SLC does not deliver an end of purpose check
(EoP) nor a where-used check (WUC).
Application
Detailed Description
Help Portal at
(SAP SLC)
Application Help
for Purchasers
Portfolio
Suppliers
help.sap.com/slc20
Buy Side: Activities
Managing the Supplier
CA_BUPA
Archiving and
11.2
If no trace or log is stored that records which business users have accessed data, it is difficult to track the
person(s) responsible for any data leaks to the outside world. The Read Access Logging (RAL) component can be
used to monitor and log read access to data and provide information such as which business users accessed
personal data, for example, of a business partner, and in which time frame.
In RAL, you can configure which read-access information to log and under which conditions. For SAP Supplier
Lifecycle Management, sample configuration for RAL can be implemented with SAP Note 2052337.
For more information about RAL, see Read Access Logging (RAL) in the documentation for SAP NetWeaver.
56
PUBLIC
Copyright 2014 SAP AG.
All rights reserved.
12
Attachments
The attachment types that you can use in SAP Supplier Lifecycle Management are:
General attachments
Certificates
Supplier logos
You can adjust settings for attachments, such as restricting the allowed MIME types, in Customizing for SAP
Supplier Lifecycle Management under the following paths:
Buy Side
Supplier Attachments
Buy Side
Activity Management
Sell Side
Sell Side
Activity Management
Note
Attachments are never opened immediately. Instead, users can choose whether to open the attachments
or download them to their computers.
Attachments uploaded by suppliers are only transferred from the sell side to the buy side; attachments
uploaded by category managers and by activity managers on the buy side are not transferred to the sell
side.
When attachments are uploaded from the user interface, on the sell side or on the buy side; to enable these
checks, activate the virus scan profile /SIHTTP/HTTP_UPLOAD.
When attachments are transferred from the sell side to the buy side; to enable these checks, activate the
virus scan profile /SRMSMC/FND_CFG/FILE_UPLOAD.
You must make the Customizing settings for the virus scan profile both on the buy side and the sell side:
Buy Side
In Customizing for SAP Supplier Lifecycle Management under
Lifecycle Management Virus Scan Interface
Buy Side
Sell Side
Sell Side
In Customizing for SAP Supplier Lifecycle Management under
Lifecycle Management Virus Scan Interface
Note
The virus scan profile /SIHTTP/HTTP_UPLOAD is always used for Business Server Pages. For more
information, see SAP Help Portal at help.sap.com/netweaver
SAP NetWeaver
PUBLIC
Copyright 2014 SAP AG.
All rights reserved.
57
7.0 including Enhancement Package 2 Security Information Security Guide SAP NetWeaver Security
Guide Security Guides for SAP NetWeaver According to Usage Types Security Aspects for Usage Type
DI and Other Development Technologies Security Aspects for BSP or the corresponding documentation
for higher releases of SAP NetWeaver.
More Information
See SAP Help Portal at help.sap.com/netweaver under SAP NetWeaver Platform SAP NetWeaver 7.0 including
Enhancement Package 2 Application Help SAP Library <Language> SAP NetWeaver SAP NetWeaver By
Key Capability Security System Security Virus Scan Interface or the corresponding documentation for
higher releases of SAP NetWeaver.
58
PUBLIC
Copyright 2014 SAP AG.
All rights reserved.
13
To minimize security risks, you can decide not to use the following functions:
PUBLIC
Copyright 2014 SAP AG.
All rights reserved.
59
The following sections in the SAP NetWeaver Security Guide and documentation are relevant for all enterprise
services delivered with SAP Supplier Lifecycle Management:
We recommend that you use SAP NetWeaver Process Integration (PI) or Web Services Reliable Messaging
(WSRM) for enabling secure communication between the buy side and the sell side. For details about system
communication using enterprise services in cross-system communication, see section Communication
Destinations.
60
PUBLIC
Copyright 2014 SAP AG.
All rights reserved.
15
SAP Supplier Lifecycle Management uses application logging to log all changes to supplier and user master data.
To analyze the application log, use transaction SLG1, which is part of the logging and tracing mechanisms
provided by SAP NetWeaver. For more information, see SAP Help Portal at help.sap.com/netweaver SAP
NetWeaver Platform SAP NetWeaver 7.0 including Enhancement Package 2 Security Information SAP
NetWeaver Security Guide Security Aspects for System Management Auditing and Logging or the
corresponding documentation for higher releases of SAP NetWeaver.
The data transferred using background remote function calls (bgRFCs) are monitored. For more information, see
SAP Help Portal at help.sap.com/netweaver SAP NetWeaver Platform SAP NetWeaver 7.0 including
Enhancement Package 2 Application Help SAP Library SAP NetWeaver SAP NetWeaver by Key Capability
Application Platform by Key Capability Platform-Wide Services Connectivity Components of SAP
Communication Technology Classical SAP Technologies (ABAP) RFC Background Communication bgRFC
(Background Remote Function Call) or the corresponding documentation for higher releases of SAP NetWeaver.
PUBLIC
Copyright 2014 SAP AG.
All rights reserved.
61
62
PUBLIC
Copyright 2014 SAP AG.
All rights reserved.
www.sap.com