SAP ABAP Central - RFC Gateway Security, Part 1 - Basic Understanding
SAP ABAP Central - RFC Gateway Security, Part 1 - Basic Understanding
More
In the following i will do the question and answer game to develop a basic
understanding of the RFC Gateway, the RFC Gateway security and its related
terms.
The RFC Gateway can be seen as a communication middleware. The RFC Gateway
act as an RFC Server which enables RFC function modules to be used by RFC
clients. It also enables communication between work or server processes of SAP
NetWeaver AS and external programs.
From a technical perspective the RFC Gateway is a SAP kernel process running on
OS level as user <SAPSID>adm.
Search
sapabapcentral.blogspot.com/2021/02/rfc-gateway-security-part-1-basic.html 1/5
10/21/21, 1:21 PM SAP ABAP Central: RFC Gateway security, part 1 – basic understanding
Blog Archive
▼ 2021 (145)
► October (11)
► September (16)
► August (13)
► July (20)
► June (15)
► May (8)
► April (13)
► March (20)
▼ February (14)
Adding Languages to SAP
ABAP Platform 1909,
Develo...
Replication of Cost Centers
to Employee Central wi...
Get latest version of ABAP
trial using BTP
◉ In SAP NetWeaver Application Server Java: The SCS instance has a built-in RFC RFC Gateway security, part
Gateway. 2 – reginfo ACL
Pass by value or pass by
reference?
Simple way to generate a
pdf of adobe form and
sav...
Ten concepts of interface
and integration in SAP-
f...
RFC Gateway security, part
1 – basic understanding
Complete process to create
Change Document in
ABAP...
Printing Slowness
My experience during a
SAP technical upgrade
(Pre-...
PPM Financial Planning –
Update FIN_PLAN Values
us...
Printing to ABAP Console
Simple isn’t easy – ABAP
composition (Chunk it
◉ The Stand-alone RFC Gateway: As a dedicated RFC Gateway serving for up)
various RFC clients or as an additional component which may be used to extend a
SAP NW AS ABAP or AS Java system. ► January (15)
sapabapcentral.blogspot.com/2021/02/rfc-gateway-security-part-1-basic.html 2/5
10/21/21, 1:21 PM SAP ABAP Central: RFC Gateway security, part 1 – basic understanding
Popular Posts
Common examples are ‘tp’ for transport management via STMS or ‘gnetx.exe’ for Facebook
the graphical screen painter on the SAP GUI client host.
Follow @Go_SAP_ABAP
Please note: One should be aware that starting a program using the RFC Gateway
is an interactive task. This means the call of a program is always waiting for an
answer before it times out. If the called program is not an RFC enabled program
(compiled with the SAP RFC library) the call will time out, but the program is still Total Pageviews
left running on the OS level!
To overcome this issue the RFC enabled program ‘SAPXPG’ can be used as a
wrapper to call any OS command. This is for example used by AS ABAP when
888,495
starting external commands using transaction SM49/SM69.
‘RFC destinations’
sapabapcentral.blogspot.com/2021/02/rfc-gateway-security-part-1-basic.html 3/5
10/21/21, 1:21 PM SAP ABAP Central: RFC Gateway security, part 1 – basic understanding
The RFC Gateway hands over the request from the RFC client to the dispatcher
which assigns it to a work process (AS ABAP) or to a server process (AS JAVA).
The RFC Gateway can also be used to proxy requests from one RFC Gateway to
another.
For example system AAA is not allowed to communicate directly with system BBB
but both are allowed to communicate with system PXY. System AAA may send the
request to system PXY which will forward it to system BBB to circumvent the
restrictions.
The reginfo file is holding rules controlling which remote servers (based on their
hostname/ip-address) are allowed to either register, access or cancel which
‘Registered Server Programs’ (based on their program alias (also known as ‘TP
name’)).
The secinfo file is holding rules controlling which programs (based on their
executable name or fullpath, if not in $PATH) can be started by which user calling
from which host(s) (based on its hostname/ip-address) to which RFC Gateway
server(s) (based on their hostname/ip-address).
As we learnt before the reginfo and secinfo are defining rules for very different
use-cases, so they are not related.
The prxyinfo file is holding rules controlling which source systems are allowed to
talk to which destination systems over the current RFC Gateway (based on their
hostname/ip-address).
RFCs between two SAP NetWeaver AS ABAP or between RFC clients using
JCo/NCo and the RFC Gateway are typically controlled on network level only. The
RFC Gateway does not perform any additional security checks.
When using SNC to secure RFC destinations on AS ABAP the so called ‘SNC
System ACL’, also known as ‘System Authentication’ – where imho the term
‘Authentication’ is misleading -, is introduced and must be maintained
accordingly.
sapabapcentral.blogspot.com/2021/02/rfc-gateway-security-part-1-basic.html 4/5
10/21/21, 1:21 PM SAP ABAP Central: RFC Gateway security, part 1 – basic understanding
This ACL is applied on the ABAP layer and is maintained in transaction SNC0.
No comments:
Post a Comment
WP Template
sapabapcentral.blogspot.com/2021/02/rfc-gateway-security-part-1-basic.html 5/5