SAP Analytics Cloud Connection Guide
SAP Analytics Cloud Connection Guide
PUBLIC
Warning
This document has been generated from the SAP Help Portal and is an incomplete version of the official SAP product
documentation. The information included in custom documentation may not re ect the arrangement of topics in the SAP Help
Portal, and may be missing important aspects and/or correlations to other topics. For this reason, it is not for productive use.
This is custom documentation. For more information, please visit the SAP Help Portal 1
3/24/2024
SAP Analytics Cloud combines Business Intelligence, Predictive, Planning, and Digital Boardroom capabilities to analyze all data
from your landscape – on-premise or in the cloud.
SAP Analytics Cloud is a public Software-as-a-Service (SaaS) enabling access to on-premise and cloud data sources.
Furthermore, SAP Analytics Cloud provides live connection (online) and data acquisition (batch) connectivity – two ways for
accessing your data located anywhere in your information-system landscape:
You can create models from data sources in on-premise or cloud systems, build stories based on those models, and
perform online analysis without any data replication. This feature allows SAP Analytics Cloud to be used in scenarios
where data cannot be moved into the cloud for security or privacy reasons, or your data already exists on a different
cloud system.
You can also create connections to remote systems to allow data acquisition. Data is imported (copied) to SAP Analytics
Cloud HANA in-memory Database, and changes made to the data in the source system don't affect the imported data.
Furthermore, SAP Analytics Cloud provides SAML 2 capabilities to enable Single Sign-on, simplifying not only
authentication to SAP Analytics Cloud but also to connected data sources from your landscape.
Most of our customers want to get all the bene ts of such hybrid architecture. This document is intended to help you by
explaining connectivity, gathering all required links, and delivering tips and tricks, best practices, and warnings experienced by
our customers and partners.
This is custom documentation. For more information, please visit the SAP Help Portal 2
3/24/2024
SAP Analytics Cloud is a public Cloud Software-as-a-Service (Saas) that you should connect to your secured backend.
Establishing the connection settings requires people with expertise from different areas of your organization to ensure a
smooth deployment:
SAP Analytics Cloud system owner SAP Analytics Cloud settings, such as SAML 2.0 settings, users
and roles management, and connection settings.
Data source expert Connectivity layer and security (SAP HANA, SAP BW or SAP
BW/HANA, SAP S4/HANA, and so on).
Security expert SAML 2.0, your organization's Identity Provider (IdP), SSL
certi cates, and so on.
Project management is mandatory because maintaining connectivity settings can't be successful as a one-person task. Settings
follow a strict process where different stakeholders have to be engaged and have to deliver their own expertise in their
respective areas of responsibility.
Connecting SaaS applications to on-premise applications requires that you understand the big picture of the architecture. So,
before you start con guring any settings, we strongly suggest organizing an architecture workshop to align the necessary
stakeholders to perform a fast and smooth set up, on time, and within scope.
Note
Before starting, please read the System Requirements and Technical Prerequisites and check if your landscape is compliant
with what is supported for your version and connection type.
Functional needs
Live Connection
This is custom documentation. For more information, please visit the SAP Help Portal 3
3/24/2024
Local (Cloud data sources) SAP Cloud Platform All data stays within the SAP Cloud
Platform or SAP S4/HANA Cloud. The data
SAP S4/HANA Cloud
is not replicated to SAP Analytics Cloud.
Modeling and model security is managed
on the source system. Data connection
between systems is secured within SAP
Cloud Platform.
Remote (On-premise data sources) SAP HANA All data stays within the remote (customer)
landscape. The data is not replicated to
SAP BW
SAP Analytics Cloud. Modeling and model
SAP S/4HANA security is managed on the source system.
Data Privacy: Data stays in your backend. If you want to have full control of data privacy, a live connection is the best choice.
Data Volume Maximums: Data volume is processed in your backend system. In theory, there is no limitation. A query is executed
in the backend system. The query should limit the volume returned to your Web Browser by applying adequate input control or
aggregation.
Importing Data
Works with analytic models All data from your data source is uploaded (replicated) to SAP
Analytics Cloud in-memory HANA Database. SAP Analytics Cloud
Works with planning Models then stores the model and data. Security can be added to the
model within SAP Analytics Cloud. Both Analytic and Planning
Predictive Capabilities models generate an account type model.
Data Privacy: Data is replicated into the SAP Analytics Cloud HANA database. Nevertheless, data is encrypted and fully secured.
Please refer to the SAP Trust Center for information on security measures and certi cates in the SAP data center.
Columns: 100
Rows: 800,000
Dimension members:
Analytic models: if there are more than 250,000 unique members, the dimension will be made read-only
Using a live connection, SAP Analytics Cloud provides the business logic and builds the queries required to see your data in your
browser. Your browser in turn sends those queries through a direct live connection to the on-premise data source. The results of
those queries are returned to your browser, where visualizations are rendered. If your query was a list of pro ts per customer,
for example, none of that information would actually return to or be stored in SAP Analytics Cloud.
Throughout the whole process, the browser is actually interacting through direct live connection (CORS), which in turn sends
out the requests to SAP Analytics Cloud or the remote data source, depending on the path of each request.
Let's take a look at a how typical connection works. In the rst case below, the on-premise data is accessed from a Web browser
inside your organization's domain:
Note
For this overview, let's assume you are using SAP Cloud Identity, the default Identity Provider (IdP) provided by SAP Analytics
Cloud. But a custom IdP may also be used with SAML 2.0.
Get/Post requests from the Web browser to SAP Analytics Cloud are dedicated to metadata.
Get/Post requests from the Web browser to the IdP are dedicated to SAML assertions.
Get/Post requests from the Web browser to the on-premise data source are dedicated to data.
There's another case to consider where the on-premise data is accessed from a Web browser sitting in the public Internet
domain:
This is custom documentation. For more information, please visit the SAP Help Portal 5
3/24/2024
In this case, a reverse proxy is used with the speci c purpose of publishing the on-premise data source to the public Internet and
again allowing a direct CORS connection to the data.
Authentication
End-to-end Single-Sign On (SSO) is accomplished with SAML 2.0. To do this, both SAP Analytics Cloud and the on-premise data
source has to be con gured to trust the same IdP, such as your SAP Cloud Identity or your Active Directory using ADFS (Active
Directory Federation Services). This means that the data security implemented at the source data will always be respected for
each request.
Encryption
All communications between your browser and SAP Analytics Cloud are always encrypted. The on-premise communications
from your reverse proxy to backend data sources should also be encrypted using TLS. All data and metadata persisted on SAP
Analytics Cloud is also fully encrypted.
This is custom documentation. For more information, please visit the SAP Help Portal 6
3/24/2024
SAP HANA SAP HANA 1.0 SPS12 Patch 14 or newer with SAP HANA Info
Access Service (InA), version 4.10.0 or higher is required
SAP Universe SAP BusinessObjects BI 4.2 SP4 system installed. The .war le of
the SAP BOE Live Data Connect component deployed on your
application server
The same-origin policy is an important concept in the Web application security model. Under the policy, a Web browser permits
scripts contained in a rst web page to access data in a second web page, but only if both Web pages have the same origin. It is
a critical security mechanism for isolating potentially malicious documents. This raises an issue, since your users are trying to
access live data from a different origin (domain) than SAP Analytics Cloud!
In a live connection, your browser has to access both SAP Analytics Cloud for metadata and backend data sources (SAP HANA,
SAP BW, S4/HANA or SAP Universe).
Cross-origin resource sharing (CORS) is a mechanism that allows restricted resources on a Web page to be requested from
another domain outside the domain from which the rst resource was served. A Web page may freely embed cross-origin Web
This is custom documentation. For more information, please visit the SAP Help Portal 7
3/24/2024
pages, images, stylesheets, scripts, iframes, and videos.
Example
/resource 2 pre ight request header from the browser:
Origin: http://mySAC.eu1.sapanalytics.cloud
Access-Control-Request-Method: POST
Access-Control-Request-Headers: X-Custom-Header
Example
/resource 2 server response header if authorized:
Access-Control-Allow-Origin: http://mySAC.eu1.sapanalytics.cloud
Access-Control-Allow-Methods: GET, POST
Access-Control-Allow-Headers: X-Custom-Header
In this example, authorization is checked by the backend and only allocated to URI
http://mySAC.eu1.sapanalytics.cloud. HTTP/SSL is then mandatory with a valid certi cate between the browser
and the backend, to avoid any malicious intrusion.
Bene ts of CORS
SAP recommends a con guration using CORS for these reasons:
You will have direct connectivity with no additional devices required. Your browser directly connects SAP Analytics Cloud,
your IdP, and backend data sources by securely unlocking the same-origin policy.
This is custom documentation. For more information, please visit the SAP Help Portal 8
3/24/2024
Because there are no additional devices, a direct connection enables better performance.
Outbound access from your domain to SAP Analytics Cloud and SAP Cloud Identity have to be opened.
Allow pop-up windows from your SAP Analytics Cloud domain. For example: [*.]sapanalytics.cloud,
[*.]hanacloudservices.cloud.sap, [*.]hcs.cloud.sap, or [*.]analytics.sapcloud.cn
CORS does not work in a mixed HTTPS/HTTP scenario. The SSL server certi cate of the SAP HANA XS system must be
a valid one that is trusted by your organization's Web browsers, and it must match the SAP HANA system's fully quali ed
domain name.
Note
In some cases, hosting third-party providers do not include such settings in their hosting services.
The following diagram shows how a typical connection works when accessing on-premise data from the customer domain:
Note
This is custom documentation. For more information, please visit the SAP Help Portal 9
3/24/2024
SAP Cloud Identity is the default IdP used bySAP Analytics Cloud, but a custom SAML IdP may also be used.
Bene ts
SAP recommends this con guration for these reasons:
You will have direct connectivity with no additional devices required. Your browser directly connects SAP Analytics Cloud,
IdP, and backend data sources by securely unlocking the Same Origin Policy (see Understanding the Same-Origin Policy
and CORS).
Because there are no additional devices, such a direct connection enables better performance.
Outbound access from your domain to SAP Analytics Cloud and SAP Cloud Identity have to be opened.
Allow pop-up windows from your SAP Analytics Cloud domain. For example: [*.]sapanalytics.cloud,
[*.]hanacloudservices.cloud.sap, [*.]hcs.cloud.sap, or [*.]analytics.sapcloud.cn.
CORS does not work in a mixed HTTPS/HTTP scenario. The SSL server certi cate of the HANA XS system must be a valid one
that is trusted by your organization's web browsers, and it must match the HANA system's fully quali ed domain name.
Note
In some cases, hosting third-party providers do not include such settings in their hosting services.
Setting Steps
Enabling INA HANA, BW, S/4HANA, Universe fully Data Source Expert
support INA
Enabling CORS HANA, BW, S/4HANA, Universe fully Data Source Expert
support CORS
Enabling SSL Con gure valid SSL certi cate. Refer to SAP Security Expert
Note 2502174
Allowing third-party browser cookies See Google Chrome documentation Security Expert
This is custom documentation. For more information, please visit the SAP Help Portal 10
3/24/2024
Furthermore, the Google Chrome browser can be used to troubleshoot your Live Connection. Chrome Developer Tools are a set
of web authoring and debugging tools built into Google Chrome. The DevTools provide web developers deep access into the
internals of the browser and their web application. So, do not hesitate to get familiar with the DevTools to efficiently track down
issues.
Especially, you can use the Network Panel to get a graph that shows a timeline of when resources were retrieved. At a glance,
the panel tells you the total number of requests, amount of data transferred, request and responses contents and headers,
load times, errors, warning, and so on.
Recommended Reading
Live Data Connection
Direct Live HANA Connections in the Internet Scenario – For the Apache Fans
Importing Data
You can create connections to remote systems to allow data acquisition bySAP Analytics Cloud.
Data is imported (copied) to SAP Analytics Cloud, and changes made to the data in the source system don't affect the imported
data.
Setup is required when creating an import data connection to system types, such as SAP Business Warehouse (BW), SAP
Business Planning and Consolidation (BPC), SAP BusinessObjects Business Intelligence platform universe (UNX), SAP
Enterprise Resource Planning (ERP), SQL Database, SuccessFactors, WorkforceAnalytics, OData, Concur, Salesforce.com
(SFDC), Fieldglass, Google Drive, Google BigQuery, File Server.
Recommended Reading
Import Data Connection
This is custom documentation. For more information, please visit the SAP Help Portal 11
3/24/2024
Installing SAP Analytics Cloud Agent
Julian Jimenez August 26, 2016 7 minute read Troubleshooting Guide: SAP Analytics Cloud Agent
The Cloud Connector combines an easy setup with a clear con guration of the systems that are exposed to SAP Analytics
Cloud. In addition, you can control the resources available for the cloud applications in those systems. Thus, you can bene t
from your existing assets without exposing the whole internal landscape.
The Cloud Connector runs as an on-premise agent in a secured network and acts as a reverse invoke proxy between the on-
premise networking customer domain and SAP Analytics Cloud. Due to its reverse invoke support, you don't need to con gure
the on-premise rewall to allow external access from the cloud to internal systems.
Compared to the approach of opening ports in the rewall and using reverse proxies in the customer domain to establish access
to on-premise systems, the Cloud Connector has the following advantages:
The rewall of the on-premise network does not have to open an inbound port to establish connectivity from SAP
Analytics Cloud to an on-premise system. In the case of allowed outbound connections, no modi cations are required.
The Cloud Connector allows propagating the identity of cloud users to on-premise systems in a secure way.
The Cloud Connector is easy to install and con gure; that is, it comes with a low total cost of ownership and ts well to
cloud scenarios. SAP provides standard support for the Cloud Connector.
This is custom documentation. For more information, please visit the SAP Help Portal 12
3/24/2024
Con guration
If the data you want to import is stored on one domain: One SAP Analytics Cloud system can only be connected to one cloud
connector, but the same cloud connector may be used by multiple SAP Analytics Cloud systems.
If the data you want to import is stored on multiple domains: You can add multiple cloud connectors to a single SAP Analytics
Cloud system.
Note
In this con guration, each cloud connector must be installed on a different domain or on a different provider.
This is custom documentation. For more information, please visit the SAP Help Portal 13
3/24/2024
Network Prerequisites
See the Prerequisites for installing the Cloud Connector.
Setting Steps
Install SAP Cloud Connector Installing the SAPCP Cloud Connector. IT Expert
This is custom documentation. For more information, please visit the SAP Help Portal 14
3/24/2024
Con gure SAP Cloud Connector As soon as SAP Analytics Agent is installed Business Intelligence Expert
and con gured (see Single Sign-On (SSO)),
you can con gure SCC. See Con guring the
SAPCP Cloud Connector.
Caution
Leave Location ID eld blank. SAP
Analytics Cloud can support only one
SAP Cloud Connector.
The SAP Analytics Cloud agent is an on-premise data connectivity component that is used to:
Import data from SAP Business Planning and Consolidation, version for Microsoft Platform (BPC MS).
It is recommended to install SAP Analytics Cloud agent on the same SAP Cloud Connector Server.
Setting Steps
Apache Tomcat See the SAP Analytics Cloud agent section IT Expert
in the System Requirements and Technical
Prerequisites.
Install SAP Analytics Cloud agent Installing SAP Analytics Cloud Agent IT Expert
Con gure and check SAP Analytics Cloud Con guring SAP Analytics Cloud Agent Business Intelligence Expert
agent
Install JCO library if you want to connect Installing the SAP Java Connector (JCo) IT Expert
SAP ERP and SAP BW
Install JDBC driver if you want to connect Import Data Connection to an SQL Database IT Expert
an SQL database
Allowing Data Import and Model Export with Allowing Data Import and Model Export with IT Expert
a File Server a File Server
The following are some of the advantages you can have with SSO:
Users need only a single username/password pair to access multiple services – they don't have to remember multiple
pairs.
Users are authenticated only once at the identity provider and then they are automatically logged into all services within
that "trust-domain".
This process is more convenient to users since they do not have to provide their username/password at every service
provider.
Service providers do not have the overhead of managing user identities, which is more convenient for them.
User identities are managed at a central point. This is more secure, less complex, and easily manageable.
SAML2 uses a claim attribute to map Identity between the Identity Provider and Service Provider(s). It can be a User ID, email
address, or any custom eld. The mapping attribute is case sensitive. SAP Analytics Cloud supports only uppercase for User IDs.
The SAML2 process ow is strictly dependent on time. The SAML2 process ow must be executed within a short period of time,
as speci ed by the optional NotBefore and NotOnOrAfter attributes. Please check the server Identity Provider clock and/or the
Data Sources server clock.
1. An identity provider (IdP): authenticates users and provides Service Providers with an Authentication Assertion if
successful. As an Identity Provider, SAP Analytics Cloud provides SAP Cloud Identity by default. You can set your own
SAML 2 based identity provider.
2. A service provider (SP): relies on the Identity Provider to authenticate users. SAP Analytics Cloud and backend data
sources (HANA, BW, S4/HANA or Universe) can rely on the same Identity Provider to authenticate.
This is custom documentation. For more information, please visit the SAP Help Portal 16
3/24/2024
1. A user tries to log into SAP Analytics Cloud from a Chrome browser.
4. Identity Provider parses the SAML request and veri es if the user is already authenticated.
5. Identity Provider asks for authentication. If the user is already authenticated on the Identity Provider, this step will be
skipped and IDP directly generates a SAML response.
7. The browser sends the SAML response to SAP Analytics Cloud for veri cation.
8. If the veri cation is successful, the user will be logged into SAP Analytics Cloud and granted access to all the various
resources.
Settings Principles
As seen above, there are two roles; Service Providers and Identity Providers (IP). The important characteristic of a single sign-
on system is the prede ned trust relation between the Service Providers and the Identity Provider; Service Providers trust the
assertions issued by the Identity Providers and the Identity Providers issue assertions based on the results of the
authentication and the authorization of principles that access services at the Service Providers.
If you decide to use SAP Cloud Identity, you do not need any settings – it is con gured by default. Otherwise, follow this process:
1. Get SAP Analytics Cloud Service Provider metadata (with certi cate).
2. Con gure the Service Provider to the Identity Provider, based on SAP Analytics Cloud Service Provider metadata.
This is custom documentation. For more information, please visit the SAP Help Portal 17
3/24/2024
4. Upload the Identity Provider metadata into SAP Analytics Cloud.
5. Indicate the Mapping attribute (User ID, email address, or any customer eld).
6. Test before saving the con guration, and apply the change.
Setting Steps
Identity Provider settings in SAP Analytics Enabling a Custom SAML Identity Provider Business Intelligence Expert (Admin)
Cloud
Service Provider settings in Identity Steps depend on the identity provider used. Identity Provider Expert
Provider
SSO Data Source Settings Backend Single Sign-On Data Source IT Expert
Recommended Reading
Enabling a Custom SAML Identity Provider
How to con gure SAP Analytics Cloud SAML SSO using AD FS (Active Directory Federation Services)
Tutorial: Azure Active Directory integration with SAP Business Object Cloud
SAP Note: 2487567 Troubleshooting SAML assertions when con guring SAML SSO in SAP Analytics Cloud
What is SAML2
SSO Setup for SAP Analytics Cloud using okta as an Identity Provider
Embedding SAP Analytics Cloud Story with URL API and SAML2 SSO based on WSO2 Identity Server
Identity Providers
SAP Analytics Cloud supports SAML 2 Identity Providers based on OASiS speci cations.
Okta
F5 Identity Provider
This is custom documentation. For more information, please visit the SAP Help Portal 18
3/24/2024
Based on your Identity Provider location, please ensure your browser is able to access it.
Log in credentials depend on the User Attribute you selected when you set the Identity Provider. If you selected a custom SAML
User, the log in credentials should be the User ID of your account on your SAML Identity Provider.
If Email is selected, the log in credentials should be the email address of your account on your SAML Identity Provider. If User is
selected, the log in credentials are set to your SAP Analytics Cloud user name by default.
As you begin, it is important to have alignment between the Identity Provider and the Service Provider (SAC) user list. You can
manually enter users, but remember, the mapping attribute is case sensitive. Two options to simplify and ensure simple user
deployment exist:
You can upload and map a user list into SAP Analytics Cloud. Choose between a CSV le or an Active Directory upload.
You can select Dynamic User creation in SAP Analytics Cloud. When dynamic user creation is enabled, new users will be
automatically created using the default role and will be able to use SAML SSO to log onto SAP Analytics Cloud. To ensure
that mapping SAML attributes to users, and mapping roles using SAML attributes works with dynamic user creation, you
must submit an SAP Product Support Incident at the following link:
https://launchpad.support.sap.com/#incident/solution using the component LOD-ANA-BI. In the support ticket,
indicate that you want to set up user pro les and role assignment based on custom SAML attributes, and include your
SAP Analytics Cloud URL.
This is custom documentation. For more information, please visit the SAP Help Portal 19
3/24/2024
You can also create a SAML role mapping to automatically assign roles to users based on their SAML attributes. Please read:
Mapping Roles Using SAML Attributes
For SAP HANA, see Con gure SSO with SAML Authentication for SAP HANA XS Applications.
For SAP BW or SAP S4/HANA, see Enabling the SAML Service Provider.
This is custom documentation. For more information, please visit the SAP Help Portal 20