Web Disp Step by Step Docu

Share Embed Donate


Short Description

Download Web Disp Step by Step Docu...

Description

How-To install&configure the SAP Web Dispatcher

Last modification: 18. January 2007

Oliver Luik / Christian Goldbach

1

INTROD INTRODUCTI UCTION ON ................................................................................................................................. 4

2

SAP WEB DISPATC DISPATCHER HER INSTALL INSTALLATI ATION ON WITH SAPINS SAPINST T .......................................................... 4

3

SSL INSTALL INSTALLATIO ATION N AND CONFIGU CONFIGURATI RATION................................................................................ ON................................................................................ 4

3. 1 THE SAP SAP CRYPTOGRAPHIC LIBRARY INSTALLATION PACKAGE .......................................................... 5 3.1.1 Definition Definition .................................................................................................................................. 5 3.1.2 Structu Structure.................................................................................................................................... re.................................................................................................................................... 5 3. 2 3.2.1 3.2.2

INSTALLING THE SAP SAP CRYPTOGRAPHIC LIBRARY .................................................................... 5 Proced Procedure.................................................................................................................................. ure.................................................................................................................................. 5 Result ........................................................................................................................................ 6 

3. 3

SETTING THE SSL SSL PROFILE PARAMETERS FOR THE SAP SAP WEB DISPATCHER ............................... 6

3. 4 3.4.1 3.4.2 3.4.3

CREATING THE PSES AND CERTIFICATE REQUESTS.................................................................. 8 Use ............................................................................................................................................ 8 Prerequisites.............................................................................................................................. Prerequisites.............................................................................................................................. 8 Proced Procedure.................................................................................................................................. ure.................................................................................................................................. 9

3. 5 3.5.1 3.5.2 3.5.3 3.5.4

SENDING THE CERTIFICATE REQUESTS TO A CA .................................................................... 10 Use .......................................................................................................................................... 10 Prerequisites............................................................................................................................ Prerequisites............................................................................................................................ 11 Procedur Proceduree ................................................................................................................................ 11 Result ...................................................................................................................................... 12

3. 6 3.6.1 3.6.2 3.6.3 3.6.4

IMPORTING THE CERTIFICATE REQUEST RESPONSES .............................................................. 13 Use .......................................................................................................................................... 13 Prerequisites............................................................................................................................ Prerequisites............................................................................................................................ 13 Procedur Proceduree ................................................................................................................................ 13 Result ...................................................................................................................................... 14

3. 7 3.7.1 3.7.2 3.7.3 3.7.4

CREATING CREDENTIALS FOR THE SAP SAP WEB DISPATCHER..................................................... 14 Use .......................................................................................................................................... 14 Prerequisites............................................................................................................................ Prerequisites............................................................................................................................ 14 Procedur Proceduree ................................................................................................................................ 14 Result ...................................................................................................................................... 15

3. 8 3.8.1 3.8.2 3.8.3 3.8.4

TESTING THE SSL SSL CONNECTION TO THE SAP SAP WEB DISPATCHER ............................................ 16 Use .......................................................................................................................................... 16  Prerequisites............................................................................................................................ Prerequisites............................................................................................................................ 16  Procedur Proceduree ................................................................................................................................ 16  Result ...................................................................................................................................... 16 

3. 9 3.10

SAMPLE PROFILE FOR THE SAP SAP WEB DISPATCHER WHEN TERMINATING SSL......................... 17 SAMPLE PROFILE FOR THE SAP SAP WEB DISPATCHER WHEN REENCRYPTING SSL AND RETRIEVING META DATA USING SSL......................................................................................................................................... 18 4

SAP WEB DISPATC DISPATCHER HER CONFIGU CONFIGURATI RATION................................................................................. ON................................................................................. 20

4. 1

CONFIGURING THE WEB DISPATCHER WEB ADMINISTRATION INTERFACE . ERROR! BOOKMARK

NOT DEFINED.

4. 2

SAP AG

HOW TO CONFIGURE THE URL URL FILTER ................................................................................... 20

1.18.07

4. 3 SETTING UP YOUR OWN ERROR PAGES ................................................................................. 20 4.3.1 Use .......................................................................................................................................... 20 4.3.2 Prerequisites............................................................................................................................ Prerequisites............................................................................................................................ 21 4.3.3 Procedur Proceduree ................................................................................................................................ 21 4.3.3.1 4.3 .3.1 Static Static Error Error Pages Pages ...... ............ ............ ............ ............ ............ ............ ............ ............ ............ ............ ............ ............ ............ ............ ............ ............ ............ ............ ............ ...... 21 4.3.3.2 4.3 .3.2 Dynamic Dynamic Error Error Page Pages..... s........... ............ ............ ............ ............ ............ ............ ............ ............ ............ ............ ............ ............ ............ ............ ............ ............ ............ ......... ... 21 4.3.4 Example................................................................................................................................... Example................................................................................................................................... 22 4. 4 HOW TO DIS PLAY A WELCOME PAGE ...................................................................................... 23 4.4.1 Use .......................................................................................................................................... 23 4.4.2 Properties................................................................................................................................ Properties................................................................................................................................ 23 4.4.2.1 4.4 .2.1 Value Value Rang Range e and and Syntax Syntax...... ............ ............ ............ ............ ............ ............ ............ ............ ............ ............ ............ ............ ............ ............ ............ ............ ............ ......... ... 23 4.4.2.2 4.4 .2.2 Exampl Example e ...... ............ ............ ............ ............ ............ ............ ............ ............ ............ ............ ............ ............ ............ ............ ............ ............ ............ ............ ............ ............ ............ ......... ... 24 4.4.2.3 4.4 .2.3 Cachin Caching........... g................. ............ ............ ............ ............ ............ ............ ............ ............ ............ ............ ............ ............ ............ ............ ............ ............ ............ ............ ............ ........... ..... 24 4. 5 HOW TO CONFIGURE AUTOMATIC REDIRECTS TO HTTPS........................................................ HTTPS........................................................ 25 4.5.1 Use .......................................................................................................................................... 25 4.5.2 Integrat Integration............................................................................................................................... ion............................................................................................................................... 25 4.5.3 Properties................................................................................................................................ Properties................................................................................................................................ 25 4.5.3.1 4.5 .3.1 Value Value Rang Range e and and Syntax Syntax...... ............ ............ ............ ............ ............ ............ ............ ............ ............ ............ ............ ............ ............ ............ ............ ............ ............ ......... ... 25 4.5.3.2 4.5 .3.2 Exampl Examples es ...... ............ ............ ............ ............ ............ ............ ............ ............ ............ ............ ............ ............ ............ ............ ............ ............ ............ ............ ............ ............ ............ ........ 26 4.5.4 More Informatio Information n .................................................................................................................... 27  5

REFEREN REFERENCES CES .................................................................................................................................... 27

5. 1 5. 2 5. 3 6

SAP NOTES ................................................................................................................................... 27 HOW-TO GUIDES ........................................................................................................................... 28 EXTERNAL REFERENCES ................................................................................................................ 28

HISTORY HISTORY ............................................................................................................................................ 28

SAP AG

1.18.07

1 Introduction This document is a Step-By-Step installation manual for the SAP Web Dispatcher for the Service Desk usage.

2 SAP Web Dispatcher Installation with SAPinst Thi Thissecti ction des describe cri best he ins inst all at ion of the t he SAPWeb Dis Dispat pat cher cher wit wi t h SAPinst. It It can te t echnica chni cal ly bedone on the t he same server asthe We Web AS. Th Thesetup on t he same server isfor securi cur it y re r easons only onl y re r ecomme commende nded for for demo/ demo/iinte nt ernal syst yst ems. ms. In I n a product productiive set up t he SAPW APWeb Dispatcher and the t he We Web ASshould ASshoul d besepar parated by a firewall.

It is recommended to install the ASCII Version of the WebDispatcher. Please refer to the "Installation Guide Web Dispatcher” for detailed installation descriptions. At the end of this installation the Web Dispatcher is up and running, you are able to use the Web Admin interface and you are able to send requests to the Web Dispatcher ports which are forwarded to the application server (with the HTTP protocol).

3 SSL Installation and Configuration This section describes the installation of the SAP Cryptographic Library for SSL and the required configuration to use it in the Web Dispatcher. The configuration of SSL described in this chapter is required in case the Web Dispatcher should terminate the SSL traffic. If End-to-End SSL should be used, then the configuration described in this chapter is not necessary. However, when End-toEnd SSL is used, the Web Dispatcher is not able to look inside the HTTP data, thus features like URL filtering and redirect are not available. If the t he SAP Web Dispatcher is to pass the SSL connection to the server in the backend (End-to-End SSL), SSL), then set the parameter icm/server_port_ to PROT=ROUTER, PORT=, TIMEOUT=.

SAP AG

1.18.07

3.1 The SAP Cryptographic Library Installation Package 3.1.1 Definition The installation package available for using the SAP Cryptographic Library. The installation package is available for authorized customers on the SAP Service Marketplace at http://service.sap.com/swdc. For unpacking the installation package use the SAPCAR utility. SAPCAR is available on the SAP Service Marketplace -> Support Packages and Patches -> Additional Components -> SAPCAR -> SAPCAR 7.00.

3.1.2 Structure The SAP Cryptographic Library installation package sapcrypto.car contains the following files: 1.

The SAP Cryptographic Library ( sapcrypto.dll for Windows NT or libsapcrypto. for UNIX) 

2.



A corresponding license ticket ( ticket)

3.



The configuration tool sapgenpse.exe

3.2 3. 2

Inst Insta allin lling g the the SA SAP P Cr Cry yptog ptogrraphi aphic c Libr ibrar ary y

Use the following procedure to install the SAP Cryptographic Library on your host.

3.2.1 Procedure As user adm : 1. Extract Extract the contents contents of the SAP SAP Cryptographic Cryptographic Library installation package. package. 2. Cop Copy y the the library library file and and the the conf configura iguration tion too tooll sapgenpse.exe to the directory specified by the application server's profile parameter DIR_EXECUTABLE. In the following, we represent this directory with the notation $(DIR_EXECUTABLE). Examples UNIX:

1.



2.



DIR_EXECUTABLE: /usr/sap//SYS/exe/run/

Location of SAP Cryptographic Library:

/usr/sap//SYS/exe/run/ /usr/sap//SYS/exe/run/libsapcrypto.s libsapcrypto.so o Windows NT:

SAP AG

1.18.07

3.



DIR_EXECUTABLE: :\usr\sap\\SYS\exe\run\

4.



Location of SAP Cryptographic Library:

:\usr\sap\\SYS\ :\usr\sap\\SYS\exe\run\sapcry exe\run\sapcrypto.dll pto.dll

3. Check the file file permissions permissions for the SAP Cryptographi Cryptographic c Library. Library. If, for for example, you copied the library to its location using ftp on UNIX, then the file permissions may not be set correctly. Make sure that adm (or SAPServiceunder Windows NT) is able to execute the library's functions. 4. Copy the ticket file to the sub-directory sec in the instance directory $(DIR_INSTANCE). Examples UNIX:

h

5.



DIR_INSTANCE: /usr/sap//

6.



Location of the ticket:

/usr/sap///sec/ticket Windows NT:

7. 8.

DIR_INSTANCE: :\usr\sap\\





Location of the ticket:

:\usr\sap\\\sec\ticket ket

5. Set Set the the env enviro ironm nmen entt v vari ariab able le SECUDIR to the sec sub-directory. The application server uses this variable to locate the ticket and its credentials at run-time. If you set the t he environment variable using the command line, then the value v alue may not be applied to the server's processes. Therefore, we recommend setting SECUDIR in the startup profile for the server's user or in the registry (W indows NT).

3.2.2 Result The SAP Cryptographic Library is installed on the application server and the environment is set up correctly so that the Web Dispatcher can locate the library at run-time.

3.3 3. 3

Sett etting ing the the SSL SSL Pr Profil ofile e Pa Para ram meter eters s for for th the SA SAP Web Web Dispatcher

In addition to the standard parameters used by the SAP Web Dispatcher, set the following SSLrelevant parameters. parameters.

SAP AG

1.18.07

Setting profile parameters for Web Dispatcher is performed using a text editor on the Web Dispatcher profile file. The profile file created by the Web Dispatcher Installation is contained in directory /usr/sap//SYS/profile (:\usr\sap\\SYS\profile on Windows), the name of the profile file is __.

1. Location of the SAP Cryptographic Library and Personal Security Environments Environments to use: ssl/ssl_lib= ssl/server_pse= ssl/client_pse= The client PSE is only required when SSL is used between the SAP Web Dispatcher and the SAP Web Application Server or between the Web Dispatcher and the SAP Message Server.

4.

SAP Web Dispatcher SSL information to use for incoming connections: icm/server_port_=PROT=H icm/server_port_=PROT=HTTPS, TTPS, PORT=, PORT=, TIMEOUT=900 icm/HTTPS/verify_client= Documentation for parameter icm/HTTPS/verify_client icm/HTTPS/verify_client

5.

Connection Parameters Parameters to the SAP Web AS Message Server in the backend rdisp/mshost= ms/https_port= if you want to use

Metadata Exchange Using SSL. SSL . Otherwise, use ms/http_port= if the connection should

not use SSL. Only one of the two parameters ms/https_port and ms/http_port needs to be set, depending on the protocol used for retrieving meta data from the SAP Message Server. The SAP Message Server HTTP and HTTPS ports are defined by profile parameters ms/server_port_0, ms/server_port_1, … and can be viewed in transaction SMMS => Goto => Parameters => Display. Displ ay. 6.

Parameter for Client Protocol wdisp/add_client_protocol_h wdisp/add_client_protocol_header=

Set this parameter to true if there is a change in the protocol at the SAP Web Dispatcher (HTTPS to HTTP or vice versa). If this parameter is set to true, then the SAP Web Dispatcher sets the header variable clientprotocol to the protocol used between the client and the SAP Web Dispatcher (either HTTP or HTTPS). The application server then uses this value as the protocol to use for generated absolute URIs. 7.

SSL information to use for outgoing SSL connection

SAP AG

1.18.07

The following parameters are required only when SSL is used between SAP Web Dispatcher and SAP Web Application server or between SAP Web Dispatcher and SAP Message Server. wdisp/ssl_encrypt=

Documentation for wdisp/ssl_encrypt wdisp/ssl_auth=

Documentation for wdisp/ssl_auth wdisp/ssl_cred=

This parameter is only necessary if wdisp/ssl_auth = 2. Documentation for wdisp/ssl_cred wdisp/ssl_certhost=

Use this parameter if multiple servers in the backend use the same host name in their SSL server certificates (for example, www.mycompany.com). Documentation for wdisp/ssl_certhost

3.4 3. 4

Crea eati ting ng the the PSEs SEs and and Ce Cerrtific ificat ate e Re Requ que ests sts

3.4.1 Use If the SAP Web Dispatcher is to terminate the SSL connection, then it needs to possess a key pair and public-key certificate to use for the incoming SSL connection. This information is stored in the SAP Web Dispatcher’s SSL server PSE. PSE. If it also uses SSL for the connection to the backend server, then it also needs to possess a key pair to use for this connection. This information is stored in its SSL client PSE. PSE. Although you can use the same file for both of these PSEs, we refer to them separately in the documentation. You can either use the trust manager to create the PSEs or you can use the configuration tool sapgenpse. See the procedures below. If the t he SAP Web Dispatcher is to pass the SSL connection to the SAP Web Application Server, then you do not need to perform these steps.

3.4.2 Prerequisites 8.

You know the naming convention to use for the SAP Web Dispatcher’s Distinguished Name. The syntax of the Distinguished Name depends on the CA that you use. 

SAP AG

1.18.07

For example, if you use the SAP CA, the naming convention is CN=, OU=I-, OU=SAP Web AS, O=SAP Trust Community, C=DE.

3.4.3 Procedure You can use the configuration tool sapgenpse to create the SAP Web Dispatcher’s PSEs. Before you can use sapgenpse to create the SSL server PSE, the environment envi ronment variable SECUDIR must be set to the directory where the license ticket is located. If the environment variable v ariable is not yet set, then set it using the command line as shown below.

Setting the environment variable v ariable SECUDIR on Windows: set SECUDIR=

On Unix systems the syntax for f or setting environment variables is dependent dependent on the Unix shell.

Use the tool’s tool’ s command get_pse as shown below to create the SAP Web Dispatcher’s PSE. sapgenpse get_pse -p -r -x

The sapgenpse commands (create the PSE and the certification request, create the credential file, import i mport the own certificate, import im port trusted certificates) must be performed once for every PSE (for example SAPSSLS.pse and SAPSSLC.pse). SAPSSLC.pse).

Where: Standard Options Option

Parameter

Description

Allowed Values

Default

-p



Path and file name for the PSE.

The file name must correspond correspond to the file f ile name specified in the profile parameter ssl/server_pse and wdisp/ssl_cred for the SSL server PSE and the SSL client PSE respectively (for example, SAPSSLS.pse or SAPSSLC.pse).

None

Path description (in quotation marks, if

Stdout

If the complete path is not included, then the PSE file is created in the SECUDIR directory.

-r

SAP AG



File name for the certificate request request

1.18.07

spaces exist) -x



PIN that protects the PSE

Character string

None

None



The Distinguished Name for the SAP Web Dispatcher

Character string (in quotation marks, if spaces exist)

None

Additional Options Option

Parameter

Description

Allowed Values

Default

-s



Key length

512, 1024, 2048

1024

-a



Algorithm used

RSA, DAS

RSA

-noreq

None

Only generate a key pair and PSE. Do not create a certificate request. request.

Not applicable

Not set

-only req

None

Generate a certif icate request request for the public key stored in the PSE specified by the –p parameter.

Not applicable

Not set

The command line below creates the SAP W eb Dispatcher’s Dispatcher’s SSL server PSE and certificate request using the following information:

9.

The environment variable SECUDIR is set to C:\Program Files\SAP\SAPWebDisp\sec.



10. 

The PSE is to be located at C:\Program

Files\SAP\SAPWebDisp\sec\SAPSSLS.pse.

11. 

The PIN used to protect the PSE is abcpin..

12. 

The name of the certificate request file is abc.req.

13.  The SAP Web Dispatcher is accessed using the fullyqualified host name host123.mycompany.com. 14. 

The CA used is the SAP CA.

15. 

Therefore, the server’s Distinguished Name is

CN=host123.mycompany.com, CN=host123.mycompany.com, OU=I1234567890OU=I1234567890MyCompany, OU=SAP Web AS, O=SAP Trust Community, C=DE. sapgenpse get_pse -p SAPSSLS.pse -x abcpin -r abc.req "CN=host123.mycompany.com, OU=I1234567890-MyCompany, OU=SAP Web  AS, O=SAP Trust Trust Community, Community, C=DE"

SAP AG

1.18.07

3.5

Sendin ding th the Ce Certific ica ate Re Requests to to a CA

3.5.1 Use After you have generated a key pair and certificate request for each PSE, send the certificate requests to a CA to be signed. The response from the CA is a signed public-key certificate for the server when it is using the designated PSE.

3.5.2 Prerequisites You can send the certificate requests to the CA of your choice, for example, the SAP CA. Note however, the corresponding certificate request response from the CA must be available in one of the following formats: 9.



PKCS#7 certificate chain format

In this case, the issuing CA provides the certificate request response in the necessary format. For example, the SAP CA provides the response r esponse in this thi s format, or you can request this format from your CA. 10.



PEM format

In this case, the certificate request response from your CA contains only the signed public-key certificate. Therefore, you must also have access to the CA’s root certificate. When using sapgenpse, then it must exist as a file in the file system.

3.5.3 Procedure For each certificate request that you created, send the contents of the certificate request to your CA. The exact procedure to use depends on the CA that you use. For the SAP CA, follow the instructions provided by the SAP Trust Center Service at http://service.sap.com/tcs.. http://service.sap.com/tcs

The link http://service.sap.com/tcs => SSL Test Server Certificates allows you to create signed test certificates. You can sign certificates for testing which will be v alid for two months. In order to create a CA response in format PKCS#7, select “Choose server type” => PKCS#7 certificate chain.

To view vi ew the contents of the certificate, open the certificate certifi cate request request with a text editor. Because many editors use hidden characters for formatting, use a text editor that does not support support formatting formatti ng features, for example, Notepad. If carriage returns returns or line feeds have been corrupted, for example, during download, then correct these errors.

The example below shows a correct certif icate request.

SAP AG

1.18.07

-----BEGIN CERTIFICATE REQUEST----REQUEST----MIIBkzCCAVICAQAwWjELMAkGA1UEBhMCREUxHDAaBgNVBAoTE215U0FQLmNvbS BXb3JrcGxhY2UxDzANBgNVBAsTBlNBUCBBRzEOMAwGA1UECxMFQmFzaXMxDDAK BgNVBAMTA0JJTzCB7jCBpgYFKw4DAhswgZwCQQCSnauC/cAfQVrmOtWznQ9I+i 4twoPq8wCE0Fk5EAVjQnX2oMqBnyoi+ee/ZH2cLwyhp5mOOw70+exS7PHEWKiF AhUAw9FSY1AsFV4U9fC9w+Bg5H4ISYcCQARcC+7q3UkM0TF0A5zRaq7viO3Wj2 MwYUNwFkc0hxzhloUQd21megZADoFiisdzkn/nF4eIxV9vq9XxcV63xTsDQwAC QFher18UA8YkY4/zHe4mbupBXvDSucm2nbJuQ5PgDBvVaMmtpXIisyzuAFL+qC zQ92mkNqUR9JLWpz09ghQdISCgADAJBgcqhkjOOAQDAzAAMC0CFA7qEluP/Kfi +6HF/8I7j4NfF44xAhUAqkDgAeR3tzmNegKUTQ+JzeCXawE= -----END CERTIFICATE REQUEST-----

3.5.4 Result The CA will validate the information contained in the certificate request (according to its own policy) and return a response that contains the signed public-key certificate.

SAP AG

1.18.07

3.6 3. 6

Impor mportting ing the Cer erti tifi fica cate te Re Req quest uest Re Resp spo onse ses s

3.6.1 Use The CA will send you a certificate request response that contains the signed publickey certificate for the SAP Web Dispatcher. Once you have received this response, import it into the SAP Web Dispatcher’s corresponding PSE. You can either use the trust manager or you can use the configuration tool sapgenpse. See the procedures below.

3.6.2 Prerequisites 11.  If you are using sapgenpse, then each certificate request response exists as a file in the file system. Otherwise, if you are using the trust manager, then the responses can either exist as a file or you can use Copy&Paste to insert it into the PSE. 12.  If the certificate request responses do not contain the CA’s root certificate, then you also have access to this certificate. If you are using the trust manager, then it must exist in the trust manager’s database. If you are using sapgenpse, then it exists as a file in the file system.

3.6.3 Procedure You can use the configuration tool sapgenpse to import the certificate request response into the PSEs. Use the tool’s command import_own_cert as shown below. sapgenpse import_own_cert import_own_cert -p -c [-r ] ] -x

Where: Standard Options Option

Parameter

Description

Allowed Values

Default

-p



Path and file name of the PSE.

Path description (in quotation marks, if spaces spaces exist) ex ist)

None

Path descrip cripti tio on (in

Non No ne

The path is the SECUDIR directory and the file name is SAPSSLS.pse. for the SSL server PSE or SAPSSLC.pse for the SSL client PSE (if it exists). exists). -c

SAP AG



Path and file file name of the the

1.18.07

certificate request request response

quotation marks, if spaces spaces exist) ex ist)

-r



File containing the CA’s root certificate (and any intermediate CA certificates). This parameter is necessary if the CA root and any intermediate CA certificates are not included in the certificate request response.

Path description (in quotation marks, if spaces spaces exist) ex ist)

Not set

-x



PIN that protects the PSE

Character string

None

3.6.4 Result The certificate request response is imported into the PSE. The following command line li ne imports the certificate certif icate request response response (ABC.cer) into the SAP Web W eb Dispatcher’s SSL server server PSE that is stored at C:\Program Files\SAP\SAPWebDisp\sec\SAPSSLS.pse . (SECUDIR is set to C:\Program Files\SAP\SAPWebDisp\sec ). The PIN that protects the PSE is abcpin. sapgenpse import_own_cert -c ABC.cer -p SAPSSLS.pse -x abcpin

3.7 3. 7

Cre reat atin ing g Cr Credenti ential als s fo for the the SAP Web Web Dis isp patche tcherr

3.7.1 Use The SAP Web Dispatcher must have active credentials at run-time to be able to access its PSEs. Therefore, to produce active credentials, use the configuration tool’s command command seclogin to “open” each PSE. The credentials are are located in the file fi le cred_v2 in the directory specified by the environment variable SECUDIR. Make sure that only the user under which the SAP Web Dispatcher runs has access to this f ile (including (i ncluding read access). access).

3.7.2 Prerequisites 13.



The SAP Cryptographic Library is installed and the environment variable SECUDIR is set to the directory where the license ticket and PSEs are located.

14.



SAP AG

You know the user that runs the SAP Web Dispatcher.

1.18.07

3.7.3 Procedure Use the following command line to open each PSE and create credentials. sapgenpse seclogin seclogin -p -x -O [\]

Where: Standard Options Option

Parameter

Description

Allowed Values

Default

-p



Path and file name for the PSE.

Path description (in quotation marks, if spaces exist)

None

-x



PIN that protects the PSE

Character string

None

-O

[\]

User for which the credentials are created. (The user that runs the SAP Web W eb Dispatcher process.)

Valid operating system user

The current user

If the t he user that runs the SAP Web Dispatcher is the current user, then this parameter is optional. Use the parameter –v (verbose) to see the results.

Additional Options Option

Parameter

Description

Allowed Values

Default

-l

None

List all av ailable credentials for the current user.

Not applicable

Not set

-d

None

Delete credentials

Not applicable

Not set

-chpin

None

Specifies that you want to change the PIN

Not applicable

Not set

After creating the credentials, restart the SAP Web Dispatcher.

3.7.4 Result The credentials file ( cred_v2) for the user provided with the –O option is created in the SECUDIR directory. The following command line opens the SAP Web Dispatcher’s SSL server server PSE that t hat is located at C:\Program Files\SAP\SAPWebDisp\sec\SAPSSLS.pse and creates

SAP AG

1.18.07

credentials for the user ABCadm. (SECUDIR is set to C:\Program Files\SAP\SAPWebDisp\sec ). The PIN that protects the PSE is abcpin. sapgenpse seclogin -p SAPSSLS.pse -x abcpin -O - O ABCadm

SAP AG

1.18.07

3.8

Testi sting th the SSL Co Connecti ction to th the SA SAP We Web Dispatcher

3.8.1 Use Use the following test to test the SSL connection to the SAP Web Dispatcher. In this test, the SAP Web Dispatcher connects to the SAP Web Application Server using a Business Server Page (BSP).

3.8.2 Prerequisites 15.



The SAP Web Dispatcher’s PSEs and credentials exist.

16.



The SAP Web Dispatcher has been restarted.

17.  You know the port number that the SAP Web Dispatcher is using for HTTPS connections. The port number is specified in the profile parameter icm/server_port_ in the SAP Web Dispatcher’s profile.

3.8.3 Procedure 2.

Start Start a BSP BSP usin using g an HTTPS HTTPS conn connec ection tion to your your SAP Web Dispa Dispatch tcher er and and the the corresponding SSL port. For example, start the standard standard BSP test t est application IT00 with the URL https://mywebdisp.mycompany.com:443/sap/bc/bsp/sap/it00/ . default.htm 

If your Web browser cannot completely verify the SAP Web Dispatcher's publickey certificate, then you will receive a dialog that states the reason why. For example, if your Web browser does not possess the issuing CA's root certificate as a trusted root certificate, then you are informed and can choose to trust the server at this time. 3.

If you you trus trustt the the serve server's r's certif certifica icate te (eithe (eitherr autom automatic atically ally or manu manually ally), ), then then the the next step is to authenticate yourself. If your authentication was successful, the page appears.

3.8.4 Result You are connected to the SAP Web AS via the SAP Web Dispatcher. SSL is used for the connection between your Web browser and the SAP Web Dispatcher, which is indicated in your Web browser.

SAP AG

1.18.07

SAP R/3 und HTTP

3.9 3. 9

-18-

Sampl ample e Pr Profil ofile e fo for the the SA SAP P Web Web Dis Dispa pattche cher When When Terminating SSL

# SAPSYSTEMNAME must be set so that the default profile is # read. If not, a warning is displayed on the console. SAPSYSTEMNAME

= ABC

# SAPSYSTEM must be set so that the shared memory areas # can be created. # The number must be different from the other SAP instances # on the host. SAPSYSTEM = 26

# Set DIR_INSTANCE so that the SAP Cryptographic Cryptographic Library can # find the sec sub-directory. DIR_INSTANCE = C:\Program Files\SAP\SAPWebDisp Files\SAP\SAPWebDisp

# Message Server Description rdisp/mshost = abcmain ms/http_port = 8081

# Description of the Access Points icm/server_port_0 icm/server_port_0 = PROT=HTTP, PORT=1081, TIMEOUT=900 icm/server_port_1 icm/server_port_1 = PROT=HTTPS, PORT=1443, TIMEOUT=900 icm/HTTPS/verify_client icm/HTTPS/verify_client = 0

# Parameters for the SAP Cryptographic Library ssl/ssl_lib = C:\Program Files\SAP\SAPWebDisp\sapcrypto.dll Files\SAP\SAPWebDisp\sapcrypto.dll ssl/server_pse ssl/server_pse = C:\Program Files\SAP\SAPWebDisp\sec\SAPSSLS.pse

SAP AG

1.18.07

SAP R/3 und HTTP

-19-

3.10 3. 10 Impo Import rtin ing g the the appli pplica cattion ion ser serve verr’s ce cert rtif ific icat ate e to to the the Web Dispatcher This configuration is only used when SSL is used for the communication between SAP Web Dispatcher and SAP Web Application Server or between SAP Web Dispatcher and SAP Message Server. Export the SSL certificate of a PSE (e.g. the SSL certificate of the SAP Web Application Server or the SSL certificate of the SAP Message Server) and import it into the Web Dispatcher’s client PSE. Export the server’s certificate sapgenpse export_own_cert -p SAPSSLS.pse -x WASPIN

Save the output to a file WAS.cer and import it to the Web Dispatcher’s client PSE using the command sapgenpse.exe maintain_pk -a WAS.cer -p SAPSSLC.pse -x ABCPIN

The opposite direction of importing the Web Dispatcher’s client certificate into the server PSE is not required, unless the server explicitely requests that a client certificate is provided using using parameter parameter icm/HTTPS/verify_client=2. Instead of importing a server’s SSL certificate directly it would also be possible to import the root certificate of the CA which was used to sign the server’s certificate. This is not described here. It is possible to use certificates which are not signed by a CA between SAP Web Dispatcher and SAP Web Application Server or SAP Web Dispatcher and SAP Message Server. However, in this case the certificates must be identical. This can be achieved by copying the server’s server PSE file to the Web Dispatcher client PSE file.

3.1 .11 1 Samp Sample le Prof Profil ile e for for the the SA SAP Web Web Dis ispa pattche cher Whe When n Reencrypting SSL and retrieving meta data using SSL When SSL reencryption is used, the SAP Web Application Server must be configured to support SSL. When meta data is retrieved using SSL, additionally the SAP Message Server must be configured to support SSL. # SAPSYSTEMNAME must be set so that the default profile is # read. If not, a warning is displayed on the console. SAPSYSTEMNAME

SAP AG

= ABC

1.18.07

SAP R/3 und HTTP

-20-

# SAPSYSTEM must be set so that the shared memory areas # can be created. # The number must be different from the other SAP instances # on the host. SAPSYSTEM = 26

# Set DIR_INSTANCE so that the SAP Cryptographic Cryptographic Library can # find the sec sub-directory. DIR_INSTANCE = C:\Program Files\SAP\SAPWebDisp Files\SAP\SAPWebDisp

# Message Server Description rdisp/mshost = abcmain ms/https_port = 8443

# Description of the Access Points icm/server_port_0 icm/server_port_0 = PROT=HTTP, PORT=1081, TIMEOUT=900 icm/server_port_1 icm/server_port_1 = PROT=HTTPS, PORT=1443, TIMEOUT=900 icm/HTTPS/verify_client icm/HTTPS/verify_client = 0

# Parameters for the SAP Cryptographic Library ssl/ssl_lib = C:\Program Files\SAP\SAPWebDisp\sapcrypto.dll Files\SAP\SAPWebDisp\sapcrypto.dll ssl/server_pse ssl/server_pse = C:\Program Files\SAP\SAPWebDisp\sec\SAPSSLS.pse

# Parameters for Using SSL to the backend server wdisp/ssl_encrypt wdisp/ssl_encrypt = 2 wdisp/ssl_auth wdisp/ssl_auth = 2 wdisp/ssl_cred wdisp/ssl_cred = SAPSSLC.pse wdisp/ssl_certhost wdisp/ssl_certhost = www.mycompany.com # Parameters for retrieving meta data using SSL wdisp/server_info_protocol=https wdisp/group_info_protocol=https wdisp/url_map_protocol=https

SAP AG

1.18.07

SAP R/3 und HTTP

-21-

4 SAP Web Dispatcher Configuration The following steps are also covered in the Web Dispatcher documentation on the SAP help portal: http://help.sap.com/saphelp_nw2004s/helpdata/en/f5/51c7d170bc4a98b1b5a03392 13af57/frameset.htm

4. 1

How to configure the URL filter

To configure the URL filter you have to set the following profile parameter in the instance profile of the Web Dispatcher: wdisp/permission_table wdisp/permission_table = $(DIR_DATA)/perm.txt $(DIR_DATA)/perm.txt

and create a textfile named perm.txt in the instance data directory with the following content: # URL permission table P

/sap/bc/*

P

/sap/public/bsp/*

D

*

Please check the new settings with the Web Admin Interface and the menu: Dispatching Module -> URL Filter.

4. 2

Setting Up Your Own Error Pages

4.2.1 Use For each Error Code, Code, you can create an HTML page, which is sent to the client when this error occurs. You can define both static pages (ending .html) and dynamic pages (ending .shtml). Moreover, you can create a file ICMERR-EDEFAULT.{html,shtml} in directory icm/HTTP/error_templ_path, whose contents are returned if there is no other template for the error. If external resources (such as images) should be referenced in the error templates, these can be delivered with the ICM’s file access handler. See also icm/HTTP/file_access_.. icm/HTTP/file_access_

SAP AG

1.18.07

SAP R/3 und HTTP

-22-

4.2.2 Prerequisites To use dynamic error handling in the ICM or Web dispatcher, you must set the profile parameter icm/HTTP/error_templ_path to the directory with the error template files. For example: icm/HTTP/error_templ_path = /usr/sap/WEB/D13/data/icmerror If you use the Internet Explorer Web browser, the option Show friendly HTTP messages  must be deactivated. You can set this from the menu: Tools   Internet Options   Advanced under Advanced  under Browsing.

4.2.3 Procedure Create files ICMERR-.(s)html in the relevant directory for the error codes you want. You can create static or dynamic error pages. 4.2.3.1 Static Error Error Pages If a static error page is defined for an error (ending .html), this is returned to the client. 4.2.3.2 Dynamic Error Pages The dynamic pages support the following SSI commands (server-die includes, see http://hoohoo.ncsa.uiuc.edu/docs/tutorials/includes.html). For the dynamic substitutions, the whole whole file fil e must be searched for the SSI tags " You can set the following variables: Variable Name

Meaning

DATE_LOCAL

Current time/date: Tue Mar 26 17:15:32 2002

DATE_GMT

Current GMT time/date: Tue Mar 26 17:15:32 2002

LAST_MODIFIED

The time ime when the current file ile was last modified

FILE_SIZE

Size of the current file in Bytes

SERVER_SO _SOFTWA FTWAR RE

SAP SAP Web Web App Appli lica cati tion on Serv Server er 6.30 6.30

SERVER_NAME

The name of the server

SERVER_PORT

The server port

SAP AG

1.18.07

SAP R/3 und HTTP

-23-

PATH_TR _TRANSLAT LATED

URL pa path (w (withou thoutt pa param rameters) rs)

ICM_SERVER

Host name and port through which this server can be reached. For example: Is3022.wdf.sapag.de:1080

ICM_INSTANCE

Instance name: ls3022_BIN_12

ICM_ERR_CODE

Error that occurred (numeric)

ICM_ERR_VERSION

ICM version

ICM_ ICM_ER ERR_ R_COM COMPO PONE NENT NT Co Com mpo pone nent nt ICM_ERR_MODULE

Module Name

ICM_ERR_LINE

Line

ICM_ERR_DETAIL

Detail on on the error that occurred

Not all fields are available for all errors. With error ICMEOVERLOAD , for example, the request has not yet been read, which is why field PATH_TRANSLATED has not been set.

In your page you can write, write, for f or example: Server:
View more...

Comments

Copyright ©2017 KUPDF Inc.
SUPPORT KUPDF