[51915] in SAPr3-news

home help back first fref pref prev next nref lref last post

Re: SAP SLES8 Kerberos and MS ADS (W2K3)

daemon@ATHENA.MIT.EDU (Sebastian Fuchs)
Fri Oct 22 09:18:10 2004

To: sapr3-news@mit.edu
Date: Fri, 22 Oct 2004 15:17:58 +0200
From: Sebastian Fuchs <sebastian.fuchs@nospam.prodata-rz.com>
Message-ID: <41790888$1@e-post.inode.at>

ostparktux schrieb:
> since SSO is very modern also the SAP universe is looking for simplyfing
> logon process. A common IT landscape does have SAP systemes running on LINUX
> (SuSE SLES8), MS (W2K, XP)clients running SAPgui (6.x) and MS ADS (W2K3).

> We are still looking for a solution which is working with MS, SAP and open
> soure tools only.

We have a working ADS-Kerberos-SSO configuration here. R/3 application 
servers are on Win2k and Linux and SSO authenticates users against ADS. 
Getting Kerberos-SSO to work with a Windows-only configuration is easy, 
you only need to install the gsskrb5.dll available from SAP on the 
application servers and frontends and add SNC-names like 
"p:<user>@<ADS-DOMAIN>" in SU01 and "p:SAPService<SID>@<ADS-DOMAIN>" in 
SAPLogon.
If you want to integrate Unix app servers it's a bit more tricky. You 
need to configure the R/3 app servers as MIT-Kerberos app servers (no 
need to install Kerberos KDC as the ADS works as KDC). Then you should 
be able to use kinit to get tickets from the ADS. The problem is that 
the Microsoft Kerberos implementation does not support service 
principals. So you have to create a pseudo user in the ADS 
(SAPService<SID>) and map this user to a service with the tool 
ktpass.exe. Then you can create a keytab file and transfer it to the 
Unix server.

HTH,

Sebastian Fuchs

home help back first fref pref prev next nref lref last post