Secure The RFC Connections in Your SAP System Landscape
Secure The RFC Connections in Your SAP System Landscape
Secure The RFC Connections in Your SAP System Landscape
■ ■
Regular Feature
Secure the RFC
Connections in Security
Your SAP System Strategies
Landscape
Most discussion surrounding security re-examine the robust-
today tends to focus on the changing ness of your RFC.
security paradigm that goes hand in
hand with increasingly open IT architec-
Revisiting RFC
tures. And rightly so, since opening up
Security
previously closed systems makes certain
security aspects more vital than ever A Remote Function
before. Too often, though, companies Call involves calling a
fail to review existing security measures function module that
runs in a different
when making fundamental changes to Sarah Maidstone, SAP AG Frank Buchholz, SAP AG
their security infrastructure. system (server) from
the program that calls
In this article, we’ll look at the
it (client). The informa-
consequences of increasingly complex When you grant access across system
tion on how to reach the remote system —
and open system landscapes with respect boundaries, however, there is always a
including data that describes the network
to one tried and tested technology, Remote certain element of risk involved. In the
connection, and authentication data for
Function Call (RFC), SAP’s interface case of RFC, there are two primary
the RFC user — is stored in what is
protocol for cross-system communication. vulnerabilities:
known as the RFC destination. While RFCs
Many customers do not fully understand
are most commonly used between two 1. In logon data for service users stored
the risks involved in continuing to use
SAP systems, it is also possible to call in the RFC destination
RFC connections across their SAP
specially programmed functions from non-
landscapes, or how to implement a
SAP systems. This type of connectivity is 2. In the reliance on authorizations to
strong authorization concept to
generally used to replicate data — for repel any potential attack
mitigate or avoid these risks.
example, when sharing master or trans-
action data, or when SAP BI reads Depending on the type of application
✔ Note! information from other business systems in each case, you either need to configure
Specific functionality in this using RFC and then produces reports a service user for the RFC destination,
article refers to SAP NetWeaver based on that stored data. or to ensure that the appropriate user
2004 and applications based information is forwarded — and these
on it, though the basic security RFCs are also used when centralizing users have to be assigned to appropriate
principles described here apply certain system management functions — authorizations. We’ll step through these
to earlier releases as well. such as for SAP Solution Manager or processes later in the article.
Central User Administration, which take
Before changing or expanding a sweeping, cross-system approach to
your system infrastructure — for SAP data and activities. Using these The Risks of Remote System
example, if you’re considering adding applications, an administrator logs on to Connection
new SAP systems like SAP Enterprise one central SAP system but performs Let’s examine these vulnerabilities in
Portal or mySAP CRM — be sure to actions in all connected systems. more detail.
1
The RFC Software Development Kit, or RFC SDK, is
an SAP plug-in for RFC. With RFC SDK’s Remote
Function Call API, users can remotely call ABAP
Figure 1 Security Audit Log: Configuration Setting to Analyze RFC Calls function modules from C programs, as well as receive
call requests from an ABAP program by the CALL
FUNCTION interface.