Developers create authorization information for business users in their environment and deploy this information in an application. They make this available to administrators, who complete the authorization setup and assign the authorizations to business users.
Developers store authorization information as design-time role templates in the xs-security.json
security descriptor file. Using the cockpit, administrators of the environment assign the authorizations to business users.
The following sections contain the process of adding authentication and authorization checks for protecting your applications, links to a number of associated tutorials, extended tasks for creating authorization artifacts, as well as reference information, including the syntax required to set the properties and values defined in the application security descriptor file.
Application security is maintained in the application security descriptor file (xs-security.json
). You can use this file to define application-based security artifacts, which are the building blocks for authorizations. In this section, you can learn how to create this file and use it to create a service instance of the SAP Authorization and Trust Management service. Following this single tenant scenario, move on in increasing complexity to procedures that depict how to propagate user information between applications or services, add multitenancy to your application, and set up instance-based authorizations.
Use tutorials to get familiar with the SAP Authorization and Trust Management service in the Cloud Foundry environment of SAP BTP.
For more information, see Tutorials for the SAP Authorization and Trust Management Service.
Here you can find information regarding accessing the UAA admin APIs for creating XSUAA artifacts, as well as the process of configuring redirect URLs.
In addition, as an application developer, you may want to create role collections for immediate use. For example, to deliver role collections that administrators can use in the SAP BTP cockpit and easily assign to users in an onboarding process.
For more information, see Create Role Collections with Predefined Roles.
For the syntax required to set the properties and values defined in the application security descriptor file (xs-security.json
), see Application Security Descriptor Configuration Syntax.
Related Information
SAP Authorization and Trust Management Service in the Cloud Foundry Environment