SAP Router
SAP Router
This section describes the necessary steps to download and install the sapcrypto library
for use with saprouter. The saprouter must be started with the options described later in
this section.
The license for the sapcrypto library covers saprouter connections between saprouters
at SAP and the first saprouter on customer sites and backend connections within the
customer`s network. For all other purposes the library CANNOT be used!
SECUDIR = <directory_of_saprouter>
UNIX SNC_LIB =
<path_to_libsecude>/<name_of_sapcrypto_library>
SECUDIR = <directory_of_saprouter>
WINDOWS NT, SNC_LIB = <drive>:\<path_to_libsecude>\ntia64\
2000, XP sapcrypto.dll or
or higher <drive>:\<path_to_libsecude>\ntintel\sapcrypto.dll or
<drive>:\<path_to_libsecude>\nt-x86_64\sapcrypto.dll
after configuring the variables in Windows, you have to
NOTE
reboot this server before you continue.
2. Change to the alias SAPROUTER-SNCADD. From the list of SAProuters
registered to your installation, choose the relevant “Distinguished Name”.
3. Generate the certificate Request with the command:
sapgenpse get_pse -v -r certreq -p local.pse “<Distinguished Name>”
Example:
sapgenpse get_pse -v -r certreq -p local.pse “CN=example, OU=0000123456,
OU=SAProuter, O=SAP, C=DE”
You will be asked twice for a PIN here. Please choose a PIN and document it, you
have to enter it identically both times. Then you will have to enter the same PIN
every time you want to use this PSE.
4. Display the output file "certreq" and with copy&paste (including the BEGIN and
END statement) insert the certificate request into the text area of the same form
on the SAP Service Marketplace from which you copied the Distinguished Name.
5. In response you will receive the certificate signed by the CA in the Service
Marketplace. Copy&paste the text to a new local file named "srcert", which must
be created in the same directory as the sapgenpse executable.
6. With this in turn you can install the certificate in your saprouter by calling:
sapgenpse import_own_cert -c srcert -p local.pse
7. Now you will have to create the credentials for the SAProuter with the same
program (if you omit -O <user_for_saprouter>, the credentials are created for the
logged in user account).
sapgenpse seclogin -p local.pse -O <user_for _saprouter>
Note: The account of the service user should always be entered in full
<domainname>\<username>
8. This will create a file called "cred_v2" in the same directory as "local.pse"
For increased security please check that the file can only be accessed by
the user running the SAProuter.
Do not allow any other access (not even from the same group)!
On UNIX this will mean permissions being set to 600 or even 400!
On WINDOWS check that the permissions are granted only to the
user the service is running as!
9. Check if the certificate has been imported successfully with the following
command:
sapgenpse get_my_name -v -n Issuer
The name of the Issuer should be:
CN=SAProuter CA, OU=SAProuter, O=SAP, C=DE
10. If this is not the case, delete the files "cred_v2"and "local.pse" and start over at
Item 3. If the output still does not match please open a customer message in
component XX-SER-NET stating the actions you have taken so far and the output
of the commands 3.,6.,7. and 9.
UNIX printenv
WINDOWS NT,
User environment variable
2000, XP
2. Start the SAProuter with the following command line (to start the SAProuter as a
Windows service, please follow the steps described in SAP note 525751):
Example
saprouter -r -K "p:CN=example, OU=0000123456, OU=SAProuter,
O=SAP, C=DE"
If you omit –S <port>, the process is being started on default Port ‘3299’.
3. The corresponding file "saprouttab" must contain at least the following entries
# Example saprouttab
# SNC connection to and from SAP
KT "p:CN=sapserv2, OU=SAProuter, O=SAP, C=DE" 194.39.131.34
*