{"id":1681,"date":"2021-06-08T11:12:49","date_gmt":"2021-06-08T09:12:49","guid":{"rendered":"https:\/\/sast-solutions.com\/blog-en\/?p=1681"},"modified":"2021-06-08T11:12:49","modified_gmt":"2021-06-08T09:12:49","slug":"trusted-system-relationships-simplify-logon-procedure-rfc-communication-how-sensible-secure-is-their-use","status":"publish","type":"post","link":"https:\/\/sast-solutions.com\/blog-en\/2021\/06\/08\/trusted-system-relationships-simplify-logon-procedure-rfc-communication-how-sensible-secure-is-their-use\/","title":{"rendered":"Trusted system relationships simplify the logon procedure for RFC communication \u2013 but how sensible and secure is their use?"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-408 alignleft\" src=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2018\/01\/motiv_sast-ifm_72dpi_1701-300x194.png\" alt=\"SAST Blog: Trusted system relationships simplify the logon procedure for RFC communication \u2013 but how sensible and secure is their use?\" width=\"300\" height=\"194\" srcset=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2018\/01\/motiv_sast-ifm_72dpi_1701-300x194.png 300w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2018\/01\/motiv_sast-ifm_72dpi_1701.png 527w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>The RFC (Remote Function Call) is the main SAP technology for exchanging data between SAP systems. In addition to standard RFC connections, it is also possible to configure trusted relationships. In our technology tip, find out when you should use trusted system relationships and how you can use them securely.<\/p>\n<p><!--more--><\/p>\n<p>&nbsp;<\/p>\n<h2><strong>Configuring a trusted RFC relationship without password<\/strong><\/h2>\n<p>In contrast to standard connections, a trusted system connection does not require a password to be entered. This greatly simplifies the logon procedure for RFC communication. A connection of this type can be established if the calling system has previously been declared as a \u201ctrusted system\u201d to the called system and the called system has also been registered as a \u201ctrusting system\u201d. Both SAP systems should have the same security level in this scenario.<\/p>\n<p>During a call, the trusting SAP system checks whether the call was made from a trusted SAP system.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-1682\" src=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/06\/Blog_Trusted-Systembeziehungen_en.jpg\" alt=\"SAST Blog: Trusted system relationships simplify the logon procedure for RFC communication \u2013 but how sensible and secure is their use?\" width=\"807\" height=\"448\" srcset=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/06\/Blog_Trusted-Systembeziehungen_en.jpg 807w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/06\/Blog_Trusted-Systembeziehungen_en-300x167.jpg 300w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/06\/Blog_Trusted-Systembeziehungen_en-768x426.jpg 768w\" sizes=\"auto, (max-width: 807px) 100vw, 807px\" \/><\/p>\n<p>You can use the authorization object S_RFCACL in the target system to control which users are allowed to make calls without entering a password. You can differentiate here by SAP system ID (SAPSID), client, and calling transaction. The logon data of a user can then be verified using the function module AUTHORITY_CHECK_TRUSTED_SYSTEM.<\/p>\n<p>In contrast to standard RFC connections, trusted RFC connections are not created directly in transaction SM59, but instead are tested and maintained using transaction SMT1. When you create a connection to a trusting system, all the necessary information \u2013 like the name of the application server and the security key \u2013 is provided automatically. Transaction SMT2 enables you to display the trusting systems.<\/p>\n<h2><strong>What you need to watch out for when using trusted RFC connections<\/strong><\/h2>\n<ul>\n<li>You should only use trusted system relationships after a thorough analysis and risk assessment.<\/li>\n<li>When a Solution Manager is integrated with SAP systems, trusted RFC connections are used as the standard, due to performance reasons. You should check whether this connection type should be replaced with a standard RFC connection, with system user and password, particularly for systems with enterprise-critical data.<\/li>\n<li>Make sure that the authorization object S_RFCACL does not have any values with \u201c*\u201d.<\/li>\n<li>The following applies for RFC connections to trusting RFC systems: Do not save any user information, otherwise the trusting system will no longer be able to differentiate between calling users.<\/li>\n<li>RFC connections should only use technical users or system users that have the authorizations required for this specific purpose \u2013 and only these authorizations.<\/li>\n<li>Do not use trusted connections from systems with low classification levels to systems with higher classification levels.<\/li>\n<\/ul>\n<h2><strong>How you can guarantee secure RFC communication<\/strong><\/h2>\n<ul>\n<li>If RFC access is made through a trusted system relationship, make sure that the authorization object S_RFCACL has precisely defined which user in the target system is authorized to perform function calls without specifying the password.<\/li>\n<li>To increase RFC security even more, we recommend checking your SAP Gateway and hardening it, particularly the ACL files secinfo, reginfo, and prxyinfo. For more information, refer to our blog <a href=\"https:\/\/sast-solutions.com\/blog-en\/2019\/02\/01\/step-by-step-secure-sap-gateway\/\" target=\"_blank\" rel=\"noopener\">https:\/\/sast-solutions.com\/blog-en\/2019\/02\/01\/step-by-step-secure-sap-gateway\/<\/a><\/li>\n<li>We also recommend using Secure Network Communications (SNC) to protect data communication via RFC protocol.<\/li>\n<\/ul>\n<p>In closing, here\u2019s one more technology tip for you to think about:<\/p>\n<p>The tables RFCDES, RFCTRUST, and RFCSYSACL are used for logging by default. If table logging is activated through the system parameter rec\/client=1, you can use the report RSTBHIST or RSVTPROT (or transaction SCU3) to track the changes that have been made to the settings for trusted relationships.<\/p>\n<p>If you need more information about using trusted system relationships or would like to have support in securing your trusted RFC connections, visit our <a href=\"https:\/\/sast-solutions.com\/\" target=\"_blank\" rel=\"noopener\">website<\/a> or <a href=\"mailto:sast@akquinet.de\" target=\"_blank\" rel=\"noopener\">e-mail us<\/a>.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-1092\" src=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2020\/04\/Matthias-Anst\u00f6tz-244x300.jpg\" alt=\"Matthias Anst\u00f6tz (SAST SOLUTIONS)\" width=\"244\" height=\"300\" srcset=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2020\/04\/Matthias-Anst\u00f6tz-244x300.jpg 244w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2020\/04\/Matthias-Anst\u00f6tz.jpg 297w\" sizes=\"auto, (max-width: 244px) 100vw, 244px\" \/><br \/>\n<strong>Matthias Anst\u00f6tz (SAP Security Consultant, SAST SOLUTIONS)<\/strong><\/p>\n<p>&nbsp;<\/p>\n<h2>More information on the topic:<\/h2>\n<blockquote class=\"wp-embedded-content\" data-secret=\"JjCEoj1G6Q\"><p><a href=\"https:\/\/sast-solutions.com\/blog-en\/2019\/08\/27\/rfc-interfaces-in-sap-landscapes-an-overview\/\">RFC Interfaces in SAP Landscapes: An Overview<\/a><\/p><\/blockquote>\n<p><iframe loading=\"lazy\" class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;RFC Interfaces in SAP Landscapes: An Overview&#8221; &#8212; SAST BLOG\" src=\"https:\/\/sast-solutions.com\/blog-en\/2019\/08\/27\/rfc-interfaces-in-sap-landscapes-an-overview\/embed\/#?secret=JjCEoj1G6Q\" data-secret=\"JjCEoj1G6Q\" width=\"600\" height=\"338\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<blockquote class=\"wp-embedded-content\" data-secret=\"OHnLnttfEN\"><p><a href=\"https:\/\/sast-solutions.com\/blog-en\/2019\/02\/01\/step-by-step-secure-sap-gateway\/\">One step at a time: How to secure and harden your SAP Gateway<\/a><\/p><\/blockquote>\n<p><iframe loading=\"lazy\" class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;One step at a time: How to secure and harden your SAP Gateway&#8221; &#8212; SAST BLOG\" src=\"https:\/\/sast-solutions.com\/blog-en\/2019\/02\/01\/step-by-step-secure-sap-gateway\/embed\/#?secret=OHnLnttfEN\" data-secret=\"OHnLnttfEN\" width=\"600\" height=\"338\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The RFC (Remote Function Call) is the main SAP technology for exchanging data between SAP systems. In addition to standard RFC connections, it is also possible to configure trusted relationships. In our technology tip, find out when you should use trusted system relationships and how you can use them securely.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6],"tags":[67,61,68,80],"class_list":["post-1681","post","type-post","status-publish","format-standard","hentry","category-sap-security","tag-identity-management","tag-rfc-interface","tag-sap-authorizations","tag-sap-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How sensible and secure is the use of trusted system relationships?<\/title>\n<meta name=\"description\" content=\"Find out in our technology tip when you should use trusted system relationships and how they can be used securely.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sast-solutions.com\/blog-en\/2021\/06\/08\/trusted-system-relationships-simplify-logon-procedure-rfc-communication-how-sensible-secure-is-their-use\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How sensible and secure is the use of trusted system relationships?\" \/>\n<meta property=\"og:description\" content=\"Find out in our technology tip when you should use trusted system relationships and how they can be used securely.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sast-solutions.com\/blog-en\/2021\/06\/08\/trusted-system-relationships-simplify-logon-procedure-rfc-communication-how-sensible-secure-is-their-use\/\" \/>\n<meta property=\"og:site_name\" content=\"SAST BLOG\" \/>\n<meta property=\"article:published_time\" content=\"2021-06-08T09:12:49+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2018\/01\/motiv_sast-ifm_72dpi_1701.png\" \/>\n\t<meta property=\"og:image:width\" content=\"527\" \/>\n\t<meta property=\"og:image:height\" content=\"340\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"securityblog\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"How sensible and secure is the use of trusted system relationships?\" \/>\n<meta name=\"twitter:description\" content=\"Find out in our technology tip when you should use trusted system relationships and how they can be used securely.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2018\/01\/motiv_sast-ifm_72dpi_1701.png\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"securityblog\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2021\\\/06\\\/08\\\/trusted-system-relationships-simplify-logon-procedure-rfc-communication-how-sensible-secure-is-their-use\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2021\\\/06\\\/08\\\/trusted-system-relationships-simplify-logon-procedure-rfc-communication-how-sensible-secure-is-their-use\\\/\"},\"author\":{\"name\":\"securityblog\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/person\\\/cd70e3749cca136a7e8a37dc1d3cfc26\"},\"headline\":\"Trusted system relationships simplify the logon procedure for RFC communication \u2013 but how sensible and secure is their use?\",\"datePublished\":\"2021-06-08T09:12:49+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2021\\\/06\\\/08\\\/trusted-system-relationships-simplify-logon-procedure-rfc-communication-how-sensible-secure-is-their-use\\\/\"},\"wordCount\":650,\"publisher\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2021\\\/06\\\/08\\\/trusted-system-relationships-simplify-logon-procedure-rfc-communication-how-sensible-secure-is-their-use\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/wp-content\\\/uploads\\\/2018\\\/01\\\/motiv_sast-ifm_72dpi_1701-300x194.png\",\"keywords\":[\"Identity Management\",\"RFC Interface\",\"SAP Authorizations\",\"SAP Security\"],\"articleSection\":[\"SAP Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2021\\\/06\\\/08\\\/trusted-system-relationships-simplify-logon-procedure-rfc-communication-how-sensible-secure-is-their-use\\\/\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2021\\\/06\\\/08\\\/trusted-system-relationships-simplify-logon-procedure-rfc-communication-how-sensible-secure-is-their-use\\\/\",\"name\":\"How sensible and secure is the use of trusted system relationships?\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2021\\\/06\\\/08\\\/trusted-system-relationships-simplify-logon-procedure-rfc-communication-how-sensible-secure-is-their-use\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2021\\\/06\\\/08\\\/trusted-system-relationships-simplify-logon-procedure-rfc-communication-how-sensible-secure-is-their-use\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/wp-content\\\/uploads\\\/2018\\\/01\\\/motiv_sast-ifm_72dpi_1701-300x194.png\",\"datePublished\":\"2021-06-08T09:12:49+00:00\",\"description\":\"Find out in our technology tip when you should use trusted system relationships and how they can be used securely.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2021\\\/06\\\/08\\\/trusted-system-relationships-simplify-logon-procedure-rfc-communication-how-sensible-secure-is-their-use\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2021\\\/06\\\/08\\\/trusted-system-relationships-simplify-logon-procedure-rfc-communication-how-sensible-secure-is-their-use\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2021\\\/06\\\/08\\\/trusted-system-relationships-simplify-logon-procedure-rfc-communication-how-sensible-secure-is-their-use\\\/#primaryimage\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/wp-content\\\/uploads\\\/2018\\\/01\\\/motiv_sast-ifm_72dpi_1701.png\",\"contentUrl\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/wp-content\\\/uploads\\\/2018\\\/01\\\/motiv_sast-ifm_72dpi_1701.png\",\"width\":527,\"height\":340,\"caption\":\"SAST Blog: Trusted system relationships simplify the logon procedure for RFC communication \u2013 but how sensible and secure is their use?\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2021\\\/06\\\/08\\\/trusted-system-relationships-simplify-logon-procedure-rfc-communication-how-sensible-secure-is-their-use\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Trusted system relationships simplify the logon procedure for RFC communication \u2013 but how sensible and secure is their use?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#website\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/\",\"name\":\"SAST BLOG\",\"description\":\"SAP Security &amp; Compliance\",\"publisher\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#organization\",\"name\":\"SAST BLOG\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/sast-solutions-logo.png\",\"contentUrl\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/sast-solutions-logo.png\",\"width\":358,\"height\":155,\"caption\":\"SAST BLOG\"},\"image\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/person\\\/cd70e3749cca136a7e8a37dc1d3cfc26\",\"name\":\"securityblog\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How sensible and secure is the use of trusted system relationships?","description":"Find out in our technology tip when you should use trusted system relationships and how they can be used securely.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sast-solutions.com\/blog-en\/2021\/06\/08\/trusted-system-relationships-simplify-logon-procedure-rfc-communication-how-sensible-secure-is-their-use\/","og_locale":"en_US","og_type":"article","og_title":"How sensible and secure is the use of trusted system relationships?","og_description":"Find out in our technology tip when you should use trusted system relationships and how they can be used securely.","og_url":"https:\/\/sast-solutions.com\/blog-en\/2021\/06\/08\/trusted-system-relationships-simplify-logon-procedure-rfc-communication-how-sensible-secure-is-their-use\/","og_site_name":"SAST BLOG","article_published_time":"2021-06-08T09:12:49+00:00","og_image":[{"width":527,"height":340,"url":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2018\/01\/motiv_sast-ifm_72dpi_1701.png","type":"image\/png"}],"author":"securityblog","twitter_card":"summary_large_image","twitter_title":"How sensible and secure is the use of trusted system relationships?","twitter_description":"Find out in our technology tip when you should use trusted system relationships and how they can be used securely.","twitter_image":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2018\/01\/motiv_sast-ifm_72dpi_1701.png","twitter_misc":{"Written by":"securityblog","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/sast-solutions.com\/blog-en\/2021\/06\/08\/trusted-system-relationships-simplify-logon-procedure-rfc-communication-how-sensible-secure-is-their-use\/#article","isPartOf":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2021\/06\/08\/trusted-system-relationships-simplify-logon-procedure-rfc-communication-how-sensible-secure-is-their-use\/"},"author":{"name":"securityblog","@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/person\/cd70e3749cca136a7e8a37dc1d3cfc26"},"headline":"Trusted system relationships simplify the logon procedure for RFC communication \u2013 but how sensible and secure is their use?","datePublished":"2021-06-08T09:12:49+00:00","mainEntityOfPage":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2021\/06\/08\/trusted-system-relationships-simplify-logon-procedure-rfc-communication-how-sensible-secure-is-their-use\/"},"wordCount":650,"publisher":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#organization"},"image":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2021\/06\/08\/trusted-system-relationships-simplify-logon-procedure-rfc-communication-how-sensible-secure-is-their-use\/#primaryimage"},"thumbnailUrl":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2018\/01\/motiv_sast-ifm_72dpi_1701-300x194.png","keywords":["Identity Management","RFC Interface","SAP Authorizations","SAP Security"],"articleSection":["SAP Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/sast-solutions.com\/blog-en\/2021\/06\/08\/trusted-system-relationships-simplify-logon-procedure-rfc-communication-how-sensible-secure-is-their-use\/","url":"https:\/\/sast-solutions.com\/blog-en\/2021\/06\/08\/trusted-system-relationships-simplify-logon-procedure-rfc-communication-how-sensible-secure-is-their-use\/","name":"How sensible and secure is the use of trusted system relationships?","isPartOf":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2021\/06\/08\/trusted-system-relationships-simplify-logon-procedure-rfc-communication-how-sensible-secure-is-their-use\/#primaryimage"},"image":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2021\/06\/08\/trusted-system-relationships-simplify-logon-procedure-rfc-communication-how-sensible-secure-is-their-use\/#primaryimage"},"thumbnailUrl":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2018\/01\/motiv_sast-ifm_72dpi_1701-300x194.png","datePublished":"2021-06-08T09:12:49+00:00","description":"Find out in our technology tip when you should use trusted system relationships and how they can be used securely.","breadcrumb":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2021\/06\/08\/trusted-system-relationships-simplify-logon-procedure-rfc-communication-how-sensible-secure-is-their-use\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sast-solutions.com\/blog-en\/2021\/06\/08\/trusted-system-relationships-simplify-logon-procedure-rfc-communication-how-sensible-secure-is-their-use\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sast-solutions.com\/blog-en\/2021\/06\/08\/trusted-system-relationships-simplify-logon-procedure-rfc-communication-how-sensible-secure-is-their-use\/#primaryimage","url":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2018\/01\/motiv_sast-ifm_72dpi_1701.png","contentUrl":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2018\/01\/motiv_sast-ifm_72dpi_1701.png","width":527,"height":340,"caption":"SAST Blog: Trusted system relationships simplify the logon procedure for RFC communication \u2013 but how sensible and secure is their use?"},{"@type":"BreadcrumbList","@id":"https:\/\/sast-solutions.com\/blog-en\/2021\/06\/08\/trusted-system-relationships-simplify-logon-procedure-rfc-communication-how-sensible-secure-is-their-use\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sast-solutions.com\/blog-en\/"},{"@type":"ListItem","position":2,"name":"Trusted system relationships simplify the logon procedure for RFC communication \u2013 but how sensible and secure is their use?"}]},{"@type":"WebSite","@id":"https:\/\/sast-solutions.com\/blog-en\/#website","url":"https:\/\/sast-solutions.com\/blog-en\/","name":"SAST BLOG","description":"SAP Security &amp; Compliance","publisher":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sast-solutions.com\/blog-en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/sast-solutions.com\/blog-en\/#organization","name":"SAST BLOG","url":"https:\/\/sast-solutions.com\/blog-en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/logo\/image\/","url":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/03\/sast-solutions-logo.png","contentUrl":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/03\/sast-solutions-logo.png","width":358,"height":155,"caption":"SAST BLOG"},"image":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/person\/cd70e3749cca136a7e8a37dc1d3cfc26","name":"securityblog"}]}},"_links":{"self":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts\/1681","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/comments?post=1681"}],"version-history":[{"count":1,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts\/1681\/revisions"}],"predecessor-version":[{"id":1683,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts\/1681\/revisions\/1683"}],"wp:attachment":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/media?parent=1681"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/categories?post=1681"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/tags?post=1681"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}