{"id":522,"date":"2018-05-28T08:00:34","date_gmt":"2018-05-28T06:00:34","guid":{"rendered":"http:\/\/akquinet-security-en.blog\/?p=522"},"modified":"2020-07-24T11:24:14","modified_gmt":"2020-07-24T09:24:14","slug":"how-to-guard-your-sap-gateway-against-unauthorized-calls","status":"publish","type":"post","link":"https:\/\/sast-solutions.com\/blog-en\/2018\/05\/28\/how-to-guard-your-sap-gateway-against-unauthorized-calls\/","title":{"rendered":"How to guard your SAP Gateway against unauthorized calls"},"content":{"rendered":"<p><span style=\"color: #616262;\"><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-513 alignleft\" src=\"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2018\/05\/shutterstock_291917768_akqw_jpg.jpg\" alt=\"shutterstock_291917768_akqw_jpg\" width=\"300\" height=\"210\" srcset=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2018\/05\/shutterstock_291917768_akqw_jpg.jpg 640w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2018\/05\/shutterstock_291917768_akqw_jpg-300x210.jpg 300w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>Time and again, we&#8217;ve seen subpar handling of risk resolution in practice for RFC interfaces, with no guarantee for maintaining proper and secure operating conditions.<\/span><\/p>\n<p><span style=\"color: #616262;\">In today&#8217;s practical tip, we give you a step-by-step explanation of how you can secure your SAP gateways against unauthorized calls.<\/span><\/p>\n<p><!--more--><\/p>\n<p><span style=\"color: #616262;\">SAP systems use several different mechanisms to execute OS commands.<\/span><\/p>\n<p><strong><span style=\"color: #616262;\">1. Dialog call with an authenticated user<\/span><\/strong><br \/>\n<span style=\"color: #616262;\"> a) CALL &#8216;SYSTEM&#8217; C-call from ABAP programs (RSBDCOS0) or Z-programs<\/span><br \/>\n<span style=\"color: #616262;\"> b) Call logical OS commands using the SM49\/SM69 mechanism in ABAP programs<\/span><\/p>\n<p><span style=\"color: #616262;\"><strong>2. Batch processing (SM36) with an SAP user<\/strong><\/span><br \/>\n<span style=\"color: #616262;\"> a) Call logical OS commands via the SM49\/SM69 mechanism in jobs<\/span><br \/>\n<span style=\"color: #616262;\"> b) Call direct OS commands in jobs<\/span><\/p>\n<p><strong><span style=\"color: #616262;\">3. Initiate commands via the SAP Gateway<\/span><\/strong><br \/>\n<span style=\"color: #616262;\"> a) Via RFC server program SAPXPG<\/span><br \/>\n<span style=\"color: #616262;\"> b) Via RFC server program RFCEXEC<\/span><\/p>\n<p><span style=\"color: #616262;\">Crucially, you must ensure that all options that use SM49\/SM69 commands and the SAP Gateway have security mechanisms that guard against unauthorized calls.<\/span><\/p>\n<p><strong><span style=\"color: #616262;\">Lock it down: gateway security and SAPXPG.SEC<\/span><\/strong><\/p>\n<p><span style=\"color: #616262;\">Calls of external OS commands are not performed directly. Instead, auxiliary programs such as RFCEXEC and SAPXPG are involved. To do this, the Gateway Security file SECINFO must be configured in such a way that calling RFCEXEC is prevented for security reasons and that SAPXPG can only called via LOCAL or INTERNAL.<\/span><\/p>\n<p><span style=\"color: #616262;\">The first step in securing SAP systems at the level of the Gateway and NI layer is to isolate the SAP server segment from the PC segment. Second, all calls must be routed to the SAP server segment via an SAP router over 32xx and 33xx ports as an application-level proxy in combination with a firewall.<\/span><\/p>\n<p><strong><span style=\"color: #616262;\">Take advantage of SAP XPG logging<\/span><\/strong><\/p>\n<p>The only thing that the SECINFO security file controls is whether SAPXPG can be started. However, no further filtering can be done at gateway level as to which subsequent OS commands can be called (see transaction SM49). The program SAPXPG offers comprehensive logging functions that permit you to analyze the OS commands that are called.<\/p>\n<p>Here&#8217;s how you can turn on SAPXPG logging:<\/p>\n<p>1.\u00a0 On your SAP server, set the &#8220;SAPXPG_PROTOCOL = 1&#8221; environment variable<br \/>\nDo this for every SAP instance in the user environment &lt;sid&gt;adm (Unix) or SAPService&lt;SID&gt; (Windows)<\/p>\n<p>2.\u00a0 Setting the environment variable: SAPXPG_PROTOCOL_PATH = &lt;path for log file&gt;<br \/>\nThis variable describes the existing directory to which the log file is written.<br \/>\nRecommendation: SAPXPG_PROTOCOL_PATH = \/usr\/sap\/&lt;SID&gt;\/&lt;INSTANCE_DIRECTORY&gt;\/work\/<br \/>\nIt is important that this ends with the system-specific separator, either slash or backslash.<\/p>\n<p>As long as logging is turned on, a log file named &#8220;xpg_prot_mm-dd&#8221; is generated in the <span style=\"color: #616262;\">defined directory every day (&#8220;mm&#8221; is for month, &#8220;dd&#8221; for day).<\/span><\/p>\n<p><strong><span style=\"color: #616262;\">Generating SAPXPG SEC files and activating security<\/span><\/strong><\/p>\n<p><span style=\"color: #616262;\">Protection against unauthorized calls from the OS level must be implemented at level 2 via a SAPXPG.SEC file (see OSS Note 686765). The main switch for the environment variable is &#8220;SAPXPG_SEC_CHECK&#8221;. Next, you must configure the environment variable &#8220;SAPXPG_SEC_CHECK = POS&#8221; in the Unix or Windows environment for the user of the instance.<\/span><\/p>\n<p><span style=\"color: #616262;\">However, to prevent all external commands from being blocked after you install the new SAPXPG, you must also turn on this &#8220;main switch&#8221; (specify any single-digit value for the environment variable). The security check is not performed until you have done this. In this case, you must also disallow ALL commands in the SAPXPG.SEC that are not permitted. This is practically impossible. SAP has recognized this and adapted.<\/span><\/p>\n<p>The file SAPXPG.SEC (see Note 686765) can also be interpreted as a positive list, which is easy to maintain and provides optimum protection. You can achieve this by assigning any 3-character value to the environment variable &#8220;SAPXPG_SEC_CHECK&#8221; on the target computer, for example POS.<\/p>\n<p>A word of caution, however \u2013 avoid using &#8220;\/&#8221; as a separator character as this is a component in UNIX command names when the full path is specified. Try using &#8220;#&#8221; instead. The new positive list function is delivered with an SAPXPG Patch for the kernel <span style=\"color: #616262;\">Releases 640 and 700.<\/span><\/p>\n<p><span style=\"color: #616262;\">Examples for an SAPXPG.SEC file:<\/span><\/p>\n<p><span style=\"color: #616262;\">1.\u00a0 #U#*#C#*#T#3#F#*#O#cp, pwd, ls #S#*#<\/span><br \/>\n<span style=\"color: #616262;\"> Here, only those commands specified may be executed by all users who have SAP authorization in the calling system to call external commands or external programs.<\/span><\/p>\n<p><span style=\"color: #616262;\">2.\u00a0 If you want to differentiate between users, you must create exactly one line for each user, for example:<\/span><br \/>\n<span style=\"color: #616262;\"> #U#SMITH#C#*#T#3#F#*#O#cp, pwd, ls #S#*#<\/span><br \/>\n<span style=\"color: #616262;\"> #U#CARTER#C#*#T#3#F#*#O#cp, pwd, ls, rm #S#*#<\/span><br \/>\n<span style=\"color: #616262;\"> #U#SUPERUSER#C#*#T#3#F#*#O#*#S#*#<\/span><\/p>\n<p><span style=\"color: #616262;\">But be careful because well-meaning admins may decide to create a separate line for each user and each command in SAPXPC.EXE. A good idea, but one that does not work. <\/span><br \/>\n<span style=\"color: #616262;\"> The kernel only evaluates one line per user. This means that you must be sure to enter all Unix commands into a comma-separated list.<\/span><\/p>\n<p><strong><span style=\"color: #616262;\">Don&#8217;t forget about authorizations<br \/>\n<\/span><\/strong><span style=\"color: #616262;\">In SAP, the object &#8220;S_LOG_COM&#8221; controls which logical commands, and by extension which OS commands, that a user is authorized to execute. Thus, admins should assign &#8220;S_LOG_COM&#8221; only to users to whom interface tasks will be assigned.<\/span><\/p>\n<p><span style=\"color: #616262;\"><strong>Result<\/strong><br \/>\n<\/span><span style=\"color: #616262;\">Once hardening is complete, your users can execute only those OS commands for which they are authorized. Be sure to check both positive and negative tests and don&#8217;t be surprised when you see the following: When calls are denied, you&#8217;ll see the notification &#8220;Communication Error&#8221; in SM49, rather than &#8220;Not authorized according to SAPXPG.SEC&#8221;.<\/span><\/p>\n<h6><span style=\"color: #616262;\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-33\" src=\"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2017\/01\/ralfkempf_akquinet.jpg\" alt=\"ralfkempf_akquinet\" width=\"143\" height=\"100\" srcset=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2017\/01\/ralfkempf_akquinet.jpg 640w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2017\/01\/ralfkempf_akquinet-300x210.jpg 300w\" sizes=\"auto, (max-width: 143px) 100vw, 143px\" \/><br \/>\nRalf Kempf<\/span><br \/>\nTechnical Managing Director<span style=\"color: #616262;\"> &#8220;SAST SOLUTIONS&#8221;<\/span><\/h6>\n<p><span style=\"color: #616262;\">Do you wish you had some support for protecting your SAP systems?<br \/>\n<\/span><span style=\"color: #616262;\"><a href=\"https:\/\/sast-solutions.de\/en\/sast-suite\/sap-platform-security\/index.jsp\" target=\"_blank\" rel=\"noopener noreferrer\">SAST Interface Management<\/a> covers comprehensive functions for analyzing gateway and SAPXPG security, and can additionally assess your authorizations, detecting misuse in real time. Generating SAPXPG.SEC ACL files based on the log files is also convenient with SAST SUITE. If you still would rather place the security of your SAP gateways into professional hands, our experienced SAP security experts would be glad help at any time.<\/span><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Time and again, we&#8217;ve seen subpar handling of risk resolution in practice for RFC interfaces, with no guarantee for maintaining proper and secure operating conditions.<br \/>\nIn today&#8217;s practical tip, we give you a step-by-step explanation of how you can secure your SAP gateways against unauthorized calls.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6],"tags":[156,61,80],"class_list":["post-522","post","type-post","status-publish","format-standard","hentry","category-sap-security","tag-cyber-security","tag-rfc-interface","tag-sap-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How to guard your SAP Gateway against unauthorized calls<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sast-solutions.com\/blog-en\/2018\/05\/28\/how-to-guard-your-sap-gateway-against-unauthorized-calls\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to guard your SAP Gateway against unauthorized calls\" \/>\n<meta property=\"og:description\" content=\"Time and again, we&#039;ve seen subpar handling of risk resolution in practice for RFC interfaces, with no guarantee for maintaining proper and secure operating conditions. In today&#039;s practical tip, we give you a step-by-step explanation of how you can secure your SAP gateways against unauthorized calls.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sast-solutions.com\/blog-en\/2018\/05\/28\/how-to-guard-your-sap-gateway-against-unauthorized-calls\/\" \/>\n<meta property=\"og:site_name\" content=\"SAST BLOG\" \/>\n<meta property=\"article:published_time\" content=\"2018-05-28T06:00:34+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-07-24T09:24:14+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2018\/05\/shutterstock_291917768_akqw_jpg.jpg\" \/>\n<meta name=\"author\" content=\"securityblog\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"securityblog\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2018\\\/05\\\/28\\\/how-to-guard-your-sap-gateway-against-unauthorized-calls\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2018\\\/05\\\/28\\\/how-to-guard-your-sap-gateway-against-unauthorized-calls\\\/\"},\"author\":{\"name\":\"securityblog\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/person\\\/cd70e3749cca136a7e8a37dc1d3cfc26\"},\"headline\":\"How to guard your SAP Gateway against unauthorized calls\",\"datePublished\":\"2018-05-28T06:00:34+00:00\",\"dateModified\":\"2020-07-24T09:24:14+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2018\\\/05\\\/28\\\/how-to-guard-your-sap-gateway-against-unauthorized-calls\\\/\"},\"wordCount\":1018,\"publisher\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2018\\\/05\\\/28\\\/how-to-guard-your-sap-gateway-against-unauthorized-calls\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sast-blog.akquinet.com\\\/wp-content\\\/uploads\\\/2018\\\/05\\\/shutterstock_291917768_akqw_jpg.jpg\",\"keywords\":[\"Cyber Security\",\"RFC Interface\",\"SAP Security\"],\"articleSection\":[\"SAP Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2018\\\/05\\\/28\\\/how-to-guard-your-sap-gateway-against-unauthorized-calls\\\/\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2018\\\/05\\\/28\\\/how-to-guard-your-sap-gateway-against-unauthorized-calls\\\/\",\"name\":\"How to guard your SAP Gateway against unauthorized calls\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2018\\\/05\\\/28\\\/how-to-guard-your-sap-gateway-against-unauthorized-calls\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2018\\\/05\\\/28\\\/how-to-guard-your-sap-gateway-against-unauthorized-calls\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sast-blog.akquinet.com\\\/wp-content\\\/uploads\\\/2018\\\/05\\\/shutterstock_291917768_akqw_jpg.jpg\",\"datePublished\":\"2018-05-28T06:00:34+00:00\",\"dateModified\":\"2020-07-24T09:24:14+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2018\\\/05\\\/28\\\/how-to-guard-your-sap-gateway-against-unauthorized-calls\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2018\\\/05\\\/28\\\/how-to-guard-your-sap-gateway-against-unauthorized-calls\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2018\\\/05\\\/28\\\/how-to-guard-your-sap-gateway-against-unauthorized-calls\\\/#primaryimage\",\"url\":\"https:\\\/\\\/sast-blog.akquinet.com\\\/wp-content\\\/uploads\\\/2018\\\/05\\\/shutterstock_291917768_akqw_jpg.jpg\",\"contentUrl\":\"https:\\\/\\\/sast-blog.akquinet.com\\\/wp-content\\\/uploads\\\/2018\\\/05\\\/shutterstock_291917768_akqw_jpg.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2018\\\/05\\\/28\\\/how-to-guard-your-sap-gateway-against-unauthorized-calls\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to guard your SAP Gateway against unauthorized calls\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#website\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/\",\"name\":\"SAST BLOG\",\"description\":\"SAP Security &amp; Compliance\",\"publisher\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#organization\",\"name\":\"SAST BLOG\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/sast-solutions-logo.png\",\"contentUrl\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/sast-solutions-logo.png\",\"width\":358,\"height\":155,\"caption\":\"SAST BLOG\"},\"image\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/person\\\/cd70e3749cca136a7e8a37dc1d3cfc26\",\"name\":\"securityblog\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to guard your SAP Gateway against unauthorized calls","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sast-solutions.com\/blog-en\/2018\/05\/28\/how-to-guard-your-sap-gateway-against-unauthorized-calls\/","og_locale":"en_US","og_type":"article","og_title":"How to guard your SAP Gateway against unauthorized calls","og_description":"Time and again, we've seen subpar handling of risk resolution in practice for RFC interfaces, with no guarantee for maintaining proper and secure operating conditions. In today's practical tip, we give you a step-by-step explanation of how you can secure your SAP gateways against unauthorized calls.","og_url":"https:\/\/sast-solutions.com\/blog-en\/2018\/05\/28\/how-to-guard-your-sap-gateway-against-unauthorized-calls\/","og_site_name":"SAST BLOG","article_published_time":"2018-05-28T06:00:34+00:00","article_modified_time":"2020-07-24T09:24:14+00:00","og_image":[{"url":"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2018\/05\/shutterstock_291917768_akqw_jpg.jpg","type":"","width":"","height":""}],"author":"securityblog","twitter_card":"summary_large_image","twitter_misc":{"Written by":"securityblog","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/sast-solutions.com\/blog-en\/2018\/05\/28\/how-to-guard-your-sap-gateway-against-unauthorized-calls\/#article","isPartOf":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2018\/05\/28\/how-to-guard-your-sap-gateway-against-unauthorized-calls\/"},"author":{"name":"securityblog","@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/person\/cd70e3749cca136a7e8a37dc1d3cfc26"},"headline":"How to guard your SAP Gateway against unauthorized calls","datePublished":"2018-05-28T06:00:34+00:00","dateModified":"2020-07-24T09:24:14+00:00","mainEntityOfPage":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2018\/05\/28\/how-to-guard-your-sap-gateway-against-unauthorized-calls\/"},"wordCount":1018,"publisher":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#organization"},"image":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2018\/05\/28\/how-to-guard-your-sap-gateway-against-unauthorized-calls\/#primaryimage"},"thumbnailUrl":"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2018\/05\/shutterstock_291917768_akqw_jpg.jpg","keywords":["Cyber Security","RFC Interface","SAP Security"],"articleSection":["SAP Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/sast-solutions.com\/blog-en\/2018\/05\/28\/how-to-guard-your-sap-gateway-against-unauthorized-calls\/","url":"https:\/\/sast-solutions.com\/blog-en\/2018\/05\/28\/how-to-guard-your-sap-gateway-against-unauthorized-calls\/","name":"How to guard your SAP Gateway against unauthorized calls","isPartOf":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2018\/05\/28\/how-to-guard-your-sap-gateway-against-unauthorized-calls\/#primaryimage"},"image":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2018\/05\/28\/how-to-guard-your-sap-gateway-against-unauthorized-calls\/#primaryimage"},"thumbnailUrl":"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2018\/05\/shutterstock_291917768_akqw_jpg.jpg","datePublished":"2018-05-28T06:00:34+00:00","dateModified":"2020-07-24T09:24:14+00:00","breadcrumb":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2018\/05\/28\/how-to-guard-your-sap-gateway-against-unauthorized-calls\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sast-solutions.com\/blog-en\/2018\/05\/28\/how-to-guard-your-sap-gateway-against-unauthorized-calls\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sast-solutions.com\/blog-en\/2018\/05\/28\/how-to-guard-your-sap-gateway-against-unauthorized-calls\/#primaryimage","url":"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2018\/05\/shutterstock_291917768_akqw_jpg.jpg","contentUrl":"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2018\/05\/shutterstock_291917768_akqw_jpg.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/sast-solutions.com\/blog-en\/2018\/05\/28\/how-to-guard-your-sap-gateway-against-unauthorized-calls\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sast-solutions.com\/blog-en\/"},{"@type":"ListItem","position":2,"name":"How to guard your SAP Gateway against unauthorized calls"}]},{"@type":"WebSite","@id":"https:\/\/sast-solutions.com\/blog-en\/#website","url":"https:\/\/sast-solutions.com\/blog-en\/","name":"SAST BLOG","description":"SAP Security &amp; Compliance","publisher":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sast-solutions.com\/blog-en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/sast-solutions.com\/blog-en\/#organization","name":"SAST BLOG","url":"https:\/\/sast-solutions.com\/blog-en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/logo\/image\/","url":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/03\/sast-solutions-logo.png","contentUrl":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/03\/sast-solutions-logo.png","width":358,"height":155,"caption":"SAST BLOG"},"image":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/person\/cd70e3749cca136a7e8a37dc1d3cfc26","name":"securityblog"}]}},"_links":{"self":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts\/522","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/comments?post=522"}],"version-history":[{"count":3,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts\/522\/revisions"}],"predecessor-version":[{"id":1280,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts\/522\/revisions\/1280"}],"wp:attachment":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/media?parent=522"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/categories?post=522"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/tags?post=522"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}