{"id":860,"date":"2019-05-15T15:08:17","date_gmt":"2019-05-15T13:08:17","guid":{"rendered":"https:\/\/sast-blog.akquinet.com\/?p=860"},"modified":"2020-07-24T10:05:52","modified_gmt":"2020-07-24T08:05:52","slug":"sap-netweaver-application-server-encryption-via-tls","status":"publish","type":"post","link":"https:\/\/sast-solutions.com\/blog-en\/2019\/05\/15\/sap-netweaver-application-server-encryption-via-tls\/","title":{"rendered":"SAP Application Server Encryption via TLS"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-861 alignleft\" src=\"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2019\/05\/SAP-Web-Application-Server_SAST-300x180.jpg\" alt=\"SAP NetWeaver Application Server Encryption\" width=\"300\" height=\"180\" srcset=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2019\/05\/SAP-Web-Application-Server_SAST-300x180.jpg 300w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2019\/05\/SAP-Web-Application-Server_SAST-768x461.jpg 768w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2019\/05\/SAP-Web-Application-Server_SAST-1024x614.jpg 1024w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2019\/05\/SAP-Web-Application-Server_SAST.jpg 1280w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>To achieve the most comprehensive protection possible against potential attacks in SAP environments (and deal with those that do occur), encryption mechanisms and up-to-date cryptography libraries are required using TLS.<\/p>\n<p><!--more--><\/p>\n<p>Right now, encryption based on the Transport Layer Security (TLS) protocol \u2013 previously known as Secure Sockets Layer (SSL) \u2013 is typically applied by means of HTTPS. Most webservers support TLS 1.0 and later through numerous encryption methods. Nearly all browsers and servers tend to use TLS based on encryption algorithms (cipher suites) like RSA or AES.<\/p>\n<h2><strong>Optimizing TLS settings for operations and security<\/strong><\/h2>\n<p>Encryption and corresponding control by means of the TLS protocol versions currently available on SAP Application Servers is made possible by the use of cryptography libraries (CommonCryptoLib). In order to support protocol versions and encryption algorithms that are as current as possible, SAP recommends CommonCryptoLib 8.5.2 or later (the latest version is 8.5.22).<\/p>\n<p>The protocol versions that are available at present and supported by common web browsers are TLS 1.1, 1.2, and (since March 2018) 1.3.<\/p>\n<p>The cipher suites can be controlled via the following profile parameters:<\/p>\n<ul>\n<li><strong>ssl\/ciphersuites<\/strong>(default value: HIGH:MEDIUM:+e3DES:!aNULL)<\/li>\n<li><strong>ssl\/client_ciphersuites<\/strong> (default value: HIGH:MEDIUM:+e3DES:!aNULL)<\/li>\n<\/ul>\n<p>To facilitate the best possible interoperability within landscapes that run on SAP while making use of optimal encryption algorithms, SAP recommends setting or adjusting the profile parameters as follows in line with the current standard (TLS 1.2):<\/p>\n<ul>\n<li><strong>SAP Application Server<\/strong>:<br \/>\nssl\/ciphersuites = 135:PFS:HIGH::EC_P256:EC_HIGH<br \/>\nssl\/client_ciphersuites=150:PFS:HIGH::EC_P256:EC_HIGH<\/li>\n<li><strong>SAP Solution Manager (deviates)<\/strong>:<br \/>\nssl\/client_ciphersuites = 918:PFS:HIGH::EC_P256:EC_HIGH<\/li>\n<\/ul>\n<p>The encoding consists of a calculated bit value that can be found in the following overview:<\/p>\n<table>\n<tbody>\n<tr>\n<td><strong>Value<\/strong><\/td>\n<td><strong>Description<\/strong><\/td>\n<\/tr>\n<tr>\n<td>1<\/td>\n<td><strong>&#8220;BC\u201d option<\/strong><br \/>\n(Accepts SSL Version 2.0 CLIENT-HELLO\u00a0\/ SSLv2Hello\u00a0for TLSv1.x-Handshake)<\/td>\n<\/tr>\n<tr>\n<td>2<\/td>\n<td><strong>&#8220;BEST\u201d option<\/strong><br \/>\n(Activates the latest TLS protocol version available, i.e. TLS 1.2 for CCL 8.4.31+)<\/td>\n<\/tr>\n<tr>\n<td>4<\/td>\n<td><strong>&#8220;NO_GAP\u201d option<\/strong><br \/>\n(No gaps between TLS protocol versions; has been forced thus far)<\/td>\n<\/tr>\n<tr>\n<td>16<\/td>\n<td><strong>Allows blind sending of a client certificate<\/strong><br \/>\n(5.5.5pl36+ and all CCL 8.x.x)<\/td>\n<\/tr>\n<tr>\n<td>32<\/td>\n<td><strong>&#8220;Strict protocol version configuration\u201d option<br \/>\n<\/strong>\u2013 does not automatically activate TLS 1.0<br \/>\n(recognized\/supported only by CommonCryptoLib (CCL) 8.4.48 or later)<\/td>\n<\/tr>\n<tr>\n<td>64<\/td>\n<td><strong>SSLv3<\/strong><\/td>\n<\/tr>\n<tr>\n<td>128<\/td>\n<td><strong>TLS 1.0<\/strong><\/td>\n<\/tr>\n<tr>\n<td>256<\/td>\n<td><strong>TLS 1.1<\/strong><br \/>\n(Only with CommonCryptoLib (CCL)\u00a08.4.31 or later)<\/td>\n<\/tr>\n<tr>\n<td>512<\/td>\n<td><strong>TLS 1.2<\/strong><br \/>\n(Only with CommonCryptoLib (CCL)\u00a08.4.31 or later)<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><strong>Example<\/strong>: 135:PFS:HIGH::EC_P256:EC_HIGH<\/p>\n<ul>\n<li>135 = 128 (TLS &gt;= 1.0) + 2 (BEST protocol option) + 1 (SSL 2.0 handshake acceptance + 4 (NO_GAP option)<\/li>\n<li><strong>PFS<\/strong>: Support for <strong>p<\/strong>erfect <strong>f<\/strong>orward <strong>s<\/strong>ecrecy cipher suites<\/li>\n<li><strong>HIGH<\/strong>: Exclusive support for HIGH-class cipher suites (no PFS suites)<\/li>\n<li><strong>EC_HIGH<\/strong>: Use of high-security elliptic curves<\/li>\n<li><strong>EC_P256<\/strong>: Defined elliptic curve<\/li>\n<\/ul>\n<p>The use of these values makes it possible to utilize both TLS 1.2 and TLS 1.0 as a fallback solution in order to minimize problems through interoperability.<\/p>\n<p>SAP expressly recommends <u>not<\/u> deactivating the current TLS 1.0 without taking the additional measures necessary. In this case, all of the SAP software at hand must be updated and analyzed to identify incompatible components (and those that are limited to TLS 1.0) with the help of HTTP logging.<\/p>\n<p>Do you have questions on this topic? Or are you interested in further information about our portfolio? We invite you to explore our <a href=\"https:\/\/www.sast-solutions.de\/index-2.jsp\" target=\"_blank\" rel=\"noopener noreferrer\">SAST SOLUTIONS website<\/a> or contact us directly: <a href=\"mailto:sast@akquinet.de\">sast@akquinet.de<\/a><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-493\" src=\"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2018\/04\/referent_axelgiese_akquinet-e1523976533278-257x300.jpg\" alt=\"Axel Giese (SAST SOLUTIONS)\" width=\"212\" height=\"247\" srcset=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2018\/04\/referent_axelgiese_akquinet-e1523976533278-257x300.jpg 257w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2018\/04\/referent_axelgiese_akquinet-e1523976533278.jpg 736w\" sizes=\"auto, (max-width: 212px) 100vw, 212px\" \/><br \/>\n<strong>Axel Giese (SAP Security Consulting)<br \/>\n<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<h2><strong>This might also be of interest to you<\/strong><\/h2>\n<p><a href=\"https:\/\/sast-blog.akquinet.com\/2018\/04\/23\/audit-or-penetration-testing\/\">Audit or Penetration testing? Find your vulnerabilities before you get hurt!<\/a><\/p>\n<p><a href=\"https:\/\/sast-blog.akquinet.com\/2019\/03\/28\/authorizations-for-batch-processing-in-netweaver-and-s-4hana-environments\/\">Authorizations for batch processing in NetWeaver and S\/4HANA environments<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>To achieve the most comprehensive protection possible against potential attacks in SAP environments (and deal with those that do occur), encryption mechanisms and up-to-date cryptography libraries are required using TLS.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6],"tags":[80,170],"class_list":["post-860","post","type-post","status-publish","format-standard","hentry","category-sap-security","tag-sap-security","tag-security-monitoring"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>SAP Application Server Encryption via TLS<\/title>\n<meta name=\"description\" content=\"The use of Transport Layer Security Protokoll (TLS) encryption mechanisms is necessary for comprehensive protection in SAP environments.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sast-solutions.com\/blog-en\/2019\/05\/15\/sap-netweaver-application-server-encryption-via-tls\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"SAP NetWeaver Application Server Encryption\" \/>\n<meta property=\"og:description\" content=\"The use of Transport Layer Security Protokoll (TLS) encryption mechanisms is necessary for comprehensive protection in SAP environments.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sast-solutions.com\/blog-en\/2019\/05\/15\/sap-netweaver-application-server-encryption-via-tls\/\" \/>\n<meta property=\"og:site_name\" content=\"SAST BLOG\" \/>\n<meta property=\"article:published_time\" content=\"2019-05-15T13:08:17+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-07-24T08:05:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2019\/05\/SAP-Web-Application-Server_SAST.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"768\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"securityblog\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"SAP NetWeaver Application Server Encryption\" \/>\n<meta name=\"twitter:description\" content=\"The use of Transport Layer Security Protokoll (TLS) encryption mechanisms is necessary for comprehensive protection in SAP environments.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2019\/05\/SAP-Web-Application-Server_SAST.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"securityblog\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2019\\\/05\\\/15\\\/sap-netweaver-application-server-encryption-via-tls\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2019\\\/05\\\/15\\\/sap-netweaver-application-server-encryption-via-tls\\\/\"},\"author\":{\"name\":\"securityblog\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/person\\\/cd70e3749cca136a7e8a37dc1d3cfc26\"},\"headline\":\"SAP Application Server Encryption via TLS\",\"datePublished\":\"2019-05-15T13:08:17+00:00\",\"dateModified\":\"2020-07-24T08:05:52+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2019\\\/05\\\/15\\\/sap-netweaver-application-server-encryption-via-tls\\\/\"},\"wordCount\":556,\"publisher\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2019\\\/05\\\/15\\\/sap-netweaver-application-server-encryption-via-tls\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sast-blog.akquinet.com\\\/wp-content\\\/uploads\\\/2019\\\/05\\\/SAP-Web-Application-Server_SAST-300x180.jpg\",\"keywords\":[\"SAP Security\",\"Security Monitoring\"],\"articleSection\":[\"SAP Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2019\\\/05\\\/15\\\/sap-netweaver-application-server-encryption-via-tls\\\/\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2019\\\/05\\\/15\\\/sap-netweaver-application-server-encryption-via-tls\\\/\",\"name\":\"SAP Application Server Encryption via TLS\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2019\\\/05\\\/15\\\/sap-netweaver-application-server-encryption-via-tls\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2019\\\/05\\\/15\\\/sap-netweaver-application-server-encryption-via-tls\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sast-blog.akquinet.com\\\/wp-content\\\/uploads\\\/2019\\\/05\\\/SAP-Web-Application-Server_SAST-300x180.jpg\",\"datePublished\":\"2019-05-15T13:08:17+00:00\",\"dateModified\":\"2020-07-24T08:05:52+00:00\",\"description\":\"The use of Transport Layer Security Protokoll (TLS) encryption mechanisms is necessary for comprehensive protection in SAP environments.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2019\\\/05\\\/15\\\/sap-netweaver-application-server-encryption-via-tls\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2019\\\/05\\\/15\\\/sap-netweaver-application-server-encryption-via-tls\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2019\\\/05\\\/15\\\/sap-netweaver-application-server-encryption-via-tls\\\/#primaryimage\",\"url\":\"https:\\\/\\\/sast-blog.akquinet.com\\\/wp-content\\\/uploads\\\/2019\\\/05\\\/SAP-Web-Application-Server_SAST-300x180.jpg\",\"contentUrl\":\"https:\\\/\\\/sast-blog.akquinet.com\\\/wp-content\\\/uploads\\\/2019\\\/05\\\/SAP-Web-Application-Server_SAST-300x180.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2019\\\/05\\\/15\\\/sap-netweaver-application-server-encryption-via-tls\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"SAP Application Server Encryption via TLS\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#website\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/\",\"name\":\"SAST BLOG\",\"description\":\"SAP Security &amp; Compliance\",\"publisher\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#organization\",\"name\":\"SAST BLOG\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/sast-solutions-logo.png\",\"contentUrl\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/sast-solutions-logo.png\",\"width\":358,\"height\":155,\"caption\":\"SAST BLOG\"},\"image\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/person\\\/cd70e3749cca136a7e8a37dc1d3cfc26\",\"name\":\"securityblog\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"SAP Application Server Encryption via TLS","description":"The use of Transport Layer Security Protokoll (TLS) encryption mechanisms is necessary for comprehensive protection in SAP environments.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sast-solutions.com\/blog-en\/2019\/05\/15\/sap-netweaver-application-server-encryption-via-tls\/","og_locale":"en_US","og_type":"article","og_title":"SAP NetWeaver Application Server Encryption","og_description":"The use of Transport Layer Security Protokoll (TLS) encryption mechanisms is necessary for comprehensive protection in SAP environments.","og_url":"https:\/\/sast-solutions.com\/blog-en\/2019\/05\/15\/sap-netweaver-application-server-encryption-via-tls\/","og_site_name":"SAST BLOG","article_published_time":"2019-05-15T13:08:17+00:00","article_modified_time":"2020-07-24T08:05:52+00:00","og_image":[{"width":1280,"height":768,"url":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2019\/05\/SAP-Web-Application-Server_SAST.jpg","type":"image\/jpeg"}],"author":"securityblog","twitter_card":"summary_large_image","twitter_title":"SAP NetWeaver Application Server Encryption","twitter_description":"The use of Transport Layer Security Protokoll (TLS) encryption mechanisms is necessary for comprehensive protection in SAP environments.","twitter_image":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2019\/05\/SAP-Web-Application-Server_SAST.jpg","twitter_misc":{"Written by":"securityblog","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/sast-solutions.com\/blog-en\/2019\/05\/15\/sap-netweaver-application-server-encryption-via-tls\/#article","isPartOf":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2019\/05\/15\/sap-netweaver-application-server-encryption-via-tls\/"},"author":{"name":"securityblog","@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/person\/cd70e3749cca136a7e8a37dc1d3cfc26"},"headline":"SAP Application Server Encryption via TLS","datePublished":"2019-05-15T13:08:17+00:00","dateModified":"2020-07-24T08:05:52+00:00","mainEntityOfPage":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2019\/05\/15\/sap-netweaver-application-server-encryption-via-tls\/"},"wordCount":556,"publisher":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#organization"},"image":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2019\/05\/15\/sap-netweaver-application-server-encryption-via-tls\/#primaryimage"},"thumbnailUrl":"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2019\/05\/SAP-Web-Application-Server_SAST-300x180.jpg","keywords":["SAP Security","Security Monitoring"],"articleSection":["SAP Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/sast-solutions.com\/blog-en\/2019\/05\/15\/sap-netweaver-application-server-encryption-via-tls\/","url":"https:\/\/sast-solutions.com\/blog-en\/2019\/05\/15\/sap-netweaver-application-server-encryption-via-tls\/","name":"SAP Application Server Encryption via TLS","isPartOf":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2019\/05\/15\/sap-netweaver-application-server-encryption-via-tls\/#primaryimage"},"image":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2019\/05\/15\/sap-netweaver-application-server-encryption-via-tls\/#primaryimage"},"thumbnailUrl":"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2019\/05\/SAP-Web-Application-Server_SAST-300x180.jpg","datePublished":"2019-05-15T13:08:17+00:00","dateModified":"2020-07-24T08:05:52+00:00","description":"The use of Transport Layer Security Protokoll (TLS) encryption mechanisms is necessary for comprehensive protection in SAP environments.","breadcrumb":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2019\/05\/15\/sap-netweaver-application-server-encryption-via-tls\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sast-solutions.com\/blog-en\/2019\/05\/15\/sap-netweaver-application-server-encryption-via-tls\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sast-solutions.com\/blog-en\/2019\/05\/15\/sap-netweaver-application-server-encryption-via-tls\/#primaryimage","url":"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2019\/05\/SAP-Web-Application-Server_SAST-300x180.jpg","contentUrl":"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2019\/05\/SAP-Web-Application-Server_SAST-300x180.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/sast-solutions.com\/blog-en\/2019\/05\/15\/sap-netweaver-application-server-encryption-via-tls\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sast-solutions.com\/blog-en\/"},{"@type":"ListItem","position":2,"name":"SAP Application Server Encryption via TLS"}]},{"@type":"WebSite","@id":"https:\/\/sast-solutions.com\/blog-en\/#website","url":"https:\/\/sast-solutions.com\/blog-en\/","name":"SAST BLOG","description":"SAP Security &amp; Compliance","publisher":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sast-solutions.com\/blog-en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/sast-solutions.com\/blog-en\/#organization","name":"SAST BLOG","url":"https:\/\/sast-solutions.com\/blog-en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/logo\/image\/","url":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/03\/sast-solutions-logo.png","contentUrl":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/03\/sast-solutions-logo.png","width":358,"height":155,"caption":"SAST BLOG"},"image":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/person\/cd70e3749cca136a7e8a37dc1d3cfc26","name":"securityblog"}]}},"_links":{"self":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts\/860","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/comments?post=860"}],"version-history":[{"count":8,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts\/860\/revisions"}],"predecessor-version":[{"id":1324,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts\/860\/revisions\/1324"}],"wp:attachment":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/media?parent=860"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/categories?post=860"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/tags?post=860"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}