8 Sep

authentication

Authentication in SAP Business One is the process of uniquely verifying a user's identity before they are granted access to system functions, documents or confidential data.

Authentication forms the mandatory foundation of secure user and rights management in SAP Business One, as it requires a prior identity check before any access. The superuser controls the authentication guidelines centrally via password management (Administration > Definition > General > Security) and defines which password criteria a user password must fulfil. They can also specify minimum numbers of digits, lower-case letters and non-alphanumeric characters and allow passwords of up to 128 characters. In addition, a password history ensures that new Passwords must not match recently used passwords, which further increases data security. Furthermore, the security level settings define how many failed login attempts are permitted before a user account is automatically blocked; only a superuser may unblock such an account. After successful authentication, the authorisations assigned determine the specific scope of user tasks, i.e. whether a user is allowed to display, create or update documents or master data. A new user therefore starts without authorisations until these are explicitly assigned. In addition, the superuser can configure the web client to start read-only, which allows access to detailed and list views, but prevents data from being created or changed. For integration scenarios and mobile solutions, the system uses the special B1i user for the authentication check; the Integration Framework, whether the user name, password, mobile phone number, device ID and licence situation match. Finally, the authentication service in the System Landscape Directory (SLD) has been specifically hardened and the configuration of Single Sign-On (SSO) has been improved to support both security and simplified access to the system.


Authentication only checks the identity of the user, whereas the authorisations subsequently determine which actions the user is actually permitted to perform in the system (e.g. displaying, creating or updating documents and base data). Password management and security level settings, on the other hand, define the rules and limits under which authentication may take place, such as password complexity, password history and permitted failed attempts, but are not themselves the act of authentication. Single sign-on (SSO) and the hardened authentication service in the SLD again serve the technical implementation and simplification of access, but are functionally based on the basic principle of authentication as an identity check.


SAP Business One Access Rights Administration

Security alarm for ERP systems

The Log4Shell crisis has raised awareness: Companies need to pay more and increased attention to ERP security. ERP software ...
SAP Business One Access Rights Administration

Log4Shell (Log4j gap) & SAP Business One

A security vulnerability "Log4Shell" (CVE-2021-44228) was categorised as extremely critical by the German Federal Office for Security (BSI) on 10.12.02021 with the level red ...
Two-factor authentication for MariProject

Two-factor authentication for MariProject

An access point with strong security is not only useful for online banking. Applications that allow access to ...
ERP_Cloud_Legal_Protection

Data secure in the cloud

In-house means more security. This is the misconception that many companies fall prey to. What is overlooked is that this money-saving mentality for software ...
Test SAP Business One Cloud

Test the SAP Business One Cloud now

With our partner Cloudiax we invite you to test the SAP Business One Cloud. Register today and...