You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 38 Next »

Status

  Approved

Owner
Stakeholders


Introduction

Purpose

The purpose of the document is to outline the application architecture of S/4HANA instance deployed in Europe region. 

Scope & Objectives

This document describes the high-level architecture design for S/4HANA and the supporting systems that are deployed together in the RISE environment. It will cover the following topics:

  • Landscape overview
  • Application and components
  • Application security and access
  • Operational architecture

Out of scope:

  • Detailed architecture designs that are managed by SAP RISE.
  • RISE operating model.
  • Information related to product documentation and can be found online will not be documented here. 

Key Decisions and Requirement

DescriptionRationale
SAP Private Cloud deployment model was selected for S/4HANA deploymentPlease refer to KDD026 - SAP S/4HANA Deployment Model.
SAP GTS will be co-deployed with S/4HANA as a separate client.Please refer to KDD074 - Architecture of SAP GTS
Embedded Fiori deployment model - SAP Fiori front-end server is deployed on S/4HANA

S/4HANA will be the only backend system for Fiori and there is a strict dependency between Fiori and S/4HANA version. Hence an embedded deployment will be preferred and it also optimizes hosting and maintenance costs.

Embedded deployment option is also recommended for S/4HANA by SAP

SSL and SNC will be configured for S/4HANA to encrypt web and RFC traffic

Synesqo cybersecurity requires all data in transit to be encrypted.

Configure SSO for S/4HANA

As part of SyWay project, a common authentication mechanism (e.g., SAML) will be adopted for ease of access and unified user experience.

99.9% SLA and SAP RISE short distance disaster recovery for production systems. 

Based on Syensqo existing non-functional requirements.

Setup Best Practices client using alternative 1 method: Best Practices client.

As discussed in KDD071 - Development System Approach, alternative 1 is selected and client 050 will be created and configured as Best Practice client. 

Enhanced Operations Service add-on services is included in SAP RISE for Syensqo. 

Enhanced Operations Service was purchased for the following reasons:

  • Customer Delivery Manager (CDM) and Technical Service Manager (TSM) who are dedicated to Syensqo account. 
  • Named engineers and architecture who support Syensqo account.
  • Higher non-PRD SLA of 98%.
  • 24x7 Non-PRD service request scheduling & execution.
EU Access services is included in SAP RISE for Syensqo. 

To ensure only SAP RISE support team located in Europe has accesses and maintains Syensqo SAP RISE systems.

Common Development Landscape 

A common development landscape used to ensure process harmonization across the systems deployed in 3 regions. 

Terminology

draw.io

Source page access restriction: Click the link below to check if the page is accessible.
/pages/viewpage.action?pageId=931691961

  • Client: A self-contained unit in an SAP system (technical instance based on ABAP Application Server) with separate master data, transactional data and configurations that are client specific. E.g., Client 100.
  • Component: Software modules or add-on that are installed in the instance and enables a specific function. E.g., Fiori, GTS.
  • Instance: An entity refers to the entire system including the software and all technical components (DB, application server etc.). E.g., S/4HANA Production.
  • SID: Unique identifier for an SAP instance that consists of three characters.
  • Environment/Tier: Refers to systems that are used for the different stages of the project lifecycle. Each environment serves a distinct purpose and has a dedicated instance to ensure stability and integrity. E.g., Development, QAS. 
  • Landscape: Refers to all the environment for an application or entire project. E.g., S/4HANA landscape, SyWay landscape.

Application Architecture

Overview

SAP RISE application architecture is represented in the diagram below. It will be hosted in Azure and the cloud infrastructure will be managed by SAP.

SAP RISE Details

The table below summaries SAP RISE details. 

Customer ID

YSQ

Customer Number

3008440

Installation Number

21360356

S-User for PCE

S0026961840

Cloud Provider

Azure

Cloud Region

North Europe (Ireland - Dublin)

RISE Add-on 

  • RISE with SAP, private edition (99.9% SLA)
  • SAP S/4HANA Cloud, disaster recovery, private edition
  • SAP S/4HANA Cloud, EU access, priv.ed.
  • Enhanced operations service for large enterprises for RISE with SAP S/4HANA Cloud Private Edition

Application Components

S/4HANA

S/4HANA is an Enterprise resource planning solution based on SAP HANA database and SAP ABAP platform. It is a core component in SyWay landscape. SAP Fiori and GTS components will be co-deployed with S/4HANA. A two tier deployment approach will be adopted for S/4HANA systems: Application and DB. 

  • For Sandbox, Development, Integration testing and Training S/4HANA systems, 1 application and 1 DB server will be deployed.

  • For QAS and Parallel Testing S/4HANA systems, multiple application servers will be deployed with 1 DB server.

  • For Production, high availability is in scope and S/4HANA components (like message server, app and DB) are deployed across 2 availability zones with pacemaker clusters to ensure no single point of failure. 

CI - Central Instance, SCS - SAP Central Services, PAS - Primary Application Server, AAS - Additional Application Server

Add-ons

The following SAP add-ons are installed in S/4HANA.

Add-OnPurpose
SUCCESSFACTORS_HCM_INTEGRIntegration with SuccessFactors
ARIBA CLOUD INT S/4 HANAIntegration with Ariba

SAP GTS ED FOR SAP HANA

Co-Deploy GTS with S/4HANA

SAP FIORI FOR SAP GTS

Fiori Apps for GTS

S/4HANA ADA BY OT

OpenText integration for Archiving and Document Access

SAP MRS FOR S4HANA

SAP Multiresource Scheduling

SAP Web Dispatcher

SAP Web dispatcher acts as a web proxy for S/4HANA systems. It facilitates and load balances incoming HTTP traffic. 

  • For all non-PRD environment, one web dispatcher for each tier will be deployed 
  • For PRD, two web dispatchers will be deployed for HA purposes and Azure load balancer will used to load balance HTTP traffic to the 2 PRD web dispatchers.

SAP Cloud Connector

The SAP Cloud connector acts as a reverse invocation proxy to establish network connection between SAP RISE systems and SAP BTP services (Integration suite, API management, SAP Analytics Cloud etc.) and Ariba Cloud Integration Gateway (CIG). Due to its reverse invoke capabilities, the network traffic originates from SAP Cloud connector to SAP BTP and once the link as been established, data can be exchanged between SAP RISE systems and BTP. HTTPS or RFC protocols are used between SAP Cloud Connector and S/4HANA, and HTTPS protocol is used between Cloud Connector and SAP BTP.

To enable outbound internet traffic from SAP RISE, SAP has provisioned a customer gateway server (CGS) with a forward internet proxy installed on it.

A 2 tier landscape will be adopted for SAP cloud connector: non-PRD and PRD. The non-PRD cloud connector will be shared across all non-PRD landscape. 

 

Data Provisioning Agent

Data Provisioning Agent (DPA) is used for real-time and  batch data replication from S/4HANA to SAP Datasphere. The network connection to SAP Datasphere is initiated by DPA and CGS is used to facilitate the internet connection to SAP Datasphere. 

DPA uses the HTTPS or RFC protocols to communicate with S/4HANA and uses the HTTPS protocol to communicate with SAP Datasphere.   

A 2 tier landscape will be adopted for DPA: non-PRD and PRD. The non-PRD instance will be shared across all non-PRD landscape. 

SAP Analytic Cloud (SAC) Agent

SAC Agent facilitates secure data connectivity and data transfer from S/4HANA to the SAP Analytics Cloud. It leverages SAP Cloud connector connection to BTP to transmit data from S/4HANA to SAC. The HTTPS protocol is used for communication S/4HANA, SAC agent and SAC. 

A 2 tier landscape will be adopted for SAC agent: non-PRD and PRD. The non-PRD SAC agent will be shared across all non-PRD landscape. 

OpenText Connector

OpenText connector facilitates the connection between S/4HANA and the OpenText cloud. The connection is initiated from S/4HANA to the OpenText connector and to OpenText cloud via CGS. The HTTPS protocol is used for communication between all components. 

A 2 tier landscape will be adopted for OpenText Connector: non-PRD and PRD. The non-PRD instance will be shared across all non-PRD landscape. 

Supporting Components (SAP Router and DNS)

These are components deployed to SAP RISE landscape and are managed by SAP. Syensqo users will not have access to these applications and can raise requests to SAP to manage any changes. 

  • SAP Router: Single instance deployed in SAP RISE to manage SAP support's connection to Syensqo RISE systems.
  • DNS: Three instances deployed in SAP RISE to manage SAP RISE domain and will be integrated with Syensqo DNS using Conditional DNS Forwarding.

System Landscape

The table below describes the environment and the corresponding application & SID deployed. 

Region

Envrionment

Systems

S/4HANA (HANA DB)

Web Dispatcher

SAP Cloud connector

SAP Data Provisioning Agent

SAC Agent

OpenText Connector

Europe

Sandbox

ERS (HRS)

WRS

N/A

N/A

N/A

N/A

Development

ERD (HRD)

WRD

CRD

DRD

SRD

ORD

Integration Testing

ERT (HRT)

WRT

N/A

N/A

N/A

N/A

Training

ER2 (HR2)

WR2

N/A

N/A

N/A

N/A

QAS

ERQ (HRQ)

WRQ

N/A

N/A

N/A

N/A

Parallel Testing

ER1 (HR1)

WR1

N/A

N/A

N/A

N/A

Production

ERP (HRP)

WRP & WRH

CRP

DRP

SRP

ORP

The following sections describes the system details for each tier. Please note the following:

  • Each VM as a physical hostname (starting with hec*) and 1 or more virtual hostname (starting with vhysq*). 
  • The main hostname should be used to connect to the respective systems. 

Sandbox

ApplicationPrimary RoleSIDInstanceHostnamePorts
S/4HANACentral InstanceERS

ASCS01

D00



HANA DBHRS

ERS (tenant DB)

HRS (system DB)



Web DispatcherWeb DispatcherWRS00

Development 

ApplicationPrimary RoleSIDInstanceHostnamePorts
S/4HANACentral InstanceERD

ASCS01

D00


vhysqerdci.sap.eu.cloud.syensqo.com (172.16.33.49)

hec42v303048.irl.sap.eu.cloud.syensqo.com (172.16.33.48)

vhysqerdcs.sap.eu.cloud.syensqo.com (172.16.33.50)

HTTP - 80

HTTPS - 443

RFC - 3300

RFC (SNC) - 4800

Dispatcher - 3200

Message server - 3601

HANA DB

HRD (system DB)

ERD (tenant DB)

06

 vhysqerddb.sap.eu.cloud.syensqo.com (172.16.33.51)

hec42v302672.irl.sap.eu.cloud.syensqo.com (172.16.33.37)

vhysqhrddb01.sap.eu.cloud.syensqo.com (172.16.33.42)

vhysqhrddb.sap.eu.cloud.syensqo.com (172.16.33.43)

System DB - 30615

Tenant DB- 30641

Web DispatcherWeb DispatcherWRDW80

vhysqwrdwd01.sap.eu.cloud.syensqo.com (172.16.33.44)

hec42v302675.irl.sap.eu.cloud.syensqo.com (172.16.33.40)

HTTP - 80

HTTPS - 443

SAP Cloud connectorSAP Cloud connectorCRDN/A

vhysqcrdcc01.sap.eu.cloud.syensqo.com (172.16.33.46)

hec42v302678.irl.sap.eu.cloud.syensqo.com (172.16.33.45)

HTTPS - 8443

Data Provisioning AgentData Provisioning AgentDRDN/A

vhysqdrddpa01.irl.sap.eu.cloud.syensqo.com (172.16.33.47)

hec42v302676.irl.sap.eu.cloud.syensqo.com (172.16.33.41)


SAC AgentSAC AgentSRDN/A

vhysqsrdweb01.irl.sap.eu.cloud.syensqo.com (172.16.33.38)

hec42v302674.irl.sap.eu.cloud.syensqo.com (172.16.33.39)


OpenText ConnectorOpenText ConnectorORDN/A

Integration Testing

<Place holder>

QAS

<Place holder>

Training

<Place holder>

Parallel Run

<Place holder>

Production

<Place holder>

S/4HANA Client and Transport Strategy

Please see S/4HANA Client and Transport Strategy for client details in S/4HANA.

SAP Best Practices

As discussed in KDD071 - Development System Approach, Best Practices client will be setup using alternative 1 method.

Below are the high level steps on how to setup client 050 and 100 in Sandbox and Development S/4HANA.

  1. Configure /FTI/T_NOCLN000 with client 050.
  2. Copy client 000 to 050 using copy profile SAP_U000. 
  3. Copy client 050 to 100 using copy profile SAP_ALL.

For more details, please refer to SAP help documentation and BP Activation Questionnaire for the list of business function and BP objects that will be activated. 

Application Security

User Access

System

Users

Access Method

S/4HANA

Business users

Web

Support users

Web and SAPGUI

HANA DB

N/A

Can be requested from SAP if required.

Web dispatcher

Admin

Web

SAP Cloud connector

Admin

Web

Data Provisioning Agent

Admin

Web

SAC Agent

Admin

Web

OpenText Connector

Admin

Web

Default SAP roles will be used for Web dispatcher and connectors. 

Authentication

Single Sign-on (SSO) will be enabled for S/4HANA system. Since other systems in SAP RISE landscape are supporting systems that will not be accessed directly by business users, authentication will be based on user ID and Password. 

SAML SSO - Fiori 

Identity Authentication Services (IAS) within SAP Cloud Identity Services will be configured to act as a Identity provider proxy as shown below.

Following describes the authentication flow.

  1. When users access Fiori launchpad, they are redirected to the Entra ID which has been configured as the identity provider in IAS.
  2. IAS delegates the authentication to Entra ID.
  3. Users will need to sign in to Entra ID using their windows credentials and following the Entra ID authentication process.
  4. Using the SAML assertion issued from Entra ID, the user is propagated to IAS.
  5. IAS validates the SAML assertions and modifies assertion attributes (if required) before issuing the final SAML assertion.
  6. Users are redirected to S/4HANA and will sign in using the issued SAML assertion.

SAPGUI SSO

Single sign-on based on Kerberos

Following describes the authentication flow.

  1. User authenticates to Windows domain
  2. Entra ID provides Kerberos security token to user
  3. User opens a system connection using an SAP GUI desktop client
  4. Kerberos token is forwarded to ABAP system using SNC. The Kerberos token is validated offline on the server, no connection to Entra ID required.

OR

Single sign-on based on X.509 certificates

 

Following describes the authentication flow.

  1. User opens an SAP GUI connection.
  2. Secure Login Client (SLC) redirects user to the identity provider logon page.
  3. Identity Authentication Service delegates authentication to Microsoft Entra ID.
  4. Users authenticates to Microsoft Entra ID.
  5. After successful authentication, Cloud CA issues an X.509 certificate
  6. SAP Secure Login Service returns the X.509 certificate, valid for one day, to SLC
  7. X.509 certificate token is used for authenticating the SAP GUI user to the ABAP system

Communication Security

All data in transit will be encrypted.

  • SSL is used for all web traffic (Systems are configured to reject HTTP access or redirect to HTTPS). 
  • SNC is used for all RFC and SAPGUI communications. 

See DD-TEC-070 Network and Infrastructure Architecture for details on network security and internet connectivity.

Data Security

Data encryption is enable for SAP HANA DB as part of the system provisioning.

NextLabs Data Access Enforcer (DAE) is used to enable field level encryption in S/4HANA. This will encrypt export control relevant data elements and the encrypted values will be stored in HANA DB. Data will be unencrypted on the fly when it is access by an authorized user. For more details please refer to DD-SOL-090 Application Architecture NextLabs.

Other Controls

<Place holder for SEIM integration>

Operation Architecture

Under the shared responsibility model, SAP is responsible for the infrastructure layer to the technical basis layer as shown below. The following section will cover the operational architecture that falls under customer's responsibility.

For the breakdown of detailed tasks and the respective roles and responsibilities, see SAP S/4HANA Cloud, extended edition Roles and Responsibilities for Production.

Change and Configuration Management

Change and configuration management in S/4HANA will be managed through SAP transports. See the following to documents.

For non-S/4HANA systems, there will be no transport mechanism and changes will be managed manually.

Monitoring

The following can be obtained from SAP for me portal.

SAP will be monitoring from the infrastructure layer to the technical basis layer. In the event of an issue, users under Private Cloud Contacts will be notified. 

Sizing

S/4HANA sizing is based on FUE licenses as shown below. For more details, please refer to RISE with SAP S/4HANA Cloud, private edition Service Description Guide in SAP Agreements.

During the course of SyWay project, FUE license will be ramped up from 60 to 1,001 and 4,001 when the project goes lives. Additional infrastructure upgrades are provisioned in the BOM to ensure the following sizing and landscape is maintained at Go-Live.

S/4HANA EnvironmentDB ServerApp Server
Sandbox256GB1 x 32GB
Development512GB2 x 64GB
QAS3,892GB4 x 128GB
Training 512GB1 x 64GB
PRD3,892GB4 x 128GB

 All other systems will be provisioned with 8GB VMs.

High Availability & Disaster Recovery

See DD-TEC-140 HA/DR Architecture Design for more details.

Backup/Restore

See DD-TEC-160 Back up and Restore Design for more details. 

Maintenance Plan

The following downtime window is planned for SAP to perform maintenance work that require system downtime. 

Environment Planned Downtime Window
Sandbox, Development, Integration TestFirst Tuesday each month, 15:00 - 19:00 UTC
QAS, Training, Parallel RunSecond Thursday each month, 15:00 - 19:00 UTC
ProductionThird Sunday each month, 03:00 - 07:00 UTC

Exceptions


Change log

Version Published Changed By Comment
CURRENT (v. 38) Mar 10, 2026 08:28 MUTHUSAMY-ext, Kunalan
v. 71 Feb 04, 2026 07:54 MUTHUSAMY-ext, Kunalan
v. 70 Feb 04, 2026 07:53 MUTHUSAMY-ext, Kunalan
v. 69 Jan 15, 2026 14:15 MUTHUSAMY-ext, Kunalan
v. 68 Jan 14, 2026 03:41 MUTHUSAMY-ext, Kunalan
v. 67 Dec 03, 2025 10:46 MUTHUSAMY-ext, Kunalan
v. 66 Dec 03, 2025 10:45 MUTHUSAMY-ext, Kunalan
v. 65 Nov 06, 2025 08:31 MUTHUSAMY-ext, Kunalan
v. 64 Nov 05, 2025 15:59 MUTHUSAMY-ext, Kunalan
v. 63 Nov 05, 2025 12:31 MUTHUSAMY-ext, Kunalan

Go to Page History

Workflow history

Title Last Updated By Updated Status  
There are no pages at the moment.

  • No labels