Introduction

This guide provides high-level development standards and best practices for SAP Integration Suite modules - SAP Cloud Integration (CI, a.k.a Cloud Platform Integration - SCPI) and API Management (APIM) projects. It is intended for integration developers working on complex integrations between SAP and non-SAP systems. Following these guidelines will ensure consistency, reliability, and maintainability across integration flows. 

The guiding principle for programming standards and guidelines at Syensqo is to use what is generally accepted by the industry as “best-practice”, rather than defining a bespoke set of rules. By adopting this approach, it is more likely that developers engaged by Syensqo are already familiar with the “best-practice” approach and can work effectively in the Syensqo environment immediately.

This document’s purpose is to provide developers with the standards and guidance required to develop in Syensqo’s landscape.

SyWay Program is actively assessing the adoption of the FIGAF Integration Automation Tool to enhance the management of SAP Cloud Integration (CPI) artifacts, including version control, transport automation, regression testing, and change tracking. As a result, certain guidelines and procedures defined in this document—particularly those governing artifact deployment, testing, and transport sequencing—are subject to change pending FIGAF implementation. Future revisions to this standard will incorporate FIGAF-aligned practices where applicable to ensure consistency and automation across environments.


Assumptions

Architectural Principles - SAP Best Practice vs Other Integration Platforms

SAP best practice does not always align with "traditional" API lead approach or other Integration architectural principles following is an account of a differences of note with reference to the current documentation in Syensqo (https://wiki.syensqo.com/display/public/IP/Integration+Design+Process)

Cloud-native (Non-SAP) Integration

In most non‑SAP, cloud‑native integration playbooks, the guiding assumption is that every bounded‑context or microservice owns both its code and its data store. Platforms supply low‑level building blocks—managed API gateways, message queues, event buses, state‑machine orchestrators, and data‑flow services—that architects combine freely to meet performance, latency, or scaling goals. Patterns lean heavily on asynchronous, event‑driven communication so that services can evolve and deploy in isolation. Guardrails for security, compliance, and operations are automated through infrastructure‑as‑code, fine‑grained identity policies, continuous‑delivery pipelines, and federated observability that pushes metrics, logs, and traces into a shared telemetry backbone; cross‑team consistency is achieved more by contract tests and versioned APIs than by an enterprise‑wide canonical model.

Non‑SAP, cloud‑native integration guides normally organise recommendations around three layers:

  1. Integration Domains – e.g., application‑to‑application (A2A) inside a single enterprise, B2B partner connectivity, data & analytics pipelines, and edge/IoT.

  2. Integration Styles – API‑led (request/response), event streaming (publish/subscribe), bulk or batch data movement, and workflow‑based orchestration.

  3. Use‑case PatternsAPI‑managed exposure through a gateway that enforces policies and versioning; event‑driven messaging that lets loosely‑coupled microservices react in real time; and process‑automation workflows or state machines that stitch multiple services into an end‑to‑end business scenario. The guidance encourages each bounded context to own its data, automate guard‑rails through IaC and CI/CD, and rely on contract tests—not a global canonical model—for semantic alignment.

SAP Centric Cloud Integration

SAP Cloud Integration (part of SAP Integration Suite) starts from the opposite pole: the SAP digital core (e.g., S/4HANA, SuccessFactors, Ariba) remains the single source of truth, so integrations revolve around pre‑built, upgrade‑safe artifacts called iFlows, a business‑aware event mesh, and canonical object definitions (One Domain Model). “Microservices” are usually side‑by‑side extensions on SAP BTP or Kubernetes that invoke the core via versioned OData APIs and react to SAP business events without duplicating master data. The Integration Solution Advisory Methodology (ISA‑M), Integration Advisor mappings, and principal‑propagating security guardrails keep interfaces semantically consistent, audit‑ready, and upgrade‑proof. In practice, organisations often pair SAP’s approach—optimised for enterprise‑process integrity—with the cloud‑native model—optimised for high‑velocity, domain‑owned services—bridging the two via generic connectors or event pipes when a use case spans both worlds.

SAP Cloud Integration (part of SAP Integration Suite) applies the same three lenses but prioritises the SAP digital core as the system of record.

Syenqo's IT Integration Team has a detailed Guide and includes an IT Integration Design Framework - see IT Integration Design Framework, extending the capabilities based on the SAPs Integration Solution Advisory Methodology (ISAM).



SAP Cloud Integration

Design Principles and Modularization


RULEAs a Guiding Principle, follow Syensqo's Integration Design Process to identify and use Reference and Use-Case Patterns, with SAP's Integration Solution Advisory Methodology. 


Design integration flows with simplicity, modularity, and maintainability in mind. Key principles include:

By adhering to these design principles, you enhance the scalability and maintainability of integrations. The goal is to build flows that are easy to understand, modify, and extend, following solid software design practices adapted to integration scenarios.


AvoidTimers  - Integration triggering the data flow
AvoidData cache, transient data only can be  subject of  data cache for retry purposes only
AvoidDeveloping overly complex integrations with multiple sub-processes


Mapping and Transformation

Integrations often require transforming data between formats (XML, JSON, CSV, etc.) or structures. Here are best practices for message mappings and transformations:

By following these guidelines, you ensure that data mappings are efficient, transparent, and easy to maintain. The key is to use BTP Integration Suite's rich palette of transformation tools to their strengths and keep custom code to a minimum.


RULEFor Scripting, use Groovy - do not use JavaScript

Error Handling and Retry Mechanisms

Robust error handling is essential in integration scenarios to ensure issues are caught and addressed without data loss. SCPI does not automatically retry or store failed messages, so developers must build error-handling into their iFlows:

In summary, be proactive in error handling: design your iFlows to fail gracefully. A failed message should not disappear silently; it should trigger a controlled sequence that either automatically fixes the issue (retry) or alerts someone to take action. Good error handling and retry logic greatly increase the robustness of your integration landscape.


ALWAYSHandle Errors Gracefully, approach should be driven by NFR's and Interface priority


Security Considerations

Security is paramount in integration development. SCPI interfaces often handle sensitive data and connect to internal and external systems, so developers must build security into every layer of integration design:

By following these security standards, you ensure that integrations do not become the weak link in your enterprise security. In summary: use strong authentication, encrypt data in motion (and at rest if needed), do not expose sensitive info, and code defensively. Always stay updated on SAP’s security advisories for SCPI and apply patches or updates to adapters and libraries promptly. Security should be an integral part of your development process, not an afterthought.


ALWAYSApply the most secure Authorisation mechanisms to all interfaces, never assume another system/user is trustworthy

Web based tools and LLMS

Public web based tools can pose significant security risks, and should not be used for code generation, test data generation, data formatting or testing in general. Any tools should be Syensqo sanctioned applications that are delivered with the application portfolio or trusted software locally installed. 

Any use of LLM based coding agents must be avoided. Syensqo's AI Policy defines guidelines on the use of AI tools and strictly prohibits the use of non-approved AI tools. 


RULEAvoid Web based public tools for code generation, data manipulation and testing

Documentation

Versioning and Documentation Practices

Maintaining clear version history and documentation for your integration flows is crucial for team collaboration and lifecycle management:

By rigorously versioning and documenting, you create a knowledge base that supports long-term maintenance. Junior developers onboarding to the project can refer to previous versions to understand how an iFlow evolved and read the documentation to grasp the design decisions. This reduces dependency on oral knowledge transfer and prevents loss of information when team members roll off.


ALWAYSDocument inline with description labels - do not leave default names
ALWAYSUse Save as Version and add Change Log when releasing a significant change


Logging and Traceability

Implement logging thoughtfully to aid debugging and auditability, without compromising performance or security. Traceability ensures you can follow a message’s path and diagnose issues when they arise:

In essence, log enough information to trace what happened for each message, but not so much that it floods the system or exposes sensitive data. Strive for clear, concise log entries that will make sense to someone troubleshooting the interface later. Good traceability means any message can be followed from start to finish, and issues can be pinpointed quickly.


RULEDO NOT LOG ENTIRE PAYLOADS - unless an external logging tool is in scope
ALWAYSimportant data points use logging functions like messageLog.addCustomHeaderProperty
RULENever Log Sensitive Information in Customer Header Properties


Naming Standards

Consistent naming conventions are critical for clarity and team collaboration. All integration artifacts (such as packages, iFlows, mapping artifacts, etc.) and variables should have meaningful, self-explanatory names. 


RATIONALEA well-defined naming scheme improves readability and acts as built-in documentation, reducing onboarding time and errors. It allows developers to quickly grasp an artifact’s purpose and eases maintenance/troubleshooting.
RULENever use Project Based names and avoid conflicts with SAP standard naming standards


API Management

API Design Principles

Design APIs following RESTful principles for clarity and consistency. Model your API around resources (nouns) rather than actions, and utilize standard HTTP methods (GET, POST, PUT, DELETE) for operations. This approach makes APIs intuitive and easy to use. Resources should be logically modelled (e.g. “customers”, “orders”), with hierarchical nesting only when it reflects real relationships. Always include an API versioning strategy from the start: for example, prefix URLs with a version (e.g. /v1/) so that breaking changes can be introduced in a new version without disrupting existing clients. Ensure that new versions of an API can run in parallel with old versions during transitions, giving consumers time to migrates. Keep APIs stateless – each request should contain all information needed, making the service easier to scale and maintain.

Security Standards

Security is paramount in API development. All APIs should enforce strong authentication and protect sensitive data:

Policy Usage (Traffic & Security Policies)

SAP API Management policies provide powerful ways to control and modify API behavior. Apply policies prudently to enforce standards and protect your services:


Decisions must be made at an individual API level as to appropriate level of security through careful review of requirements, sending system capability and risk profile of the data and integration. This list is meant as a guide of possible security components that may be leveraged.

Naming Conventions

Adopt consistent naming conventions for all API Management entities to make them immediately understandable:

Organisational Components 

LevelPurpose in the life‑cycleTypical artefacts shown to the developer
API Proxy (often shortened to “API”)A façade in front of a back‑end service. Holds policies, base path and versioning.Paths such as /v1/customers, policy bundles, revision history.
ProductCommercial / logical bundle of one or more API proxies that will be published to the catalogue. It is the subscription unit.Product tile in Developer Hub, monetisation rate‑plan, default quota.
ApplicationRegistration made by an external (or internal) developer to consume Products. Generates App Key and Secret, collects analytics and is the traffic‑throttling unit.App credentials, list of subscribed products, call statistics.