| Status | |
| Owner | |
| Stakeholders |
The purpose of the document is to outline the application architecture of SAP RISE in Europe region.
This document describes the high-level architecture design for the systems deployed in SAP RISE (Rest of the World). It will cover the following topics:
Out of scope:
| Description | Rationale |
|---|---|
| SAP Private Cloud deployment model was selected for S/4HANA deployment | Please refer to KDD026 - SAP S/4HANA Deployment Model. |
| SAP GTS will be co-deployed with S/4HANA as a separate client. | Please refer to KDD074 - Architecture of SAP GTS |
| Embedded Fiori deployment model - SAP Fiori front-end server is deployed on S/4HANA | S/4HANA will be the only backend system for Fiori and there is a strict dependency between Fiori and S/4HANA version. Hence an embedded deployment will be preferred and it also optimizes hosting and maintenance costs. Embedded deployment option is also recommended for S/4HANA by SAP. |
| SSL and SNC will be configured for S/4HANA to encrypt web and RFC traffic | Based on SyWay implementation approach, all data in transit must be encrypted. |
| Configure SSO for S/4HANA | As part of SyWay project, a common authentication mechanism (e.g., SAML) will be adopted for ease of access and unified user experience. |
| 99.9% SLA and SAP RISE short distance disaster recovery for production systems. | Based on Syensqo existing non-functional requirements. |
| Setup Best Practices client using alternative 1 method: Best Practices client. | As discussed in KDD071 - Development System Approach, alternative 1 is selected and client 050 will be created and configured as Best Practice client. |
| Enhanced Operations Service add-on services is included in SAP RISE for Syensqo. | Enhanced Operations Service was purchased for the following reasons:
|
| EU Access services is included in SAP RISE for Syensqo. | To ensure only SAP RISE support team located in Europe has accesses and maintains Syensqo SAP RISE systems. |
| Common Development Landscape | A common development landscape used to ensure process harmonization across the systems deployed in 3 regions. |

SAP RISE application architecture is represented in the diagram below. It will be hosted in Azure and the cloud infrastructure will be managed by SAP.

SAP RISE Details
The table below summaries SAP RISE details.
Customer ID | YSQ |
|---|---|
Customer Number | 3008440 |
Installation Number | 21360356 |
S-User for PCE | S0026961840 |
Cloud Provider | Azure |
Cloud Region | North Europe (Ireland - Dublin) |
RISE Add-on |
|
S/4HANA is an Enterprise resource planning solution based on SAP HANA database and SAP ABAP platform. It is a core component in SyWay landscape. SAP Fiori and GTS components will be co-deployed with S/4HANA. A two tier deployment approach will be adopted for S/4HANA systems: Application and DB.
For Sandbox, Development, Integration testing and Training S/4HANA systems, 1 application and 1 DB server will be deployed.
For QAS and Parallel Testing S/4HANA systems, multiple application servers will be deployed with 1 DB server.
For Production, high availability is in scope and S/4HANA components (like message server, app and DB) are deployed across 2 availability zones with pacemaker clusters to ensure no single point of failure.

CI - Central Instance, SCS - SAP Central Services, PAS - Primary Application Server, AAS - Additional Application Server
The following SAP add-ons are installed in S/4HANA.
| Add-On | Purpose |
|---|---|
| SUCCESSFACTORS_HCM_INTEGR | Integration with SuccessFactors |
| ARIBA CLOUD INT S/4 HANA | Integration with Ariba |
SAP GTS ED FOR SAP HANA | Co-Deploy GTS with S/4HANA |
SAP FIORI FOR SAP GTS | Fiori Apps for GTS |
S/4HANA ADA BY OT | OpenText integration for Archiving and Document Access |
SAP MRS FOR S4HANA | SAP Multiresource Scheduling |
SAP Web dispatcher acts as a web proxy for S/4HANA systems. It facilitates and load balances incoming HTTP traffic.

The SAP Cloud connector acts as a reverse invocation proxy to establish network connection between SAP RISE systems and SAP BTP services (Integration suite, API management, SAP Analytics Cloud etc.) and Ariba Cloud Integration Gateway (CIG). Due to its reverse invoke capabilities, the network traffic originates from SAP Cloud connector to SAP BTP and once the link as been established, data can be exchanged between SAP RISE systems and BTP. HTTPS or RFC protocols are used between SAP Cloud Connector and S/4HANA, and HTTPS protocol is used between Cloud Connector and SAP BTP.
To enable outbound internet traffic from SAP RISE, SAP has provisioned a customer gateway server (CGS) with a forward internet proxy installed on it. CGS will be configured with a public IP which will be used for SAP Cloud Connector connection to SAP BTP and this public IP will be whitelisted in SAP BTP.
A 2 tier landscape will be adopted for SAP cloud connector: non-PRD and PRD. The non-PRD cloud connector will be shared across all non-PRD landscape.
![]()
Data Provisioning Agent (DPA) is used for real-time and batch data replication from S/4HANA to SAP Datasphere. The network connection to SAP Datasphere is initiated by DPA and CGS is used to facilitate the internet connection to SAP Datasphere.
DPA uses the HTTPS or RFC protocols to communicate with S/4HANA and uses the HTTPS protocol to communicate with SAP Datasphere.
A 2 tier landscape will be adopted for DPA: non-PRD and PRD. The non-PRD instance will be shared across all non-PRD landscape.
![]()
SAC Agent facilitates secure data connectivity and data transfer from S/4HANA to the SAP Analytics Cloud. It leverages SAP Cloud connector connection to BTP to transmit data from S/4HANA to SAC. The HTTPS protocol is used for communication S/4HANA, SAC agent and SAC.
A 2 tier landscape will be adopted for SAC agent: non-PRD and PRD. The non-PRD SAC agent will be shared across all non-PRD landscape.

OpenText connector facilitates the connection between S/4HANA and the OpenText cloud. The connection is initiated from S/4HANA to the OpenText connector and to OpenText cloud via CGS. The HTTPS protocol is used for communication between all components.
A 2 tier landscape will be adopted for OpenText Connector: non-PRD and PRD. The non-PRD instance will be shared across all non-PRD landscape.
![]()
These are components deployed to SAP RISE landscape and are managed by SAP. Syensqo users will not have access to these applications and can raise requests to SAP to manage any changes.
DNS –CSN-A-HA IP - 172.16.32.14 (vhysqirlcsna-ha.irl.sap.eu.cloud.syensqo.com)
DNS –CSN-B-HA IP - 172.16.32.30 (vhysqirlcsnb-ha.irl.sap.eu.cloud.syensqo.com)
DNS –CSN-C-HA IP - 172.16.32.46 (vhysqirlcsnc-ha.irl.sap.eu.cloud.syensqo.com)
SAP RISE will be connected to Syensqo network via Azure ExpressRoute and DNS Delegation will be configured between Syensqo and SAP RISE DNS.
For more details on the network architecture and the following items, please refer to DD-TEC-070 Network and Infrastructure Architecture.
The table below describes the environment and the corresponding application & SID deployed.
Region | Envrionment | Systems | |||||
S/4HANA (HANA DB) | Web Dispatcher | SAP Cloud connector | SAP Data Provisioning Agent | SAC Agent | OpenText Connector | ||
Europe | Sandbox | ERS (HRS) | WRS | N/A | N/A | N/A | N/A |
Development | ERD (HRD) | WRD | CRD | DRD | SRD | ORD | |
Integration Testing | ERT (HRT) | WRT | N/A | N/A | N/A | N/A | |
Training | ER2 (HR2) | WR2 | N/A | N/A | N/A | N/A | |
QAS | ERQ (HRQ) | WRQ | N/A | N/A | N/A | N/A | |
Parallel Testing | ER1 (HR1) | WR1 | N/A | N/A | N/A | N/A | |
Production | ERP (HRP) | WRP & WRH | CRP | DRP | SRP | ORP | |
The following sections describes the system details for each tier. Please note the following:
| Application | Primary Role | SID | Instance | Hostname | Ports |
|---|---|---|---|---|---|
| S/4HANA | Central Instance | ERS | ASCS01 D00 | ||
| HANA DB | HRS | ERS (tenant DB) HRS (system DB) | |||
| Web Dispatcher | Web Dispatcher | WRS | 00 |
| Application | Primary Role | SID | Instance | Hostname | Ports | |
|---|---|---|---|---|---|---|
| S/4HANA | Central Instance | ERD | ASCS01 D00 | vhysqerdci.sap.eu.cloud.syensqo.com (172.16.33.49)
| HTTP - 80 HTTPS - 443 RFC - 3300 RFC (SNC) - 4800 Dispatcher - 3200 Message server - 3601 | |
| HANA DB | HRD (system DB) ERD (tenant DB) | 06 | vhysqerddb.sap.eu.cloud.syensqo.com (172.16.33.51)
| System DB - 30615 Tenant DB- 30641 | ||
| Web Dispatcher | Web Dispatcher | WRD | W80 | vhysqwrdwd01.sap.eu.cloud.syensqo.com (172.16.33.44)
| HTTP - 80 HTTPS - 443 | |
| SAP Cloud connector | SAP Cloud connector | CRD | N/A | vhysqcrdcc01.sap.eu.cloud.syensqo.com (172.16.33.46)
| HTTPS - 8443 | |
| Data Provisioning Agent | Data Provisioning Agent | DRD | N/A | vhysqdrddpa01.irl.sap.eu.cloud.syensqo.com (172.16.33.47)
| Agent listener port - TBC Agent admin port - TBC | |
| SAC Agent | SAC Agent | SRD | N/A | vhysqsrdweb01.irl.sap.eu.cloud.syensqo.com (172.16.33.38)
| HTTP - 8080 HTTPS - TBC | |
| OpenText Connector | OpenText Connector | ORD | N/A | <Place holder> | <Place holder> |
<Place holder>
<Place holder>
<Place holder>
<Place holder>
<Place holder>
Please see S/4HANA Client and Transport Strategy for client details in S/4HANA.
As discussed in KDD071 - Development System Approach, Best Practices client will be setup using alternative 1 method.
Below are the high level steps on how to setup client 050 and 100 in Sandbox and Development S/4HANA.
For more details, please refer to SAP help documentation and BP Activation Questionnaire for the list of business function and BP objects that will be activated.
System | Users | Access Method |
|---|---|---|
S/4HANA | Business users | Web |
Support users | Web and SAPGUI | |
HANA DB | N/A | Can be requested from SAP if required. |
Web dispatcher | Admin | Web |
SAP Cloud connector | Admin | Web |
Data Provisioning Agent | N/A | Raise request to SAP to perform changes as access is via OS command line |
SAC Agent | Admin | Web |
OpenText Connector | Admin | Web |
Default SAP roles will be used for Web dispatcher and connectors.
Single Sign-on (SSO) will be enabled for S/4HANA system. Since other systems in SAP RISE landscape are supporting systems that will not be accessed directly by business users, authentication will be based on user ID and password.
SAML SSO will be configured between Entra ID and S/4HANA.

Single sign-on based on X.509 certificates SSO method will be leveraged for SAPGUI SSO.
Following describes the authentication flow.
All data in transit will be encrypted.
See DD-TEC-070 Network and Infrastructure Architecture for details on network security and internet connectivity.
Data encryption is enable for SAP HANA DB as part of the system provisioning.
NextLabs Data Access Enforcer (DAE) is used to enable field level encryption in S/4HANA. This will encrypt export control relevant data elements and the encrypted values will be stored in HANA DB. Data will be unencrypted on the fly when it is access by an authorized user. For more details please refer to DD-SOL-090 Application Architecture NextLabs.
<Place holder for SEIM integration>
Under the shared responsibility model, SAP is responsible for the infrastructure layer to the technical basis layer as shown below. The following section will cover the operational architecture that falls under customer's responsibility.

For the breakdown of detailed tasks and the respective roles and responsibilities, see SAP S/4HANA Cloud, extended edition Roles and Responsibilities for Production.
Change and configuration management in S/4HANA will be managed through SAP transports. See the following to documents.
For non-S/4HANA systems, there will be no transport mechanism and changes will be managed manually.
The following can be obtained from SAP for me portal.
SAP will be monitoring from the infrastructure layer to the technical basis layer. In the event of an issue, users under Private Cloud Contacts will be notified.
S/4HANA sizing is based on FUE licenses as shown below. For more details, please refer to RISE with SAP S/4HANA Cloud, private edition Service Description Guide in SAP Agreements.

During the course of SyWay project, FUE license will be ramped up from 60 to 1,001 and 4,001 when the project goes lives. Additional infrastructure upgrades are provisioned in the BOM to ensure the following sizing and landscape is maintained at Go-Live.
For more details on infrastructure, please refer to DD-TEC-070 Network and Infrastructure Architecture.
See DD-TEC-140 HA/DR Architecture Design for more details.
See DD-TEC-160 Back up and Restore Design for more details.
The following downtime window is planned for SAP to perform maintenance work that require system downtime.
| Environment | Planned Downtime Window |
|---|---|
| Sandbox, Development, Integration Test | First Tuesday each month, 15:00 - 19:00 UTC |
| QAS, Training, Parallel Run | Second Thursday each month, 15:00 - 19:00 UTC |
| Production | Third Sunday each month, 03:00 - 07:00 UTC |