Status

Owner
StakeholdersThe business stakeholders involved in making, reviewing, and endorsing this decision. Type @ to mention people by name
LeanIX Link 

Introduction

This section provides the background, scope, and key requirements for SyWay’s adoption of SAP Business Technology Platform (BTP) as the cornerstone of its global SAP landscape.

Purpose

The purpose of this Application Architecture document is to define a single, authoritative blueprint for how SAP BTP services will be organized, secured, integrated, and managed across all programme phases and regions. It serves as the reference for solution architects, development teams, operations, and audit stakeholders when designing or reviewing any BTP‑based workload


Scope & Objectives

This document describes the high-level architecture for the following SAP Business Technology Platform (BTP) services. It defines the target state and guiding standards, including identity and connectivity patterns, regional/environment alignment, and guardrails for change management, monitoring, and operations.

SAP Integration Suite (including API Management), Forms Service by Adobe

SAP Build Work Zone, SAP Task Center

SAP Build Code, SAP Business Application Studio (BAS)

SAP Cloud Transport Management,  ActiveControl – UI

SAP Cloud Identity Services: Identity Authentication (IAS) and Identity Provisioning (IPS)

SAP Secure Login Service for SAP GUI

SAP Identity Access Governance (IAG)

SAP Datasphere

SAP Profitability and Performance Management Cloud (PaPM Cloud)

Sustainability Footprint Management (SFM)

Sustainability Control Tower

Green Ledger

Asset Performance Management

Group Reporting Data Collection

Advanced Financial Closing

SAP Risk and Assurance Management

SAP Business Network Global Track and Trace (GTT)

Document Reporting Compliance


Key Decisions and Requirements


DescriptionRationale

Configure SSO for all BTP apps via SAP IAS (region-specific) federated to Microsoft Entra ID

Ensures a unified user experience and centralised policy enforcement; SSO is enforced in trust and application configurations.

Mandate encryption-in-transit (HTTPS/TLS for all web endpoints; SNC for SAPGUI/RFC)

Aligns with SyWay’s security standard to protect confidentiality and integrity; disable/redirect HTTP and require TLS 1.2+.

Operate three BTP Global Accounts with regional/environment segregation (EU, CN, US Sovereign; shared Development in Europe; region-specific INT/TRN/UAT/PAR/PRD)

Supports regional sovereignty and service availability.

Govern change via central Cloud Transport Management (cTMS) with gated approvals

Delivers predictable, auditable promotions across BTP artefacts and enforces separation of duties.

Use Cloud Connector with Location IDs and principal propagation; secure Destinations (OAuth2/x509)

Provides controlled, audited access to SAP RISE endpoints, avoids embedded credentials, and preserves user identity across hops for fine-grained authorisation. Outbound access is restricted to approved destinations.

Use region-appropriate service placement and tenancy (e.g., Sustainability apps in Azure EU20; Finance/IAG/DRC/GTT in AWS EU10; China in CN20; US in NS2)

Reflects SAP service availability and sovereignty constraints; simplifies compliance boundaries and lifecycle management.

Use IPS (connectivity plan) co-hosted with the IAG subaccount for S/4HANA provisioning

Meets IPS plan constraints, centralises sensitive provisioning, and aligns governance with IAG while keeping application subaccounts lightweight.


Application Architecture

Overview

The SyWay SAP BTP landscape is organized into three global accounts (Europe, China, US Sovereign) with shared SBX/DEV in EU20 and region-specific INT/TRN/UAT/PAR/PRD, implemented as segregated subaccounts per domain (e.g., itg, ui, dep, sec, iag, ana, sus, apm, fin, gtt, drc). Identity is federated via region-specific SAP IAS tenants proxied to Microsoft Entra ID, and connectivity to S/4HANA RISE/on-premise endpoints is mediated by SAP Cloud Connector using approved Destinations and principal propagation. Integration and API exposure are delivered through Integration Suite (including API Management), user-facing capabilities through Work Zone/Task Center/BPA/Build Code/BAS, and data/finance/sustainability workloads through Datasphere, PaPM Cloud, GRDC/AFC/DRC, GTT, and related services; change promotion is governed by Cloud Transport Management. Operations and observability rely on SAP Cloud ALM and service-native consoles, ensuring consistent security, transport control, and run-state oversight across regions and environments.


BTP Global Account & Subaccount Model


Global Account: Syensqo Main. 
Account ID: 59549222-81b5-4701-afde-9a23643d0b00

DirectoryServicesRegionDevelopment SubaccountIntegration Test SubaccountUAT SubaccountParallel Testing Subaccount

Training

Subaccount

Production Subaccount
/SyWay/Shared Svcs / IntegrationIntegration Suite(API Management), Forms Service by Adobe, SAP Process Integration RuntimeAzure Europe (Netherlands)syw-itg-dev-eu20syw-itg-uat-eu20syw-itg-prd-eu20
/SyWay/Shared Svcs / User InterfaceSAP Build Work Zone, SAP Task Center, SAP Build Process Automation, SAP Build Code, BASAzure Europe (Netherlands)syw-ui-dev-eu20syw-ui-int-eu20syw-ui-uat-eu20syw-ui-par-eu20syw-ui-trg-eu20syw-ui-prd-eu20
/SyWay/Shared Svcs / Deployment MgmtSAP Cloud Transport Management, ActiveControl -UIAzure Europe (Netherlands)syw-dep-dev-eu20syw-dep-prd-eu20
/SyWay/Shared Svcs / Identity MgmtCloud Identity (IAS and IPS), SAP Secure Login Service for SAP GUIAzure Europe (Netherlands)syw-sec-dev-eu20syw-sec-uat-eu20syw-sec-prd-eu20
/SyWay/Shared Svcs / IAGIdentity Access Governance (IAG)AWS Europe (Frankfurt)syw-iag-dev-eu10syw-iag-uat-eu10syw-iag-prd-eu10
/SyWay/AnalyticsDatasphere, PaPM CloudAzure Europe (Netherlands)syw-ana-dev-eu20syw-ana-uat-eu20syw-ana-prd-eu20
/SyWay/SustainabilitySustainability Footprint Management(SFM), Sustainability Control Tower, Green LedgerAzure Europe (Netherlands)syw-sus-dev-eu20syw-sus-uat-eu20syw-sus-prd-eu20
/SyWay/Asset Performance MgmtAsset Performance ManagementAzure Europe (Netherlands)syw-apm-dev-eu20syw-apm-int-eu20syw-apm-uat-eu20syw-apm-prd-eu20
/SyWay/FinanceGroup Reporting Data Collection, Advanced Financial Closing, SAP Risk and Assurance ManagementAWS Europe (Frankfurt)syw-fin-dev-eu10syw-fin-uat-eu10(tbd)syw-fin-prd-eu10
/SyWay/LogisticsSAP Business Network Global Track and Trace(GTT), Audit Log Viewer, Personal Data Manager, Authorization Apps for Freight Collaboration,Carrier Apps for Freight CollaborationAWS Europe (Frankfurt)syw-gtt-dev-eu10syw-gtt-prd-eu10
/SyWay/Document Reporting ComplianceDocument Reporting ComplianceAWS Europe (Frankfurt)syw-drc-dev-eu10syw-drc-prd-eu10

Global Account: [TBC Syensqo China] 
Account ID: TBC

DirectoryServicesRegionIntegration Test SubaccountUAT SubaccountParallel Testing Subaccount

Training

Subaccount

Production Subaccount
/SyWay/Shared Svcs / IntegrationIntegration Suite, API Management, Forms Service by AdobeMicrosoft Azure China North 3 (Hebei)syw-itg-uat-cn20syw-itg-prd-cn20
/SyWay/Shared Svcs / User InterfaceSAP Build Work Zone, SAP Task CenterMicrosoft Azure China North 3 (Hebei)syw-ui-int-cn20syw-ui-uat-cn20syw-ui-par-cn20syw-ui-trg-cn20syw-ui-prd-cn20
/SyWay/Shared Svcs / Identity MgmtCloud Identity (IAS and IPS)Microsoft Azure China North 3 (Hebei)syw-sec-prd-cn20
/SyWay/Asset Performance MgmtAsset Performance ManagementMicrosoft Azure China North 3 (Hebei)syw-apm-int-cn20syw-apm-uat-cn20syw-apm-prd-cn20

Global Account: [TBC Syensqo USA] 
Account ID: TBC

DirectoryServicesRegionIntegration Test SubaccountUAT SubaccountParallel Testing Subaccount

Training

Subaccount

Production Subaccount
/SyWay/Shared Svcs / IntegrationIntegration Suite, API Management, Forms Service by AdobeSAP NS2 (US Gov)syw-itg-uat-usgsyw-itg-prd-usg
/SyWay/Shared Svcs / User InterfaceSAP Build Work Zone, SAP Task CenterSAP NS2 (US Gov)syw-ui-int-usgsyw-ui-uat-usgsyw-ui-par-usgsyw-ui-trg-usgsyw-ui-prd-usg
/SyWay/Shared Svcs / Identity MgmtCloud Identity (IAS and IPS)SAP NS2 (US Gov)syw-sec-prd-usg

Application Architecture Design

Insert the Architecture design below. Architecture can be designed in either Visio or word or another format.

Application Architecture Components

Provide the details of each and every major component used in the Application Architecture. Below are some of the sample application components provided as a reference.

SAP Cloud Identity Service and SAP Secure Login Service for SAP GUI

<TBD>

SAP Build Work Zone, SAP Task Center 

Provide the details of Gateway Server

SAP Cloud Transport Management and ActiveControl -UI

Provide the details of SAP ERP Central Component

Identity Access Governance (IAG)


SAP Datasphere, PaPM Cloud 

SAP Asset Performance Management 

SAP Group Reporting Data Collection, Advanced Financial Closing, SAP Risk and Assurance Management

SAP Business Network Global Track and Trace(GTT)

SAP Document Reporting Compliance 

SAP Sustainability Footprint Management(SFM), Sustainability Control Tower, Green Ledger



Application Security

Classification

Security configuration or hardening depends on the classification and the associated risks. Security controls are implemented depending on the classification of the data per IT policy and risk management policy.

Authentication

Authentication is implemented via Single Sign-On using SAP Identity Authentication Service (IAS) federated to Microsoft Entra ID, with separate IAS tenants per region (Europe, China, US Sovereign) and trust configured at the subaccount level. Authorisation bindings use Entra groups mapped to IAS groups and BTP role collections, with a small, named platform-administrator set operating under least-privilege and controlled break-glass procedures. All web access is enforced over HTTPS/TLS, while SAP GUI/RFC channels use SNC with client certificates via SAP Secure Login Service; application calls to backend systems employ principal propagation through Cloud Connector and approved Destinations. Identity Provisioning Service (IPS), using the connectivity plan and co-hosted with the IAG subaccount, supports S/4HANA user provisioning in line with plan limits. Authentication for systems outside SAP BTP is out of scope.

Authorisation

Authorization on SAP BTP follows role-based access control (RBAC) with Microsoft Entra groups mapped via IAS groups to BTP role collections; direct user assignments are not permitted. Role collections are scoped by subaccount, environment, and region to enforce least privilege and clear separation of duties across platform administration, transport governance (cTMS), integration development/operations, UI/Work Zone content administration, analytics (Datasphere/PaPM), sustainability/finance services, and read-only audit. Production privileges are minimised and time-bound; emergency access (“break-glass”) is granted via pre-approved, MFA-protected role collections with full logging. Service-specific authorizations (e.g., Integration Suite/API Management, Work Zone/Task Center, BPA/BAS, Datasphere/PaPM, DRC, GTT) are granted only through mapped collections, and Destinations/principal propagation are allowed solely when required scopes are present. All grants are change-controlled, auditable, and subject to periodic recertification.

Communication Security

  • Encrypt-in-transit by default. All BTP web endpoints (applications, services, app routers) enforce HTTPS with TLS 1.2+ (TLS 1.3 preferred).

  • Secure SAP GUI/RFC channels. SAP GUI and RFC communications use SNC with client X.509 certificates via SAP Secure Login Service, ensuring mutual authentication and integrity for administrative and operational access.

  • Controlled back-end connectivity via Cloud Connector. Connectivity to SAP S/4HANA Rise hosted is established through SAP Cloud Connector with TLS, Location IDs per connector, and minimal resource mappings. One connector serves all non-production, and two connectors in HA serve production. Virtual hostnames used in Destinations are not externally resolvable.

  • Hardened Destinations and principal propagation. BTP Destinations use OAuth2 SAML Bearer Assertion or mutual TLS; basic credentials are avoided. User identity is propagated end-to-end where required, and scopes/authorities are limited to least privilege.

  • Certificate and key management. Certificates (server and client) are lifecycle-managed with defined owners, rotation schedules, and audit trails; trust stores are curated per subaccount to avoid over-broad trust.

  • Egress and inbound controls. Outbound traffic from BTP is restricted to approved Destinations; inbound exposure is limited to necessary public entry points. IP allow-listing and service-level throttling are applied where available (e.g., API Management policies).

  • Monitoring and auditability. Transport security events (connector state, certificate expiry, failed auth, TLS errors) are monitored, alerted, and logged to the central observability stack for investigation and compliance.


Data Security

Provide the details of the data security controls implemented based on the classification

Other Controls

Provide the details of any other controls implemented based on the classification


System Landscape

Development Environment

Include the DEV environment details

Project Test Environment

Include the Project Test environment details. Mention Not Applicable, if the environment is not relevant for the application

Quality Environment

Include the Quality environment details. Mention Not Applicable, if the environment is not relevant for the application

Production Environment

Include the PROD environment details


Operation Architecture

Change and Configuration Management

This section will include the details related to change and configuration management of SAP and non-SAP systems.

Transport Management

Provide the details on how transport management will be handled

Release Management

Provide the details on how release management will be handled

Monitoring

This section will include the details related to monitoring enabled for the application

Application Monitoring

Provide the details of application monitoring configuration

System Monitoring

Provide the details of System monitoring configuration

Sizing

Provide the details of sizing approach and the future recommendations

High Availability

Provide the details of High Availability. You may provide a reference to other document or attach a document, if the section contains lot of content

Disaster Recovery

Provide the details of Disaster Recovery. You may provide a reference to other document or attach a document, if the section contains lot of content

Backup/Restore

Provide the details of Backup/Restore. You may provide a reference to other document or attach a document, if the section contains lot of content

Maintenance Plan

SAP BTP follows continuous production releases. Teams should subscribe to What’s New for SAP Business Technology Platform to receive feature and fix updates. Regions are updated on a biweekly cadence (standard) with zero-downtime maintenance for most services. For more information about the biweekly updates, see Consolidated Release Schedules for SAP BTPInformation published on SAP site, Intelligent Enterprise Suite: Harmonized release calendar for SAP Cloud products. Immediate updates may occur for critical defects or security fixes and can require application restarts or brief downtime with prior notification; major upgrades are rare (up to four per year) and are announced four weeks in advance in line with the Service Level Agreement and harmonized release calendars. For the China (Shanghai) region, availability and planned maintenance are communicated via the regional status page, where subscription is available. For the US Government region, planned downtimes and outage notices are sent by e-mail to the initial administrator of the global account.



Service Introduction

Application Category

Provide the details of application category based on application classification. Application category is defined based on RPO, RTO requirements

Support Team

Provide the details of support team that may be required to support the application

Skill required

Provide the details of skills that are required to support this application

Checklist

Provide the checklist for support organization to support the application


Exceptions

This section covers any exceptions to the reference architecture. Some Applications may have limitations and may not meet the Enterprise Architecture, Reference Architecture and IT Policy guidelines. All exceptions should be included in this section.


See also

Provide links or references to relevant documents for further context on this architecture decision and its impact. Listing related architectural decisions here can clarify dependencies.


Change log

Workflow history