| Status | |
| Owner | |
| Stakeholders | Douglas de la Cruz, Milene Zeni, Domenico Cichella |
| LeanIX Link |
The purpose of this document is to describe the architecture of NextLabs application.
Out of Scope:
NextLabs policy design and details will covered in a separate deliverable.
Information related to product documentation that can be found online will not be documented here.
| Description | Rationale |
|---|---|
| NextLabs will be deployed in the same Azure region as S/4HANA | Since NextLabs makes real-time decisions on access, low latency network connection will be required between S/4HANA and NextLabs to prevent performance issues. |
| Shared file system between S/4HANA App server and Policy controller | Azure Files from NextLabs Azure tenant will be leveraged and this file system will be used to host NextLabs DAE binaries and logs from S/4HANA |
| Shared file system between NextLabs Policy Controller and ICENET VMs | Azure Files will be leveraged and this file system will be used to host Policy controller logs from Policy Controller. |
| Azure SQL Database (DaaS) will be leveraged for NextLabs | Azure SQL Database will be leveraged to reduce operational overhead. |
| Sensitive data will be protected using Format-Preserving Encryption (FPE). | FPE allows Syensqo to meet export controls such as ITAR, EAR, or various UK/European Regulations. |
| NextLabs built-in KMS will be leveraged | For ease of integration, the NextLabs built-in KMS will be used to manage encryption keys.1 |
NextLabs policy should take user's location into consideration when evaluating access to sensitive data. | Ensures that the sensitive data is not being accessed outside the permitted country and allows Syensqo to meet export controls. |
| Single Sign-On (SSO) | As part of SyWay project, a common authentication mechanism (e.g., SAML) is adopted for ease of access and unified user experience. |
| Users must access NextLabs using HTTPS. | As part of SyWay standards, all data in transit must be encrypted. |
1 NextLabs built-in KMS has limited features (e.g., Key Encryption Keys is currently not supported) and if it does not meet requirements, Voltage KMS might be used instead.
Data Access Enforcer (DAE) from NextLabs will be deployed for SyWay. DAE provides fine-grained, attribute-based access control (ABAC) for data, ensuring that only authorized users or applications can access sensitive data based on real-time policies and contextual information. For SyWay, it enforces authorization decisions to grant access and decrypt sensitive data.
NextLabs Dynamic Authorization Management (DAM) extends native role-based authorization and enforces finer-grained, attribute-based controls to critical SAP applications. However, DAM can only be implemented on the SAPGUI UI level to mask data and since SyWay will be using Fiori, DAM does not fit and will not be implemented.
The following diagram describes the different NexLabs components.
![]()
The following steps will be carried out to prepare S/4HANA
![]()
![]()
NextLabs landscape will consist of a 4-tier landscape.
![]()
*QAS instance will be integrated to INT and UAT landscapes.
NextLabs system will be hosted in both EU and US region. Since NextLabs requires low latency network connection to S/4HANA, NextLabs will be hosted in the same Azure region and physical zone as SAP RISE.
| Region | Azure Region |
|---|---|
| EU | North Europe (Dublin) |
In EU and US, NextLabs will be deployed to the following Subscriptions and vNETs. In both regions, NextLabs vNETs will be attached to region's Syensqo's Hub. To optimize latency between S/4HANA and NextLabs, NextLabs will be deployed in the same zone as SAP RISE.
| Region | Subscriptions | vNET | Azure physicalZone |
|---|---|---|---|
| EU | Non-PRD | DEV | northeurope-az1 |
| QAS | northeurope-az1 | ||
| Pre-PRD | PAR | northeurope-az1 | |
| PRD | PRD |
For more details on NextLabs infrastructure please refer to Network and Infrastructure Architecture .
NextLabs Policy Controller, ICNET and Management server components require an FQDN to be defined. The following URL naming convention will be adopted.
Component URL: NXL-<environment>-<component><##>.syensqo.com
Load balancer URL: NXL-<environment>-<component>.syensqo.com
| Parameter | Values |
|---|---|
| environment |
|
| component |
|
| XX |
|
| Environment | Component | URL |
|---|---|---|
| DEV | Control Center | https://nxl-dev-cc.syensqo.com |
| Policy Validator | https://nxl-dev-cc.syensqo.com:6443 | |
| Java Policy Controller | https://nxl-dev-jpc01.syensqo.com:8443 |
Azure SQL Server (DaaS) service will be used as NextLabs database. The table below summaries the DB details
| Environment | SQL Server | SQL DB | IP | Schema | DB User | DB Link |
|---|---|---|---|---|---|---|
| DEV | azrneuvmldnlaapp0000 | azrneusdbdnlasha0000 | 172.16.48.20 | dbo | dev_ccdbuser | Link |
Development NextLabs instance will follow combined deployment where multiple components are deployed together.
![]()
QAS NextLabs instance will follow a distributed deployment with no high-availability (HA).
![]()
Parallel run instance will follow a high-availability architecture.
![]()
NextLabs will be accessed by NextLabs administrators from Syensqo network via HTTPS. Default security roles will be used.
NextLabs is configured to perform SAML SSO with Syensqo Entra ID.
Data in transit is encrypted using secure TLS protocols (v.1.2 or greater) with 2048-bit keys.
The following controls are implemented to ensure data security:
NextLabs policies will be transported using NextLabs Policy Migration tool. This tool will be configured to transport to DEV → QAS → PAR → PRD.
The following monitoring will be enabled for NextLabs.
| Type | Metrics monitored | Alerts Trigger | Monitoring Tool |
|---|---|---|---|
| VM Availability | VM is running | VM status is not available | TBC |
| High resource utilization | CPU | CPU utilization > 85% | TBC |
| Memory | Memory utilization > 85% | TBC | |
| Disk | Disk utilization > 85% | TBC | |
| OS Services | NextLab services | Services are down | TBC |
| Backup | Backup status | Backup status is not successful | TBC |
TBC
NextLabs HA/DR approach is similar to S/4HANA - Short distance disaster recovery. With this approach, Redundant NextLabs components will be deployed across 2 zones.
The following table lists down the HA/DR approach for each component.
| Component | HA Design |
|---|---|
| Policy Controller | Multiple Policy Controller VMs will be deployed across 2 AZ in an active-active configuration. |
| ICENET Servers | Multiple ICENET Servers will be deployed across 2 AZ in an active-active configuration. |
| Management Server | 2 Management Server VMs will be deployed across 2 AZ in an active-passive configuration and RHEL Pacemaker will be leveraged to manage the failover. |
| Bulk Obfuscation Tool (BOT) | BOT is not critical to runtime. Hence one instance of BOT will be deployed. |
| MS SQL | SQL managed instance (DaaS) will be used for NextLabs and HA is provided by Microsoft. |
| Azure Files (DAE for SAP) | Azure Files built-in HA capabilities will be leveraged. |
For more details please refer to DD-TEC-140 HA/DR Architecture Design.
The following backups are configured for NextLabs.
| Tier | Backup Type | Frequency |
|---|---|---|
DEV & QAS | VM | Weekly |
| Azure File | Daily | |
| DB | Daily | |
Pre-PRD & PRD | VM | Weekly |
| Azure File | Daily | |
| DB | Daily | |
| DB log | Hourly |
For more details please refer to DD-TEC-160 Back up and Restore Design.
TBC
Syensqo's maintenance and patching schedule will be adopted for NextLabs systems.
For parallel run and production instance, the HA configuration will be leverage to perform the activities without downtime.