You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 18 Next »

Status

  Approved

Owner
Stakeholders


Introduction

Purpose

The purpose of the document is to outline the application architecture of S/4HANA instance deployed in Europe region. 

Scope & Objectives

This document describes the high-level architecture design for S/4HANA and the supporting systems that are deployed together in the RISE environment. It will cover the following topics:

  • Landscape overview
  • Application and components
  • Application security and access
  • Operational architecture

Out of scope:

  • Detailed architecture designs that are managed by SAP RISE.
  • RISE operating model.
  • Information related to product documentation and can be found online will not be documented here. 

Key Decisions and Requirement

DescriptionRationale
SAP Private Cloud deployment model was selected for S/4HANA deploymentPlease refer to KDD026 - SAP S/4HANA Deployment Model.
SAP GTS will be co-deployed with S/4HANA as a separate client.Please refer to KDD074 - Architecture of SAP GTS
Embedded Fiori deployment model - SAP Fiori front-end server is deployed on S/4HANA

S/4HANA will be the only backend system for Fiori and there is a strict dependency between Fiori and S/4HANA version. Hence an embedded deployment will be preferred and it also optimizes hosting and maintenance costs.

Embedded deployment option is also recommended for S/4HANA by SAP

SSL and SNC will be configured for S/4HANA to encrypt web and RFC traffic

Synesqo cybersecurity requires all data in transit to be encrypted.

Configure SSO for S/4HANA

As part of SyWay project, a common authentication mechanism (e.g., SAML) will be adopted for ease of access and unified user experience.

99.9% SLA and SAP RISE short distance disaster recovery for production systems. 

Based on Syensqo existing non-functional requirements.

Application Architecture

Overview

SAP RISE application architecture is represented in the diagram below. 

SAP RISE Details

The table below summaries SAP RISE details. 

Customer SID

YSQ

Customer Number

3008440

Installation Number

21360356

S-User for PCE

S0026961840

Cloud Provider

Azure

Cloud Region

North Europe (Ireland - Dublin)

Planned Downtime

First Tuesday each month, 15:00 - 19:00 UTC

Application Components

S/4HANA

S/4HANA is an Enterprise resource planning solution based on SAP HANA database and SAP ABAP platform. It is a core component in SyWay landscape. SAP Fiori and GTS components will be co-deployed with S/4HANA. A two tier deployment approach will be adopted for S/4HANA systems: Application and DB. 

  • For Sandbox, Development, Integration testing and Training S/4HANA systems, 1 application and 1 DB server will be deployed.

  • For UAT and Parallel Testing S/4HANA systems, multiple application servers will be deployed with 1 DB server.

  • For Production, high availability is in scope and S/4HANA components (like message server, app and DB) are deployed across 2 availability zones with pacemaker clusters to ensure no single point of failure. 

CI - Central Instance, SCS - SAP Central Services, PAS - Primary Application Server, AAS - Additional Application Server

SAP Web Dispatcher

SAP Web dispatcher acts as a web proxy for S/4HANA systems. It facilitates and load balances incoming HTTP traffic. 

  • For all non-PRD landscape, one web dispatcher will be deployed 
  • For PRD, two web dispatchers will be deployed for HA purposes and Azure load balancer will used to load balance HTTP traffic to the 2 PRD web dispatchers.

SAP Cloud Connector

The SAP Cloud connector acts as a reverse invocation proxy to establish network connection between SAP RISE systems and SAP BTP services (Integration suite, API management, SAP Analytics Cloud etc.) and Ariba Cloud Integration Gateway (CIG). Due to its reverse invoke capabilities, the network traffic originates from SAP Cloud connector to SAP BTP and once the link as been established, data can be exchanged between SAP RISE systems and BTP. HTTPS or RFC protocols are used between SAP Cloud Connector and S/4HANA, and HTTPS protocol is used between Cloud Connector and S/4HANA.

To enable outbound internet traffic from SAP RISE, SAP has provisioned a customer gateway server (CGS) with a forward internet proxy installed on it.

A 2 tier landscape will be adopted for SAP cloud connector: non-PRD and PRD. The non-PRD cloud connector will be shared across all non-PRD landscape. 

 

Data Provisioning Agent

Data Provisioning Agent (DPA) is used to integrate S/4HANA and SAP Datasphere. The network connection to SAP Datasphere is initiated by DPA and CGS is used to facilitate the internet connection to SAP Datasphere. 

DPA uses the HTTPS or RFC protocols to communicate with S/4HANA and uses the HTTPS protocol to communicate with SAP Datasphere.   

A 2 tier landscape will be adopted for DPA: non-PRD and PRD. The non-PRD instance will be shared across all non-PRD landscape. 

SAP Analytic Cloud (SAC) Agent

SAC Agent facilitates secure data connectivity and data transfer from S/4HANA to the SAP Analytics Cloud. It leverages SAP Cloud connector connection to BTP to transmit data from S/4HANA to SAC. The HTTPS protocol is used for communication S/4HANA, SAC agent and SAC. 

A 2 tier landscape will be adopted for SAC agent: non-PRD and PRD. The non-PRD SAC agent will be shared across all non-PRD landscape. 

OpenText Connector

OpenText connector facilitates the connection between S/4HANA and the OpenText cloud. The connection is initiated from S/4HANA to the OpenText connector and to OpenText cloud via CGS. The HTTPS protocol is used for communication between all components. 

A 2 tier landscape will be adopted for OpenText Connector: non-PRD and PRD. The non-PRD instance will be shared across all non-PRD landscape. 

Supporting Components (SAP Router and DNS)

These are components deployed to SAP RISE landscape and are managed by SAP. Syensqo users will not have access to these applications and can raise requests to SAP to manage any changes. 

  • SAP Router: Single instance deployed in SAP RISE to manage SAP support's connection to Syensqo RISE systems.
  • DNS: Two instances deployed in SAP RISE to manage SAP RISE domain and will be integrated with Syensqo DNS using Conditional DNS Forwarding.

System Landscape

The table below describes the environment and the corresponding application & SID deployed. 

Region

Landscape

Systems

S/4HANA (HANA DB)

Web Dispatcher

SAP Cloud connector

SAP Data Provisioning Agent

SAC Agent

OpenText Connector

Europe

Sandbox

ERS (HRS)

WRS

N/A

N/A

N/A

N/A

Development

ERD (HRD)

WRD

CRD

DRD

SRD

ORD

Integration Testing

ERT (HRT)

WRT

N/A

N/A

N/A

N/A

Training

ER2 (HR2)

WR2

N/A

N/A

N/A

N/A

UAT

ERQ (HRQ)

WRQ

N/A

N/A

N/A

N/A

Parallel Testing

ER1 (HR1)

WR1

N/A

N/A

N/A

N/A

Production

ERP (HRP)

WRP & WRH

CRP

DRP

SRP

ORP

The following sections describes the system details for each tier. 

Sandbox

ApplicationPrimary RoleSIDInstancePhysical HostnamePhysical IPVirtual hostnameVirtual IPPorts
S/4HANACentral InstanceERS

ASCS01

D00






HANA DBHRS

ERS (tenant DB)

HRS (system DB)






Web DispatcherWeb DispatcherWRS00




Development 

ApplicationPrimary RoleSIDInstancePhysical HostnamePhysical IPVirtual hostnameVirtual IPPorts
S/4HANACentral InstanceERD

ASCS01

D00

hec42v303048.irl.sap.eu.cloud.syensqo.com172.16.33.48

vhysqerdci.sap.eu.cloud.syensqo.com

vhysqerdcs.sap.eu.cloud.syensqo.com

172.16.33.49

172.16.33.50

HTTP - 8000

HTTPS - 44300

RFC - 3300

Dispatcher - 3200

Message server - 3601

HANA DB

HRD (system DB)

ERD (tenant DB)

06

hec42v302672.irl.sap.eu.cloud.syensqo.com172.16.33.37

vhysqhrddb01.sap.eu.cloud.syensqo.com

vhysqhrddb.sap.eu.cloud.syensqo.com

vhysqerddb.sap.eu.cloud.syensqo.com

172.16.33.42

172.16.33.43

172.16.33.51

System DB - 30615

Tenant DB- 30641

Web DispatcherWeb DispatcherWRSW80hec42v302675.irl.sap.eu.cloud.syensqo.com172.16.33.40vhysqwrdwd01.sap.eu.cloud.syensqo.com172.16.33.44

HTTP - 8080

HTTPS - 44380

SAP Cloud connectorSAP Cloud connectorCRDN/Ahec42v302678.irl.sap.eu.cloud.syensqo.com172.16.33.45vhysqcrdcc01.sap.eu.cloud.syensqo.com172.16.33.46

HTTPS - 8443

Data Provisioning AgentData Provisioning AgentDRDN/Ahec42v302676.irl.sap.eu.cloud.syensqo.com172.16.33.41vhysqdrddpa01.irl.sap.eu.cloud.syensqo.com172.16.33.47
SAC AgentSAC AgentSRDN/Ahec42v302674.irl.sap.eu.cloud.syensqo.com172.16.33.39vhysqsrdweb01.irl.sap.eu.cloud.syensqo.com172.16.33.38
OpenText ConnectorOpenText ConnectorORD





Integration Testing

<Place holder for SEIM integration>

UAT

<Place holder for SEIM integration>

Training

<Place holder for SEIM integration>

Parallel Run

<Place holder for SEIM integration>

Production

<Place holder for SEIM integration>

S/4HANA Client and Transport Strategy

Please see S/4HANA Client and Transport Strategy for client details in S/4HANA.

SAP Best Practices


Application Security

User Access

System

Users

Access Method

S/4HANA

Business users

Web

Support users

Web and SAPGUI

HANA DB

N/A

Can be requested from SAP if required.

Web dispatcher

Admin

Web

SAP Cloud connector

Admin

Web

Data Provisioning Agent

Admin

Web

SAC Agent

Admin

Web

OpenText Connector

Admin

Web

Default SAP roles will be used for Web dispatcher and connectors. 

Authentication

Single Sign-on (SSO) will be enabled for S/4HANA system. Since other systems in SAP RISE landscape are supporting systems that will not be accessed directly by business users, authentication will be based on user ID and Password. 

SAML SSO - Fiori 

Identity Authentication Services (IAS) within SAP Cloud Identity Services will be configured to act as a Identity provider proxy as shown below.

Following describes the authentication flow.

  1. When users access Fiori launchpad, they are redirected to the Entra ID which has been configured as the identity provider in IAS.
  2. IAS delegates the authentication to Entra ID.
  3. Users will need to sign in to Entra ID using their windows credentials and following the Entra ID authentication process.
  4. Using the SAML assertion issued from Entra ID, the user is propagated to IAS.
  5. IAS validates the SAML assertions and modifies assertion attributes (if required) before issuing the final SAML assertion.
  6. Users are redirected to S/4HANA and will sign in using the issued SAML assertion.

SAPGUI SSO

Single sign-on based on Kerberos

Following describes the authentication flow.

  1. User authenticates to Windows domain
  2. Entra ID provides Kerberos security token to user
  3. User opens a system connection using an SAP GUI desktop client
  4. Kerberos token is forwarded to ABAP system using SNC. The Kerberos token is validated offline on the server, no connection to Entra ID required.

OR

Single sign-on based on X.509 certificates

 

Following describes the authentication flow.

  1. User opens an SAP GUI connection.
  2. Secure Login Client (SLC) redirects user to the identity provider logon page.
  3. Identity Authentication Service delegates authentication to Microsoft Entra ID.
  4. Users authenticates to Microsoft Entra ID.
  5. After successful authentication, Cloud CA issues an X.509 certificate
  6. SAP Secure Login Service returns the X.509 certificate, valid for one day, to SLC
  7. X.509 certificate token is used for authenticating the SAP GUI user to the ABAP system

Communication Security

All data in transit will be encrypted.

  • SSL is used for all web traffic (Systems are configured to reject HTTP access or redirect to HTTPS). 
  • SNC is used for all RFC and SAPGUI communications. 

See DD-TEC-070 Network and Infrastructure Architecture for details on network security and internet connectivity.

Data Security

Data encryption is enable for SAP HANA DB as part of the system provisioning.

NextLab tool is used to enable field level encryption in S/4HANA. This will encrypt ITAR-relevant data elements and the encrypted values will be stored in HANA DB. Data will be unencrypted on the fly when it is access by an authorized user. For more details please refer to DD-SOL-090 Application Architecture NextLabs.

Other Controls

<Place holder for SEIM integration>

<Audit logs>

Operation Architecture

Change and Configuration Management

Change and configuration management in S/4HANA will be managed through SAP transports. See the following to documents.

For non-S/4HANA systems, there will be no transport mechanism and changes will be managed manually.

Monitoring

The following table summaries the monitoring approach for SAP RISE systems.

LayerApproach 
InfrastructureMonitored by SAP as part of SAP RISE standard services.
OS
SAP HANA DB

SAP Basis monitoring


Batch Job


Integration 


Performance


Security


Sizing

High Availability

Disaster Recovery

Backup/Restore

Maintenance Plan


Exceptions


See also


No files shared here yet.

Change log

Version Published Changed By Comment
CURRENT (v. 18) Mar 10, 2026 08:28 MUTHUSAMY-ext, Kunalan
v. 71 Feb 04, 2026 07:54 MUTHUSAMY-ext, Kunalan
v. 70 Feb 04, 2026 07:53 MUTHUSAMY-ext, Kunalan
v. 69 Jan 15, 2026 14:15 MUTHUSAMY-ext, Kunalan
v. 68 Jan 14, 2026 03:41 MUTHUSAMY-ext, Kunalan
v. 67 Dec 03, 2025 10:46 MUTHUSAMY-ext, Kunalan
v. 66 Dec 03, 2025 10:45 MUTHUSAMY-ext, Kunalan
v. 65 Nov 06, 2025 08:31 MUTHUSAMY-ext, Kunalan
v. 64 Nov 05, 2025 15:59 MUTHUSAMY-ext, Kunalan
v. 63 Nov 05, 2025 12:31 MUTHUSAMY-ext, Kunalan

Go to Page History

Workflow history

Title Last Updated By Updated Status  
There are no pages at the moment.

  • No labels