{"id":556,"date":"2011-12-11T14:46:57","date_gmt":"2011-12-11T14:46:57","guid":{"rendered":"http:\/\/sapsecurityanalyst.com\/WP\/?page_id=556"},"modified":"2015-05-03T08:54:56","modified_gmt":"2015-05-03T08:54:56","slug":"rfc-maintenance-contd","status":"publish","type":"page","link":"https:\/\/sapsecurityanalyst.com\/WP\/general-disclaimer\/rfc-maintenance-contd\/","title":{"rendered":"SAP RFC Maintenance contd.."},"content":{"rendered":"<p>&nbsp;<\/p>\n<p><!--more--><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"color: #4c4c4c;\">In this post we have discussed some more points about SAP RFC maintenance. We have discussed about the &#8220;Logon &amp; Security&#8221; tab of SM59. We have also discussed about the Trusted\/Trusting relationships between SAP Systems\u00a0and about the Connection Test.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"color: #0000ff; font-family: verdana;\"><!--more--><\/span><\/p>\n<p><span style=\"color: #0000ff; font-family: verdana;\"><br \/>\n<span style=\"color: #4c4c4c;\">Here we will discuss about RFC ABAP Type 3. As we have already discussed earlier, RFC Calls can be of two types &#8211;<\/span> <strong>Trusted RFC<\/strong> and <strong>Untrusted RFC.<\/strong><\/span><\/p>\n<p><span style=\"color: #0000ff; font-family: verdana;\"><strong><!--more--><br \/>\n<\/strong><\/span><br \/>\n<span style=\"color: #0000ff; font-family: verdana;\"><span style=\"color: #4c4c4c;\">In an <strong>Untrusted RFC<\/strong>, the source client needs to authenticate itself to the destination server using user credentials.<\/span><\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"color: #0000ff; font-family: verdana;\"><!--more--><br \/>\n<\/span><\/p>\n<p><a href=\"https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2011\/12\/untrusted.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-559\" title=\"untrusted\" src=\"https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2011\/12\/untrusted.jpg\" alt=\"\" width=\"452\" height=\"382\" srcset=\"https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2011\/12\/untrusted.jpg 452w, https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2011\/12\/untrusted-300x253.jpg 300w, https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2011\/12\/untrusted-290x245.jpg 290w, https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2011\/12\/untrusted-150x126.jpg 150w\" sizes=\"(max-width: 452px) 100vw, 452px\" \/><\/a><\/p>\n<p><a href=\"https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2011\/12\/untrusted.jpg\"><br \/>\n<\/a><!--more--><br \/>\n<span style=\"color: #0000ff; font-family: verdana;\"><br \/>\n<span style=\"color: #4c4c4c;\">Before creating <strong>Trusted <\/strong><\/span><\/span><span style=\"color: #4c4c4c;\"><strong>RFC Destinations <\/strong>using SM59, it is important to build Trusted\/Trusting relationships between SAP Systems. This must be built starting from the trusting system (server).<\/span><\/p>\n<p><span style=\"color: #4c4c4c;\"><br \/>\n<\/span><\/p>\n<p><!--more--><br \/>\n<span style=\"color: #4c4c4c; font-family: verdana;\"> Once this Trusted\/Trusting Relationship is configured, it can be used to create RFC Destinations.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"color: #0000ff; font-family: verdana;\"><!--more--><br \/>\n<span style=\"color: #4c4c4c;\"> No authentication is required in case of Trusted RFC as the destination server trusts the source client.<\/span><\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"color: #0000ff; font-family: verdana;\"><!--more--><br \/>\n<\/span><a href=\"https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2011\/12\/Trusted1.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-567\" title=\"Trusted\" src=\"https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2011\/12\/Trusted1.jpg\" alt=\"\" width=\"400\" height=\"377\" srcset=\"https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2011\/12\/Trusted1.jpg 400w, https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2011\/12\/Trusted1-300x282.jpg 300w, https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2011\/12\/Trusted1-290x273.jpg 290w, https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2011\/12\/Trusted1-150x141.jpg 150w\" sizes=\"(max-width: 400px) 100vw, 400px\" \/><\/a><\/p>\n<p><span style=\"color: #0000ff; font-family: verdana;\"><!--more--><br \/>\n<span style=\"color: #4c4c4c;\">Once the RFC is created, a<\/span> <strong>Connection Test<\/strong> <span style=\"color: #4c4c4c;\">needs to be done to Test the Connection using the Connection Test Button.<\/span> <strong>Remote Logon<\/strong> <span style=\"color: #4c4c4c;\">Button can be used for remotely logging into SAP System.<\/span><\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"color: #0000ff; font-family: verdana;\"><!--more--><br \/>\n<\/span><\/p>\n<p><a href=\"https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2011\/12\/Connection-Test_Remote-Logon.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-564\" title=\"Connection Test_Remote Logon\" src=\"https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2011\/12\/Connection-Test_Remote-Logon.jpg\" alt=\"\" width=\"416\" height=\"216\" srcset=\"https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2011\/12\/Connection-Test_Remote-Logon.jpg 416w, https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2011\/12\/Connection-Test_Remote-Logon-300x155.jpg 300w, https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2011\/12\/Connection-Test_Remote-Logon-290x150.jpg 290w, https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2011\/12\/Connection-Test_Remote-Logon-150x77.jpg 150w\" sizes=\"(max-width: 416px) 100vw, 416px\" \/><br \/>\n<\/a><br \/>\n<a href=\"https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2011\/12\/Connection-Test_Result.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-565\" title=\"Connection Test_Result\" src=\"https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2011\/12\/Connection-Test_Result.jpg\" alt=\"\" width=\"340\" height=\"221\" srcset=\"https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2011\/12\/Connection-Test_Result.jpg 340w, https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2011\/12\/Connection-Test_Result-300x195.jpg 300w, https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2011\/12\/Connection-Test_Result-290x188.jpg 290w, https:\/\/sapsecurityanalyst.com\/WP\/wp-content\/uploads\/2011\/12\/Connection-Test_Result-150x97.jpg 150w\" sizes=\"(max-width: 340px) 100vw, 340px\" \/><\/a><\/p>\n<p>&nbsp;<\/p>\n<p><!--more--><\/p>\n<p><!--more--><br \/>\n<script type=\"text\/javascript\">\/\/ < ![CDATA[\ngoogle_ad_client = \"ca-pub-1241348474673689\";\n\/* All content above *\/\ngoogle_ad_slot = \"3293572617\";\ngoogle_ad_width = 468;\ngoogle_ad_height = 15;\n\/\/ ]]><\/script><br \/>\n<script src=\"http:\/\/pagead2.googlesyndication.com\/pagead\/show_ads.js\" type=\"text\/javascript\">\/\/ < ![CDATA[\n\n\n\/\/ ]]><\/script><\/p>\n<h3><span style=\"color: #e63518;\">\u00a0For more details on Trusted\/Untrusted SAP RFC, <a href=\"https:\/\/sapsecurityanalyst.com\/WP\/home\/sap-rfc-authorization\" target=\"_blank\"><span style=\"color: #e63518;\"><em><span style=\"text-decoration: underline;\">please refer to this post.<\/span><\/em><\/span><\/a><\/span><\/h3>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>&nbsp;<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":38,"menu_order":0,"comment_status":"closed","ping_status":"open","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sapsecurityanalyst.com\/WP\/wp-json\/wp\/v2\/pages\/556"}],"collection":[{"href":"https:\/\/sapsecurityanalyst.com\/WP\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sapsecurityanalyst.com\/WP\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sapsecurityanalyst.com\/WP\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sapsecurityanalyst.com\/WP\/wp-json\/wp\/v2\/comments?post=556"}],"version-history":[{"count":17,"href":"https:\/\/sapsecurityanalyst.com\/WP\/wp-json\/wp\/v2\/pages\/556\/revisions"}],"predecessor-version":[{"id":2123,"href":"https:\/\/sapsecurityanalyst.com\/WP\/wp-json\/wp\/v2\/pages\/556\/revisions\/2123"}],"up":[{"embeddable":true,"href":"https:\/\/sapsecurityanalyst.com\/WP\/wp-json\/wp\/v2\/pages\/38"}],"wp:attachment":[{"href":"https:\/\/sapsecurityanalyst.com\/WP\/wp-json\/wp\/v2\/media?parent=556"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}