HMAC implementation

I would like to ask, if somebody already implemented HMAC algorithm with ABAP.
(http://tools.ietf.org/html/rfc2104#section-3). I need to calculate the HMAC-SHA1 hash code for authentification purposes.
thanks,
martin

My solution of HMAC implementation:
FUNCTION Z_CALCULATE_HMAC .
*"*"Local Interface:
*"  IMPORTING
*"     REFERENCE(IV_HASH_ALG) TYPE  HASHALG
*"     REFERENCE(IV_MESSAGE) TYPE  XSTRING
*"     REFERENCE(IV_KEY) TYPE  XSTRING
*"  EXPORTING
*"     REFERENCE(EV_HASH) TYPE  HASH160
* H(K XOR opad, H(K XOR ipad, text))
* B = 64 bytes
  DATA: ipad_x TYPE xstring,
        opad_x TYPE xstring,
        key_x  TYPE xstring,
        x1     TYPE x,
        x2     TYPE x,
        x3     TYPE x,
        length_key     TYPE i,
        chars_appended TYPE i,
        xor1           TYPE xstring,
        xor2           TYPE xstring,
        ev_hash_x      TYPE hash160x.
* -- index 0. - ipad, opad
* ipad = the byte 0x36 repeated B times
* opad = the byte 0x5C repeated B times.
  x1 = '36'.
  x2 = '5C'.
  x3 = '00'.
  DO 64 TIMES.
    CONCATENATE ipad_x x1  INTO ipad_x IN BYTE MODE.
    CONCATENATE opad_x x2  INTO opad_x IN BYTE MODE.
  ENDDO.
* -- index 1. - extend key to 64 bytes
* append zeros to the end of K to create a B byte string
* (e.g., if K is of length 20 bytes and B=64, then K will be appended with 44 zero bytes 0x00)
* KEY is already sended in HEX format
  key_x = iv_key.
  length_key = XSTRLEN( key_x ).
  chars_appended = 64 - length_key.
  IF chars_appended > 0 .
    DO chars_appended TIMES.
      CONCATENATE  key_x x3 INTO key_x IN BYTE MODE.
    ENDDO.
  ENDIF.
* -- index 2. - first calculation = Key XOR ipad
* XOR (bitwise exclusive-OR) the B byte string computed in step (1) with ipad
  xor1 = key_x BIT-XOR ipad_x.
* -- index 3.
* append the stream of data 'text' to the B byte string resulting from step (2)
* message is sended already in HEX format
*  iv_message_x = iv_message.
  CONCATENATE xor1 iv_message INTO xor1 IN BYTE MODE.
* -- index 4.
* apply H to the stream generated in step (3)
  CALL FUNCTION 'CALCULATE_HASH_FOR_RAW'
    EXPORTING
      alg  = iv_hash_alg
      data = xor1
*      length = 20
    IMPORTING
      hashx = ev_hash_x.
* -- index 5.
* XOR (bitwise exclusive-OR) the B byte string computed in step (1) with opad
  xor2 = key_x BIT-XOR opad_x.
* -- index 6.
* append the H result from step (4) to the B byte string resulting from step (5)
*  iv_message_x = ev_hash_x.
  CONCATENATE xor2 ev_hash_x INTO xor2 IN BYTE MODE.
* -- index 7.
* apply H to the stream generated in step (6) and output the result
  CALL FUNCTION 'CALCULATE_HASH_FOR_RAW'
    EXPORTING
      alg  = iv_hash_alg
      data = xor2
    IMPORTING
      hash = ev_hash.
ENDFUNCTION.
Usage:
CALL FUNCTION 'Z_TFM_CALCULATE_HMAC'
  EXPORTING
    iv_hash_alg       = 'SHA1'
    iv_message        = '4D415254494E' "MARTIN
    iv_key            = '42524154'      "BRAT
IMPORTING
   EV_HASH           = LV_HASH          .
regards,
martin

Similar Messages

  • LABVIEW HMAC-SHA1 implementation

    Hello all,
    We have need of an HMAC-SHA1 implementation in Labview. Can anyone help?
    Thanks,
    Josh

    Hello Josh,
    We have a Community example that uses HMAC-SHA1 that might help you get started.  
    SHA-1 Cryptographic Hash Function
    Searching the Community Code Exchange might be a good place to find additional code that has implemented HMAC-SHA1 in LabVIEW.
    Regards,
    M. Whitaker
    ni.com/support

  • HMAC MD5 Hash Error

    i am tryingti implement the linshare affiliate program in Cf
    using this method
    Linkshare
    affiliate program in Coldfusion
    in this method it talks about the failure of the HMAC MD%
    function in Coldfusion and uses this java component method to get
    around it.
    http://blog.shortfusion.com/index.cfm/2008/11/21/ColdFusion-HMACMD5-function">Coldfusion
    HMACMD5 function[/L]
    i have 90% of this implemented but i cannot get the component
    recognized by the server and so am stuck on the final stage.
    here is the error i am getting.
    "Could not find the ColdFusion Component or Interface
    /components.utils. Ensure that the name is correct and that the
    component or interface exists.
    The error occurred on line 87.
    on the /ls_post.cfm page "
    The relevant code is attached
    i have a components folder sitting in the webroot and a
    utils.cfc in there containing all the stuff to perform the HASH.
    can anyone see why the server is not recognizing the
    component?
    thanks

    Get rid of the slash so the path consists of dot notation
    only:
    <cfinvoke component="components.utils"
    ...>
    See also the documentation for information about how CF
    searches for components.
    http://livedocs.adobe.com/coldfusion/8/htmldocs/help.html?content=buildingComponents_27.ht ml

  • HMAC (SHA1) key longer than 81 characters not possible?

    Not sure whether I'm in the correct forum...
    To sign a message for a specific application with HMAC-SHA1 hash I need a 83 character key.
    My problem: the function module 'SET_HMAC_KEY' throws the exception "param_length_error". After I've testet with several key length, I found out, that the maximum valid length is 81. Is there any reason for this?
    With 3rd party libraries (ie. Python and Javascript) longer keys are working.
    Code:
    CALL FUNCTION 'SET_HMAC_KEY'
      EXPORTING
        generate_random_key         = ' '
        alg                         = 'SHA1'
        keycstr                     = 'cB1phTHISISATESTVuZMDmWCz1CEMy82iBC3HgFLpE&7857T...YFqV93gRJQ'
        client_independent          = ' '
      EXCEPTIONS
        unknown_alg                 = 1
        param_length_error          = 2
        internal_error              = 3
        param_missing               = 4
        malloc_error                = 5
        abap_caller_error           = 6
        base64_error                = 7
        calc_hmac_error             = 8
        rsec_record_access_denied   = 9
        rsec_secstore_access_denied = 10
        rsec_error                  = 11
        rng_error                   = 12
        record_number_error         = 13
        OTHERS                      = 14.
    Best regards, Uwe
    Edited by: Julius Bussche on Aug 5, 2010 10:19 PM
    I truncated the key further because in a coding tag it toasts the formatting when too long.

    Hi,
    yes, we can :-). Let say that SAP implementation supports a key with size more than 81 bytes. Then according to specification if the key is longer than block size of hash function (64 bytes for SHA-1) then it would use hash function to reduce original key to new key with size equals to output size of hash function (20 bytes for SHA-1). Therefore doing this step manually before calling SET_HMAC_KEY is equal to calling SET_HMAC_KEY which supports keys longer than 81 bytes.
    The easiest way how to check this is to compare some HMAC-SHA1 implementation with the result produced by my proposed logic.
    DATA: text TYPE string,
            key_str TYPE string,
            hash TYPE hash160x,
            key TYPE xstring,
            hmac TYPE hash512_base_64.
      text = 'Hello'.
      key_str = '012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789'.
      CALL FUNCTION 'CALCULATE_HASH_FOR_CHAR'
        EXPORTING
          data  = key_str
        IMPORTING
          hashx = hash.
      key = hash.
      CALL FUNCTION 'SET_HMAC_KEY'
        EXPORTING
          generate_random_key = space
          alg                 = 'SHA1'
          keyxstr             = key
          client_independent  = space.
      CALL FUNCTION 'CALCULATE_HMAC_FOR_CHAR'
        EXPORTING
          alg        = 'SHA1'
          data       = text
        IMPORTING
          hmacbase64 = hmac.
      WRITE: / hmac.
    Javascript version
    var hmac = Crypto.HMAC(Crypto.SHA1, "Message", "Secret Passphrase");
    var hmacBytes = Crypto.HMAC(Crypto.SHA1, "Message", "Secret Passphrase", { asBytes: true });
    var hmacString = Crypto.HMAC(Crypto.SHA1, "Message", "Secret Passphrase", { asString: true });
    Both implementations return "qsXNz/wecK4PMob6VG9RyRX6DQI=".
    Cheers
    Sorry for formatting but it looks like something is broken.
    Edited by: Martin Voros on Aug 6, 2010 10:34 PM

  • Warning: Apple's hmac-sha256.c sample code appears to be PPC only

    There is a big-endian issue in Apple's hmac-sha256.c code ... it appears not to be portable on Intel machines. So if you're hosting your portal site on an Intel machine (whether it's a Mac or a Dell), you're likely not going to be able to get Apple's shell script sample to work.
    Apple's shell script requires that you compile the seconds.c, urlencode.c, and hmac-sha256.c source code files. While seconds.c and urlencode.c produce the same output (given the same input) on both a PPC Mac and an Intel Mac, hmac-sha256.c does not. I have looked at this two different ways (just by running the code and from within gdb) and I'm pretty satisfied that there is an endian issue within the code (the code favors a big-endian machine ... like the PowerPC ... over a little-endian machine ... like a CoreDuo Mac/Dell server).
    There is probably a straightforward fix, but I am not a sha encryption expert, so I will have to do my homework over the weekend. The fix would likely involve #ifdefing the code in the usual way. The only diffuculty is going to be in finding the dependency. If you're using the Java/Perl/Python stuff, you should be utterly safe (those languages work at a higher level of abstraction and take endianess into account).
    I hope this was helpful.

    Well, I keep learning new things.
    It looks like the SHA-256 algorithm itself thinks in a big-endian way.
    http://en.wikipedia.org/wiki/SHA-1
    I am not sure what the impact is on Apple's implementation ... cyrptography is not my thing, but I'm willing to learn.
    MacBook Pro   Mac OS X (10.4.8)   I lied. I'm running Leopard

  • IV and hmac from shared secret, and replay attacks.

    Hello all!
    I am working on a client server project where i use the diffi-hellman keyexchange.
    both server and client has the secret and can decrypt enc messages from eachother.
    Q1:Up to now i have only used a predifiened IV for the 3des cbc cipher. But I would like to generate a IV from the shared secret somhow. Which way is the most secure way to do that?
    the way things look now i enc/dec by my self whithout the cipheroutputstream, (got to much trouble whith the cipherbuffers) and just send it over by my self.
    I would like to use a SHA1 hmac and send that over whith the msg.
    Q2: I now use println for sending, is it ok to first send the enc msg, and then send the hmac after, from security point of view?
    Q3: how do i use my shared secre to calculate a sha1 hmac from the msg?
    Q4: how do i use a timestamp whith the above cipher and hmac in a secure way to prevent replay attacks?
    Sry for the many questions, I have tried for several days to figure some of this stuff out, any help/code is appreciated
    /Mike

    Bossk wrote:
    Thanks for your reply.
    I've read most (if not all) .net to java migration threads I could find. None helped me with my problem.
    If I understood your reply correct, there are some fundamental flaws in the .NET encrypt/decrypt routines:Yes but I am not aware of any in the code you are using.
    >
    - the AES blocksize is set to 256 but can only be 128 bitsYour .NET code is using Rijndael which does allow a block size of 256 but your Java code is using AES which does not allow a block size of 256. You need to get a Rijndael implementation from another provider. I suggest you look at BouncyCastle. They may also have an Rfc2898DeriveBytes port.
    - ECB mode is used. However, ECB does not use an IV, right? So the .NET classes must be ignoring this parameter.Yes. What I find interesting about the .NET crypt routines is that they (almost) never throw exceptions when illegal or inappropriate parameters are used.
    >
    I also have the PasswordDerivedBytes class from the thread you linked, when I try to decode using this code it still does not work:.NET class PasswordDerivedBytes is a mess but you actually need an implementation of RFC2898 some of which PasswordDerivedBytes implements. Check with BouncyCastle provider they may have an Rfc2898DeriveBytes class but if not then you need to implement the relevant part of RFC2898. The problem you will have is knowing which of the 5 RFC2898 key generation algorithms is actually uses with the .NET code.

  • HMAC-SHA1 ???

    Hello,
    I have to implement a key derivation using HMAC-SHA1.
    Does anybody know where I can find a java class for this
    algorithm?

    Thanks, but I cannot find an Implementation for HMAC/SHA1 in
    javax.crypto.Mac. I got an NoSuchAlgorithmException for every
    constellation of Mac.getInstance() I have tried.
    Mac mac = Mac.getInstance("HmacSHA");     
    mac.update(pkcs5Bytes);
    mac.update(salt);
    tmp = mac.doFinal();Algorithm HmacSHA not available
         at javax.crypto.Mac.getInstance(DashoA12275)

  • Projeto de Implementação Nota Fiscal Eletrônica de Serviços NFS-e

    Prezados,
    Alguém possui informações se há algum projeto ativo na SAP ou planos de projeto para implementação da nota fiscal de serviços eletrônica via web services?
    Caso negativo alguém está trabalhando em uma iniciativa própria?
    Atenciosamente,
    Fabio Purcino

    Fabio,
    SAP disponibiliza a NF-e serviços sómente para a cidade de São Paulo. Por favor, verifique a nota 981687 e os pre-requisitos que estão descrito nesta nota.
    Atenciosamente,
    Paulo

  • I want to implement thems functionality in  my swing application

    Hi All...
    I want to implement the themes object in my swing application,How ,where to start and move that functionality,If anybody use this functionality in your program experience can u share with me.
    Than to Advance
    ARjun...

    Hi Kuldeep Chitrakar
    I can do that in web intelligence. dont want that
    I am replicating some of the sample report of SQL Servers in BusinessObjects XI R3.1.
    One of the SQL Sever's report is of product catalogue type that gives complete information like name, category, description along with the products image etc... for each of the products.
    I am trying to replicate the above said SQL Server report in Business objects XI R3.1. I am facing problem in bringing the image in to my BO report. The image resides in a table and its datatype is of varbinary(max). I don't know the exact matching while creating an object in the uiverse designer.
    Here is the url link http://errorsbusinessobjectsxir3.blogspot.com/2010/10/business-objects-image-errors.html
    Regards
    Prasad

  • Training and Event Management Implementation based on competencies

    Dear Friends,
    My client is going ahead for Training and Event Managment Implementation. They have a basic requirement to start with and that is :
    1) They have done competency mapping for all its employees and they want that the competencies of each employees(along with the skill levels) to be recorded in the system and that has to be the starting point of using Training and Event Management module.
    2) They want, if the competencies can flow based on Job/ Position.
    3) Some identifier to the competencies, whther it has flowed from Appraisal or any other sources in the Final Training Needs.
    Kindly provide me help, as to how I will be able to achieve that and in what Infotypes the data pertaining to Training and Event Managment will be stored.
    If u all can kindly share with me the User Manuals and Configuration Docs of Training and Event Management, it will be of great help.
    Thank you all.

    Hi,
    Competencies can be stored as qualifications in PD and then by activation of PD PA intergration can be seen from pa30 infotype 24.
    Qualifications can be stored against a Job/Position and are called as the Requirements. They are seen as a separate Tab and to which ever position the person is linked to the corresponding qualifications of the position will appear in the requirements tab.
    You can maintain the proficiency and a note along with the qualification when assigned to a person.
    Also Appraisals can have qualifications in the template rather than criteria and criteria groups.
    Also after training is completed during the follow up we can create an appraisal and transfer the qualifications or simply transfer the qualifications to the employee.
    Regards,
    Divya

  • How can I implement a status bar at the bottom of a resizable application?

    Hello all,
    I am a JavaFx newbie and I am implementing an application (a Sokoban game), with a menu at the top of the frame and a gaming area covering the rest of the frame. To support the game, I have to load images at certain positions in the gaming area.
    The game also includes a level editor with another menubar and where images are set to other positions.
    I implemented this in another view, swiching from the game mode to the level editor mode and vice versa is just done by setting the other view visible. Up to now this works, here the important statements building these details:
    Group root = new Group();
    gameView = new Group(); // for gaming mode
    le_view = new Group()   // for level editor mode
    MenuBar gameMenubar = new MenuBar();
    Menu menuGame = new Menu(bundle.getString("MenuGame"));
    ... building the menu items and menues ...
    gameView.getChildren().add(gameMenubar);
    ImageView buildingView[][] = new ImageView[22][22];
    for (nCol = 0; nCol < 22; nCol++) {
        for (nRow = 0; nRow < 22; nRow++) {
            buildingView[nCol][nRow] = new ImageView();
            buildingView[nCol][nRow].setX(nCol * 26 + 5);
            buildingView[nCol][nRow].setY(nRow * 26 + 40);
            gameView.getChildren().add(buildingView[nCol][nRow]);
    gameView.setVisible(true);
    root.getChildren().add(gameView);
    ... same stuff to build the le_view ...
    le_View.setVisible(false);
    root.getChildren().add(le_View);
    Scene scene = new Scene(root, 800, 600, Color.CORNSILK); Now I want to introduce a status bar at the bottom of the frame, which of course has to follow the bottom of the frame, if it is resized. And of course the menu and the status bar should not grow vertically, if the height of the frame is increased.
    The implementation seems to be easy with StackPane for the frame and one BorderPane for each mode.
    For the first step I only tried implementing the game mode with only one BorderPane (just setting the menu, the gaming area and the status bar each into a HBox and setting these three HBoxes at the top, into the center and at the bottom). I also tried this via GridPane and via VBox; I always get any erroneous behaviour:
    Either the menubar is visible, but the menus do not pop up the menu items, or the anchor point of the menu and of gaming area are set 100 pixels left of the left frame border and move into the frame when the frame width is increased, or the menu is set 20 pixels below the top of the frame, or HBox with the menu grows when the frame height is increased, so that the anchor point of the gaming area moves down.
    Can you describe me a correct construction of such a frame? Thanks in advance.
    Best regards
    Gerhard

    Hello Gerhard,
    Glad the code helped, thanks for a fun layout exercise.
    For the draft code I just pulled an icon off the internet over a http connection.
    If you haven't done so already place any icons and graphics you need local to your project, so that resource lookups like:
    Image img = new Image("http://www.julepstudios.com/images/close-icon.png");become
    Image img = new Image("close-icon.png");then performance may improve.
    Another possible reason for your performance problem could be that when you use a vbox, the vbox content can overflow the area of the borderpane center and might be sitting on top of the menu pane, making you unable to click the menu (which is what happens to me when I try that with the draft program with the vbox wrapping mod, then resize the scene to make it smaller). This was a trick which caught me and the reason that I used a Group originally rather than a vbox. I found a vbox still works but you need to tweak things a bit. The trick I saw was that the order in which you add stuff to the borderpane is important. The borderpane acts like a stack where the last thing added floats over the top of everything else if you size the scene small enough. For your project you want the menu on top always, so it always needs to be the last thing added to the borderpane, but when you swap in the level pane for the game pane, then back out again, the game pane can end up on top of the menu which makes the menu seem like you can't click it (only when the scene is sized small enough). It was quite a subtle bug which took me a little while to work out what was happening. For me the solution was to add just one vbox to the center of the border, and then swap the game pane and the level editor in and out of the vbox, that way the center of the layout always stayed behind the menu bar and the status bar.
    I added some revisions to reflect the comments above and placed some comments in the code to note what was changed and why.
    public class SampleGameLayoutRevised extends Application {
      public static void main(String[] args) { Application.launch(args); }
      public void start(Stage stage) throws Exception {
        final BorderPane gameLayout = new BorderPane();
        final Group gameView = new Group();
        final MenuBar gameMenubar = new MenuBar();
        final Menu gameMenu = new Menu("Mode");
        final VBox centerView = new VBox();
        centerView.setStyle("-fx-background-color: darkgreen");  // we set a background color on the center view to check if it overwrites the game menu.
        MenuItem playGameMenu = new MenuItem("Play Game");
        MenuItem levelEditMenu = new MenuItem("Edit Levels");
        gameMenu.getItems().add(playGameMenu);
        gameMenu.getItems().add(levelEditMenu);
        gameMenubar.getMenus().add(gameMenu);
        final StackPane levelEditView = new StackPane();
        levelEditView.getChildren().add(new Text("Level Editor"));
        ImageView buildingView[][] = new ImageView[22][22];
        Image img = new Image("http://www.julepstudios.com/images/close-icon.png");  // use of http here is just for example, instead use an image resource from your project files.
        for (int nCol = 0; nCol < 22; nCol++) {
          for (int nRow = 0; nRow < 22; nRow++) {
            ImageView imgView = new ImageView(img);
            imgView.setScaleX(0.5);
            imgView.setScaleY(0.5);
            buildingView[nCol][nRow] = imgView;
            buildingView[nCol][nRow].setX(nCol * 20 + 5);
            buildingView[nCol][nRow].setY(nRow * 20 + 40);
            gameView.getChildren().add(buildingView[nCol][nRow]);
        final VBox statusBar = new VBox();
        final Text statusText = new Text("Playing Game");
        statusBar.getChildren().add(statusText);
        statusBar.setStyle("-fx-background-color: cornsilk"); // we set a background color on the status bar,
                                                              // because we can't rely on the scene background color
                                                              // because, if the scene is sized small, the status bar will start to overlay the game view
                                                              // and if we don't explicitly set the statusBar background the center view will start
                                                              // to bleed through the transparent background of the statusBar.
        gameLayout.setCenter(centerView); // we add the centerview first and we never change it, instead we put it's changeable contents in a vbox and change out the vbox content.
        gameLayout.setBottom(statusBar);
        gameLayout.setTop(gameMenubar);   // note the game layout is the last thing added to the borderpane so it will always stay on top if the border pane is resized.
        playGameMenu.setOnAction(new EventHandler<ActionEvent>() {
          public void handle(ActionEvent event) {
            centerView.getChildren().clear();  // here we perform a centerview vbox content swap.
            centerView.getChildren().add(gameView);
            statusText.setText("Playing Game");
        levelEditMenu.setOnAction(new EventHandler<ActionEvent>() {
          public void handle(ActionEvent event) {
            centerView.getChildren().clear();  // here we perform a centerview vbox content swap.
            centerView.getChildren().add(levelEditView);
            statusText.setText("Editing Level");
        playGameMenu.fire();
        Scene scene = new Scene(gameLayout, 800, 600, Color.CORNSILK);
        stage.setScene(scene);
        stage.show();
    }Other than that I am not sure of a reason for the slowdown you are seeing. In my experience JavaFX has been quick and responsive for the tasks I have been using it for. Admittedly, I just use if for a bunch of small trial projects, but I've never seen it unresponsive for a minute.
    - John

  • Error while activating the Implementation class of a BADI ?

    Hello,
    I am trying to activate a BADIi but its implementation class(ZCL_IM_DSD_ADD_CUST_IN_DNL) is not getting activated and giving the following object error on activation.
    CPUB     ZCL_IM_DSD_ADD_CUST_IN_DNL
    and it says that  "INCLUDE report "ZCL_IM_DSD_ADD_CUST_IN_DNL====CL" not found , where "DSD_ADD_CUST_IN_DNL" is the Impl. name of the definition "/DSD/ME_BAPI"  implementing the interface "/DSD/IF_EX_ME_BAPI".
    what am i missing here. Big time help will be extremely appreciated ..
    Thanks a ton.

    Hi,
    I had a quick qn,
    Normally, the implementation name should start with Z. Can you create using the name 'DSD_ADD_CUST_IN_DNL' ? or are you using any access key (SSCR)?
    For the infm, I have just tried to create one Z  implementation in my system and it works fine. Could you please delete the current implementation and try it once again ?
    Regards,
    Selva K.

  • Weaknesses I've come across in the Oracle XML/XSL implementation

    Weaknesses I've come across in the Oracle XML/XSL implementation
    NOTE: I think Oracle is a fantastic database and the XML implementation is lovely to use - also I know these are not limited to XE and also that some are fixed in 11g enterprise however I'm not sure if all are so I am posting here in the hope that Oracle will include fixes for all if any have been missed
    1. getclobval() returns a spurious carriage return on end of the value returned
    2. extract does not handle mixed content tags well (for example it simply discards tags that only have whitespace between them
    3. XSL: using a xsl:number level="multiple" with anything beyond a simple count= xpath value crashes the database completely
    4. XSL: insists on pretty printing output XML which is extremely odd behaviour and causes problems when dealing with mixed content

    Another weakness I've seen is with the appendchildxml function and mixed content xml - it appears to likewise pretty print XML causing the injection of carriage returns and whitespace into mixed content nodes

  • Implementing the Enterprise Support in Solution Manager

    Hi Experts,
    Can anybody tell me what are the pre requisites to implement Enterprise support in solution manager?
    Also let me know what are steps involved in implementing the enterprise support.
    Thanks in Advance
    Hari

    Hello Hari,
    In order to implement Enterprise Support your organization should registered as a Value Added Reseller(VAR) with SAP. You can get all the required documentation under https://websmp104.sap-ag.de/solutionmanager --> Information for VARs, ASPs and AHPs which is in the left hand side of the page. However, you need to have a S-user ID of the VAR.
    The following are the steps need to perform in implementing the Enterprise Support firmly known as Service Desk for VARs.
    1. SAP Solution Manager basic settings (IMG)
      a) Initial Configuration Part I
      b) Maintain Profile Parameters
      c) Maintain Logical Systems
      d) Maintain SAP Customer Numbers
      e) Initial Configuration Part II
         1) Activate BC Set
             a) Activate Service Desk BC Set
             b) Activate Issue Monitoring BC set
             c) Set-up Maintainance optimizer
             d) Change online Documentation Settings
             e) Activate Solution Manager Services
             f) Activate integration with change request Managemnt
             g) Define service desk connection in Solution Manager
       2)Get components for SAP Service Market place
            a) Get SAP Components
       3) Get Service Desk Screen Profile
           a)generate Business Partener Screen
       4)Copy By price list
           a)activate Service Desk BC Set
           b)Activate Issue Monitoring BC set
           c)Set-up Maintainance optimizer
          f) Business Add-In for RFC Connections with several SAP customers
          g) Business Add-In for RFC Connection of Several SAP Cust. no.
          h) Set-Up SAP Support Connection for Customers
          i) Assign S-user for SAP Support Portal functionality
          j) Schedule Background Jobs
          k) Set-Up System Landscape
          l) Create Key Users
          m) Create Message Processor
    2. Multiple SAP Customer Numbers
          a) Business Add-In for RFC Connections with several SAP customer numbers
          b) Set-Up SAP Support Connection for Customers
    3. Data transfer from SAP
          a) Data Transfer from SAP
    4. Create u201COrganizationu201D Business Partner
    5. Service Provider function (IMG)
          a) Business Add-In for RFC Connections with several SAP customer numbers
          b) Business Add-In for Text Authorization Check
          c) Activate BC Set for Service Provider
          d) Activate Text Types
          e) Adjust Service Desk Roles for Service Provider Menu
    6. Service Provider: Value-Added Reseller (VAR)
          a) Business Add-In to Process Actions (Post-Processing Framework)
         b) Activate BC Sets for Configuration
         c) Create Hierarchy and Product Category
         d) Set-Up Subcategories
         e) Create Business Partner as Person Automatically
         f) Set-Up Automatic Confirmation of Messages
        g) Maintain Business Partner Call Times
        h) Set-Up Incident Management Work Center
    7. Work Center (Web UI)
        a) Activate Solution Manager Services
        b) Assign Work Center Roles to Users
    Hope it helps.
    Regards,
    Satish.

  • How to find out the user exit is implemented

    Hi All,
    Kindly let me know the process to be followed to find out the User exit is implemented in SAP system.
    I have seen many senriors suggestions for some treads to check if there is any Exit is implemented in the process when the system is behaving differently rather standard.
    Is it the only way with help of ABAP'er we can find out or the functional consultant also can find out through some procedure?
    I tied in google for this doubt, but i could not get the relavant answer.Pleaea execuse me if this already answered.
    Thanks,

    Hi Krishna/TW,
    Thank you for your immediate replies. Sorry i think i have not explained correctly my requirment.
    Let me explain my requirement once again.Let us say Comapny has implemented one Exit in the project, now i want to find out what exactly the Exit was implemented.
    Example: In STO process user is able to increase the  qty in delivery. As per the client requriement system should not allow.
    This is not possible in standard to control even after maintainig  check over delivery field in 0VLP.
    For this comapny has already implemented one enahnceament.
    User Exit : USER EXIT_READ_DOCUMENT
    Program: MV50AFZ1
    like this when any one joined in the project we do not know what are all the Exits are implemented in the SAP system where we are working.
    So if i want to find out if there is any Exit or enhancement implemented, what is the process to find out?
    I hope now  am clear with my requirement.
    Thanks in advance.

Maybe you are looking for

  • Open a file in a jar file

    Hi, I've an applet (class Cncj.class) that opens a file ex1.txt in the directory examples: getCodeBase().toString() + "examples/ex1.txt"; All works ok if I run the applet without compress but if I make a jar file: jar cvf Cncj.class examples a except

  • I used to single click to open mail & now I have to double click.  I have not changed preferences.  Any suggestions?

    I have always single clicked to open mail.  Now I have to double click.  I have not touched preferences or made changes.  Any suggestions?

  • Phone shutting down at random times

    I have been experiencing iPhone shutting down on its own at random times. During times when I am using just the iPod function to listen to music, other times when I am on a call. When I play music the iphone screen actually goes completely black with

  • Configuring my Airport Express when at a hotel

    Currently, I use an Airport Extreme router in my house, with an Airport Express in my bedroom configured to 'extend a wireless network' which is working out great. I'll be out of town soon and I'd like to bring along the Express to use in a hotel roo

  • Mail won't receive IMAP emails since ML upgrade

    I upgraded to Mountain Lion this morning and havne't been able to receive any emails from my IMAP account since. I can send emails fine. I can receive all emails on my iPhone, just not my MBP. I'm hesitant to remove the account and reinstall it becau