Skip to content
Draft
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
84 commits
Select commit Hold shift + click to select a range
0c4ce18
new structure
Sep 15, 2025
28b426b
restructured, auth guide in progress
Sep 18, 2025
4d9d55d
ias cli testing
Sep 19, 2025
6cc3dc2
safepoint
Sep 25, 2025
81e81f3
UI IAS flow
Sep 25, 2025
722354a
ias auth beta
Sep 26, 2025
abaa8d4
custom auth
Sep 26, 2025
2907a71
restructed chapters
Sep 30, 2025
411e9d8
next step
Oct 9, 2025
8362811
finalized AMS role assignment
Oct 16, 2025
1613da9
finalized AMS
Oct 17, 2025
a53d04a
cap user propagation
Oct 17, 2025
c86ed58
user propagation
Oct 21, 2025
61c5142
finalized cap users
Oct 21, 2025
5d04142
restructured images
Oct 22, 2025
ff238d4
next step
Nov 4, 2025
9aea779
continued
Nov 7, 2025
f6e8f75
external authentication
Nov 11, 2025
bfa12d9
remote service part2
Nov 21, 2025
13d9669
cleaned assets
Nov 25, 2025
d1e2302
fxed typo menu
Nov 25, 2025
188666e
added diagrams remote auth
Nov 25, 2025
1638c21
fixed typos
Nov 25, 2025
8d1ab43
before ai proposals
Nov 25, 2025
6a273f8
minor improvements
Nov 25, 2025
8dfe991
minor changes
Nov 25, 2025
30bfe76
diagrams
Nov 25, 2025
252021f
fixed AMS aspect
Nov 26, 2025
a31cba0
autorizations
Nov 26, 2025
0a6f78f
authoriaztions restructured
Nov 27, 2025
2cbdf03
fixed links
Nov 27, 2025
ad90ea5
fixed links
Nov 27, 2025
e1f0972
fixed links
Nov 27, 2025
c3ddcc3
fixed links
Nov 27, 2025
d671694
chapter headers and java menu
Nov 28, 2025
a7babc3
refactored java security and authorization guide
Nov 28, 2025
b067cc2
fixed links
Nov 28, 2025
cb1b81a
btp reuse internal
Nov 28, 2025
f3efb63
links
Nov 28, 2025
1628cb2
added some external links
Nov 28, 2025
fa385f8
unified diagrams
Dec 1, 2025
309ce6e
improved diagrams
Dec 1, 2025
9e4aa8c
removed switch users from java guide
Dec 1, 2025
880592b
minor changes cap-users
Dec 1, 2025
f5ccc91
deleted swp file
Dec 1, 2025
0d31442
Update guides/security/overview.md
BraunMatthias Dec 8, 2025
408e2e2
Update guides/security/overview.md
BraunMatthias Dec 8, 2025
10bb913
Update guides/security/overview.md
BraunMatthias Dec 8, 2025
135857a
Update guides/security/authentication.md
BraunMatthias Dec 8, 2025
f7b2590
Update guides/security/authentication.md
BraunMatthias Dec 8, 2025
36bb1a7
Update guides/security/authentication.md
BraunMatthias Dec 8, 2025
20c8dc8
Update guides/security/authentication.md
BraunMatthias Dec 8, 2025
a47893c
Update guides/security/authentication.md
BraunMatthias Dec 8, 2025
02f28b0
Update guides/security/authentication.md
BraunMatthias Dec 8, 2025
74ee732
Update guides/security/authentication.md
BraunMatthias Dec 8, 2025
ebd98ee
Update guides/security/authentication.md
BraunMatthias Dec 8, 2025
34c58ba
Update guides/security/authentication.md
BraunMatthias Dec 8, 2025
03f49fb
Update guides/security/authentication.md
BraunMatthias Dec 8, 2025
5c8fcce
Update guides/security/authentication.md
BraunMatthias Dec 8, 2025
8ac1467
Update guides/security/authentication.md
BraunMatthias Dec 8, 2025
7e3fcfe
minor changes
Dec 8, 2025
615aa3f
prepare xsuaa auth
Dec 8, 2025
6b1b21e
xsuaa auth
Dec 8, 2025
9f91ec5
xsuaa continued
Dec 9, 2025
b77e87e
xsuaa authentication
Dec 9, 2025
c6632cf
harmonized titles
Dec 9, 2025
4cc24e4
minor
Dec 10, 2025
f24c530
wip: xsuaa node
patricebender Dec 11, 2025
9fba623
some adjustements to mock auth in node
patricebender Dec 11, 2025
2b7b744
add learnings after cli testing with xsuaa for node
patricebender Dec 11, 2025
dc6d970
rm unused file
patricebender Dec 11, 2025
b847c82
format
patricebender Dec 11, 2025
7166e1a
add TODO
patricebender Dec 11, 2025
f9e42a2
more infos in UI testing guide
patricebender Dec 11, 2025
b4cada0
Adding node specific Snippets & Sections (CAP User) (#2264)
PDT42 Dec 12, 2025
8e08443
DB support
Dec 12, 2025
fc41f60
Sync changes from 'revised-security-guide-ams-nodejs' into revised-se…
PDT42 Dec 12, 2025
eaca12d
fix: missing closing tag
PDT42 Dec 12, 2025
13518fc
fix: smaller messes
PDT42 Dec 12, 2025
48e2099
fix: add section on validating node config
PDT42 Dec 12, 2025
98ee89c
feat: add node specific graphics
PDT42 Dec 12, 2025
2f192e3
feat: integrate node specific graphic and update examples
PDT42 Dec 12, 2025
ce81253
fix: graphic format
PDT42 Dec 12, 2025
30cd275
fix: small messes
PDT42 Dec 12, 2025
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
3 changes: 1 addition & 2 deletions about/features.md
Original file line number Diff line number Diff line change
Expand Up @@ -114,8 +114,7 @@ Following is an index of the features currently covered by CAP, with status and
| [Arrayed Elements](../cds/cdl#arrayed-types) | <X/> | <X/> | <X/> |
| [Streaming & Media Types](../guides/providing-services#serving-media-data) | <X/> | <X/> | <X/> |
| [Conflict Detection through _ETags_](../guides/providing-services#etag) | <X/> | <X/> | <X/> |
| [Authentication via JWT](../guides/security/authorization#prerequisite-authentication) | <Na/> | <X/> | <X/> |
| [Basic Authentication](../guides/security/authorization#prerequisite-authentication) | <Na/> | <X/> | <X/> |
| [Authentication](../guides/security/authentication) | <X/> | <X/> | <X/> |


<br>
Expand Down
2 changes: 1 addition & 1 deletion get-started/troubleshooting.md
Original file line number Diff line number Diff line change
Expand Up @@ -252,7 +252,7 @@ A new option `privilegedUser()` can be leveraged when [defining](../java/event-h

| | Explanation |
| --- | ---- |
| _Root Cause_ | You've [explicitly configured a mock](../java/security#explicitly-defined-mock-users) user with a name that is already used by a [preconfigured mock user](../java/security#preconfigured-mock-users).
| _Root Cause_ | You've [explicitly configured a mock](../java/security#custom-mock-users) user with a name that is already used by a [preconfigured mock user](../java/security#preconfigured-mock-users).
| _Solution_ | Rename the mock user and build your project again.

### Why do I get an "Error on server start"?
Expand Down
2 changes: 1 addition & 1 deletion guides/deployment/microservices.md
Original file line number Diff line number Diff line change
Expand Up @@ -370,7 +370,7 @@ Note that we use the *--ws-pack* option for some modules. It's important for nod

### Authentication

Add [security configuration](../security/authorization#xsuaa-configuration) using the command:
Add [security configuration](../security/authentication#authentication) using the command:
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Bit of an awkward URL with the stuttering. As "#authentication" is just the h1 heading in the linked guide, why use it at all?

Suggested change
Add [security configuration](../security/authentication#authentication) using the command:
Add [security configuration](../security/authentication) using the command:

However, I wouldn't hide this link in the prose text but rather add a {.learn-more} one, e.g. after the cds add command:

[Learn more about Authentication in CAP](../security/authentication){.learn-more}

This makes it clearer to the user what you're trying to cross-reference.


```shell
cds add xsuaa --for production
Expand Down
2 changes: 1 addition & 1 deletion guides/deployment/to-cf.md
Original file line number Diff line number Diff line change
Expand Up @@ -159,7 +159,7 @@ cds add xsuaa
```

::: tip This will also generate an `xs-security.json` file
The roles/scopes are derived from authorization-related annotations in your CDS models. Ensure to rerun `cds compile --to xsuaa`, as documented in the [_Authorization_ guide](/guides/security/authorization#xsuaa-configuration) whenever there are changes to these annotations.
The roles/scopes are derived from authorization-related annotations in your CDS models. Ensure to rerun `cds compile --to xsuaa`, as documented in the [security guide](/guides/security/cap-users#xsuaa-roles) whenever there are changes to these annotations.
:::

[Learn more about SAP Authorization and Trust Management/XSUAA.](https://discovery-center.cloud.sap/serviceCatalog/authorization-and-trust-management-service?region=all){.learn-more}
Expand Down
2 changes: 1 addition & 1 deletion guides/providing-services.md
Original file line number Diff line number Diff line change
Expand Up @@ -994,7 +994,7 @@ The remaining cases that need custom handlers, reduce to real custom logic, spec

- Domain-specific programmatic [Validations](#input-validation)
- Augmenting result sets, for example to add computed fields for frontends
- Programmatic [Authorization Enforcements](/guides/security/authorization#enforcement)
- Programmatic [Authorization Enforcements](/guides/security/cap-users#developing-with-users)
- Triggering follow-up actions, for example calling other services or emitting outbound events in response to inbound events
- And more... In general, all the things not (yet) covered by generic handlers

Expand Down
4 changes: 2 additions & 2 deletions guides/security/aspects.md
Original file line number Diff line number Diff line change
Expand Up @@ -118,7 +118,7 @@ CAP doesn't require any specific authentication strategy, but it provides out of
On configured authentication, *all CAP endpoints are authenticated by default*.

::: warning
❗ **CAP applications need to ensure that an appropriate [authentication method](/guides/security/authorization#prerequisite-authentication) is configured**.
❗ **CAP applications need to ensure that an appropriate [authentication](./authentication) is configured**.
It's highly recommended to establish integration tests to safeguard a valid configuration.
:::

Expand Down Expand Up @@ -196,7 +196,7 @@ To verify CAP authorizations in your model, it's recommended to use [CDS lint ru

The rules prepared by application developers are applied to business users according to grants given by the subscribers user administrator, that is, they're applied tenant-specific.

CAP authorizations can be defined dependently from [user claims](/guides/security/authorization#user-claims) such as [XSUAA scopes or attributes](https://help.sap.com/docs/btp/sap-business-technology-platform/application-security-descriptor-configuration-syntax)
CAP authorizations can be defined dependently from [user claims](/guides/security/cap-users#claims) such as [XSUAA scopes or attributes](https://help.sap.com/docs/btp/sap-business-technology-platform/application-security-descriptor-configuration-syntax)
that are deployed by application developers and granted by the user administrator of the subscriber.
Hence, CAP provides a seamless integration of central identity service without technical lock-in.

Expand Down
Binary file added guides/security/assets/add-api.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file added guides/security/assets/ams-assignment.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file added guides/security/assets/ams-base-policies.jpg
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file added guides/security/assets/ams-custom-policy.jpg
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file added guides/security/assets/ams-dark.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Loading