After installing K2 connect a few manual configuration steps are required before you can start creating and deploying Service Objects. Follow these step-by-step instructions:
Follow these configuration steps after a K2 connect standalone installation:
Type a name for the Destination and enter the SAP connection string. It should be in the following format:
ASHOST=<Server IP> SYSNR=00 CLIENT=800 LANG=EN USER=<User ID> PASSWD=<PWD>
Make sure User ID and Password are uppercase.
Follow these configuration steps after a K2 connect distributed installation:
Type a name for the Destination and enter the SAP connection string. It should be in the following format:
ASHOST=<Server IP> SYSNR=00 CLIENT=800 LANG=EN USER=<User ID> PASSWD=<PWD>
Make sure User ID and Password are uppercase.
It is possible to have a single K2 connect installation for multiple SAP instances. However this requires some manual configuration. It is important to know that the out-of-the-box integration via Visual Studio and the K2 connect Administration tool is making use of one Service Instance. That Service Instance can point to any single destination (but only one). It is determined by the default destination at the time the Service Instance is refreshed. It will also create a Security Label which corresponds to the Destination.
You can manually register another K2 connect Service Instance which points to the same K2 connect Service Object Repository and set the security provider to a different label, if that label has already been created.
When you publish new objects to the K2 connect Server that is meant for the manual Service Instance you will need to manually refresh it to describe the new objects. This manual refresh is not required for the out-of-the-box Service Instance.
To use K2 connect with multiple SAP instances, there are two main steps required. The first is a once off configuration to link K2 connect to a SAP instance. This is required for each SAP instance that you would like to use K2 connect with. The second is part of the process to set up and configure K2 connect Service Objects. These Service Objects are required for K2 SmartObjects to interact with relevant SAP data. The sections below describes these required steps.
The table below illustrates steps to configure K2 connect to link with one or more SAP instances. These steps are configured once for each additional SAP instance.
Step | Effort per Number of SAP Instance | ||
---|---|---|---|
1 | 2 | ||
1 | Configure a K2 connect destination. | Required | Required |
2a | Register Service Instance. See Register Service Instance for more details. | Required | Required: See Adding Additional SAP instance |
2b | Specify typemapping field value on Service Instance registration screen. | None | Required: See Adding Additional SAP instance |
The table below illustrates steps to add a new Service Object.
Step | Effort per Number of SAP Instance | ||
---|---|---|---|
1 | 2 | ||
1 | Create Service Object using SAP BAPI from respective SAP instance. | Required | Required* |
2 | Deploy Service Object. | Required | Required |
3 | Refresh service instance to retrieve deployed Service Object. | None | Refresh Service Instance# |
If you are modifying an existing Service Object, you would perform similar steps to the above. The additional step required if you have more than one SAP instance is step 3.
* As K2 connect service instance refers to the same Service Object Repository, it is recommended to provide an identifiable Service Object name when creating new service object. For example: a prefix naming convention – [SAPInstanceName]-[ServiceObjectName]
# Upon successful deployment of a new or modified Service Object, use the SmartObject Service Tester Tool to refresh all additional K2 connect service instances.
Follow these steps to register an additional service instance. This is a once off configuration for each additional SAP instance.
<object type="SourceCode.SmartObjects.Services.ServiceSDK.Objects.TypeMappings"><typemappings><mapping name="system.datetime" sotype="datetime" /><mapping name="system.uint64" sotype="number" /><mapping name="system.byte" sotype="number" /><mapping name="system.decimal" sotype="decimal" /><mapping name="system.int64" sotype="number" /><mapping name="system.sbyte" sotype="number" /><mapping name="system.uint32" sotype="number" /><mapping name="system.uint16" sotype="number" /><mapping name="system.string" sotype="text" /> <mapping name="system.boolean" sotype="yesno" /><mapping name="system.single" sotype="decimal" /><mapping name="system.int32" sotype="number" /><mapping name="system.double" sotype="decimal" /></typemappings></object>
Single Sign On (SSO) refers to a single user identity that is shared across multiple systems requiring a user to only have to sign on to one system one time. This authentication method is used when one system needs to manage a user’s identity across other systems. For example, when using K2 connect the user must be able to access both K2 connect and the SAP back-end for BAPI calls.
In practice there are several methods for implementing SSO. In the K2 connect context, the K2 service passes a connection string to the SAP back-end that contains the user name and password which has rights to the BAPIs. The advantage of SSO for the K2 user or developer is that once they have logged in, a second login is not required.
When a K2 user logs on to a K2 application, e.g. K2 Workspace and K2 Designer for Visual Studio, the user establishes a primary login from the K2 perspective.
The user's primary login is derived from the default security Label which may be the Active Directory account, SQLUM or an custom user manager. Secondary login credentials are then cached and passed to the secondary or back-end systems. The secondary credentials are linked to the primary credentials and are used to authenticate the user on the secondary or back-end systems
The advantage of SSO for the K2 User or Developer is that once they have logged in, a second login would not be required.
The secondary set of user credentials are cached against a security label. The various security labels, including the security label are available from within K2 Workspace > User Settings > Single Sign On.
This Step is a requirement and is only performed automatically by the system once a Service Object has been published to a Service Object repository that is associated with a destination.
A security label is required for each SAP Destination. Security Labels are added automatically by the system when a Service Object is published to the Service Object repository and associated with a SAP Instance / Destination.
The following Knowledge Base Article is available for reference: Cache Credentials. If the link does not open, copy and paste the following URL into your browser http://help.k2.com/KB000360.aspx.
Follow these steps to add individual users to the security label that has the same name as a K2 connect service instance:
Video | Links | Learn | Support |
No videos found for this article K2 on YouTube
No Additional links found for this article
No self-learning content for this article Try some scenarios...
No relevant support links available for this article
|