
I can recommend this blog post if you want to learn more about the User Authentication and Authorization in SAP BTP. Through this decoupling, any identity provider (IdP) can be connected to the XSUAA – and, therefore, to SAP BTO.

It is worth highlighting that the UAA service only issues the token, but it does not authenticate the user. If the user is not signed in, it will (1) request the authentication from the IdP, (2) request the JWT token from the XSUAA, and (3) attach this token to all following requests of this user. In the case of SAP CP Cloud Foundry and SAP HANA XSA, we call this service also XSUAA.Ī typical business application would use the approuter as the central point of entry, which checks if the user is signed in. In Cloud Foundry, this token is issued by the User Account and Authentication (UAA) server. I don’t want to go into detail here, so I only try to give a short definition:Ī JWT token is a manipulation-proof, signed JSON object that contains standardized properties like user information and access rights. JSON web tokens and the other concepts I’ll explain in this paragraph are standardized and exist far beyond the “SAP world” and even outside of the “Cloud Foundry universe.” JWT (pronounced: jot) tokens are the de-facto standard for authentication in modern web applications. Watch the summary video on YouTube What is a JWT Token
#Postman hats how to#
If you are already familiar with the terms in bold and, just want to learn how to use Postman to fetch JWT tokens from the XSUAA server, feel free to jump directly to the hands-on. The next few paragraphs will explain each component and provide more background links.

I know I just threw a bunch of buzzwords at you, and there’s a lot to unpack. And if you use the proper tooling ( Postman), you won’t even have to bite the bullet for testing. If you use the right framework ( CAP), you won’t have to deal with mock or production authorization. And on top of all of that, it makes development and testing harder as you either have to mock the authentication or simulate a real user log on.īut it doesn’t have to be hard: If you use the right backing services ( XSUAA), you won’t have to deal with the authentication. There’s a lot of boring stuff you need to know, you see little to no “real” process in your app even when you spend a fair amount of time on it. Everyone agrees it’s necessary, but no one really likes to do it. To most developers, web security is a rather unpopular topic. You also won’t have to intercept and expose JWT (pronounced “jot”) tokens from the approuter any longer. This simplifies API testing as you’ll no longer need to redirect incoming traffic via the approuter. In this post, I will show a trick which you can use to fetch JSON Web Tokens from the User Account and Authentication service with Postman. In a title, if your post contains spoilers, begin your title with. Piracy is a permanent ban, no warnings.Īll posts and comments, in the end, come down to moderator discretion. Posts promoting or facilitating piracy in any way will be removed. Lore / Dev bashing with no addition to discussion will be removed. Clickbait or extremely vaguely-titled posts will be removed. Twitch / Stream / Channel promotion not allowed. More than 1 in 10 of your posts or comments being self-promotional is spamming. Always follow Reddit guidelines for self-promotion when sharing your own content. Unnecessary flaming, personal attacks, etc will be removed. Memes, macros and low effort content are not permitted as posts.

Intentional spoilers will result in a ban. Titles and comments containing spoilers may be removed without notice. Use and abuse spoiler tags when applicable. Posts must be directly related to Fallout 4. Your account must be older than 1 day, to prevent spam.
