In the following, a trusted relationship will be created as an example between systems C00 (client system) and S00 (server system).
The example is shown for the simple case of the "Single Sign-On" procedure. This means that the user
for whom the trusted relationship is created exists in both systems (C00 and S00) with the same client and the same user ID (as dialog user) (for example HUGO under client 100).
In the server system (S00), the user (HUGO in client 100) must have the authorization object S_RFCACL_DEV with the following settings:
Proceed as follows to maintain the trusted system:
You can maintain this type of destination from within the maintenance transaction for "Trusted/Trusting" systems for each system by clicking the pushbutton "Destination Maintenance".
The destinations for Trusting Systems are created automatically. These destinations are used in the transaction for Trusting Systems ( SMT2).
You should prevent changes being made to the destination by selecting the checkbox "Destination not changeable" under "Attributes".
You will find details on the individual fields through the field help.
Make sure that the destinations retain consistent data - that is, neither the target system ID, the system number, nor the destination name may be changed.
In a trusted system, you can display a list of all trusting systems.
When you create the list
of trusting systems, a logon as well as an authorization check for the current user and client will
be performed. This is similar to transaction SM51 when you perform a logon to a server by pressing the
pushutton Remote Login. So that you can execute a logon under
another user or a client, you need to maintain a respective RFC destionation using the trusted option for this purpose. The transaction SMT2 performs a trusted login for all current users and clients.
In the transaction for trusting systems (SMT2), click the name of a trusting system in order to display the application server of this ABAP system.
The names of the application servers of a trusting system contain the suffix _TRUSTED (that is, in the form <hostname> <br>_< systemid>_<systemnumber>_TRUSTED).
By double-clicking the name of an application server, you receive a dialog box with an input field for a transaction code and an option for execution in the same or a new mode.
If you have created a trusted system without the specification of logon data (user name and password), you need to check the destination by loging on to the trusted system using the "Remote Login" button.
Alternatively, you can perform an authorization check for the trusted server through the respective option in the Test menu.
If your logon attempt is not successful, you will receive the following message:
No authorization for logging on to trusted system (Error code = <0|1|2|3>).
The error code has the following meaning:
In the trusting system, you can check whether correct logon data was preset for the trusted system by performing the function module AUTHORITY_CHECK_TRUSTED_SYSTEM.
If all the checks have run successfully and you still do not have access to the trusting system, refresh the corresponding database buffer by choosing the following menu path in the user maintenance transaction: Utilities → Mass Changes → Delete All User Buffers.
If you wish to find the cause of the error, activate the trace function in the destinatin maintenance
function SM59, reproduce the error, and read the information for error recognition. Also read the information on recognizing erros CALL_FUNCTION_SINGLE_LOGIN_REJ in the
short dump of the calling system.
As of Release 4.0b, profile parameters S_RFCACL are not a standard part of the SAP_ALL authorization profile - for security reasons.