SAP Single Sign-OnWhere is this place located?

Log in to follow, share, and participate in this community.


SAP Single Sign-On (SAP SSO) on SAP Community Network. Find helpful user resources including blogs, discussions, guides, videos, and more so you can learn and share on how to centralize and simplify the way users log on to systems and applications.

Space editors:

Regine Schimmer, Martina Kirschenmann


Kristian Lehment, Patrick Hildenbrand, Matthias Kaempfer, Julius von dem Bussche

Formatted Text

Explore SAP Single Sign-On on


SSO Get Started.png

Single Sign-On in 2 Minutes

Key Topics

Get an Overview

Product Overview

ROI Calculator



Single Sign-On with Kerberos

Single Sign-On with Certificates

Single Sign-On with SAML 2.0



Release 1.0, Release 2.0



Release 1.0, Release 2.0

Installation and Upgrade Information, Product Availability Matrix, Sizing Guide, Central Note



Community Discussions and Blogs


Stay up-to-date

Subscribe to the Newsletter


Provide Product Feedback

SAP Idea Place


* Requires a product license. To get a test license, please contact your account executive.

12-month Leaderboard

Featured Content

Simple and Secure User Authentication with SAP Single Sign-On 2.0

Read the new SAP Insider article by Christian Cohrs and Martina Kirschenmann and get a full introduction into the latest support packages for SAP Single Sign-On 2.0. Learn how the innovative new features enhance the user experience, strengthen security, and streamline administration. July 27, 2015

Replay of ASUG Webinar: New Features in SAP Single Sign-On 2.0 SP05 and the SAP Application Servers

Watch the replay of the recent ASUG webinar with Christian Cohrs, SAP’s Product Owner for the SAP Single Sign-On product, and get the inside scoop on the new features of SAP Single Sign-On 2.0 SP05 and the enhancements in platform security. June 18, 2015

Stronger Security for Your Business Data at Risk

Check out Dimitar Mihaylov and Donka Dimitrova’s blog and learn about risk-based authentication using two-factor authentication and risk-based authorizations for protecting corporate resources. Various scenarios are described in detail and several scripts offered that you can use as examples. June 3, 2015

Recent Activity

Refresh this widget
Load more items

Formatted Text

Advertising Widget

Advertising Widget

Advertising Widget

Advertising Widget