Repository Specific Guides
...
Link Enterprise for M365
Installation and Base Configur...
WebSocket RFC (Cloud Connections)
7min
cloud configuration the cloud configuration allows on premise solutions to communicate with internet based gimmal link enterprise servers over https/ssl import certificate to allow ssl handshake between sap and a hosted link enterprise environment we require importing gimmal link enterprise public certificate into sap's trust manager in sap start the trust manager ( strust ) import the gimmal link enterprise public certificate into ssl client (standard) (this will enable sap to identify gimmal certificate during tls handshake) enter change mode (ctrl + f1) click ssl client standard click import and select the gimmal link enterprise public certificate provided click add to certificate list and save export certificates the gimmal link enterprise middleware requires an export of the sap public root certificate for ssl client and ssl server this is to identify the sap system connecting into the hosted environment in sap start the trust manager (strust) export the root certificate from ssl client (standard) and ssl server (standard) click ssl server standard and double click the subject it will be appear in the certificate section scroll down and export (provided below is a sample image) of export icon click ssl server client and double click the subject scroll down and export the certificate send both certificates to your gimmal representative setup rfc destination to enable a endpoint for the sap to connect into the middleware we require an rfc destination to be created visit transaction sm59 click create and give the destination an appopriate name an example is z\<type> \<name> ensure the connection type is type 'w' under technical settings we need to prove the target system settings for host name enter the provided hostname given to you by your gimmal representative for port enter the provided port given to you by your gimmal representative click the logon & security tab and enter language as en set the explicit client to by hostname set the authentication method to by x 509 certificate under security options set to ssl client (standard) click save provide the rfc destination to your gimmal representative firewall the firewall needs to be configured to allow https traffic through to the gimmal link enterprise server to find or define these ports inbound rule in sap, review the value for icm/server port x (where x=0,1,2,3 ,n) that is used for https this port will need to be opened for inbound traffic to the sap system outbound rule review the section setup rfc destination for the port that has been configured in sm59 for the websocket rfc communication to the gimmal link enterprise server this port will be given to you by the gimmal representative changing profile parameters to allow quick setup of websocket connetivity we can dynamically change the parameters to quickly confirm connectivity work with your sap basis to configure the parameters to hold enter transacation rz11 type in rfc/websocket/external active change the value from 2 to 1 (this will allow us to bypass uconn and enable logon, even if ucon is not activated and configured) confirm ucon/websocketrfc/active is set to 1