When a call to a yunIO REST service is made, there are several ways a request and response can travel through networks from the caller to the SAP system and back.
This article provides examples of networking scenarios between a service caller and SAP.

Same Network #

If the service caller, yunIO and SAP are all part of the same network, the path for request and reponse is as follows:

  1. The caller sends the request directly to the yunIO server via HTTP or HTTPS.
  2. The yunIO server communicates with SAP. The response is sent back to the caller.
    Same Network

Examples:

  • Caller, yunIO and SAP run on-premises.
  • Caller, yunIO and SAP run in the same cloud environment.

Different Networks #

If the service caller is located on another network than yunIO and the SAP system, the two networks can be connected via the internet.

Examples:

  • Caller is located in the cloud, yunIO and SAP run on-premises.
  • Caller is located in the cloud, yunIO and SAP are located at a hosting provider.
  • Caller is located in one cloud environment, yunIO and SAP are located in a different cloud environment.
  • Caller is located on-premises, yunIO and SAP are located at a hosting provider.
  • Caller is located on-premises, yunIO and SAP are located in the cloud.
  • Caller is located in US branch office, yunIO and SAP are located in European headquarters.

Depending on the location of the caller, it is possible to restrict requests to the yunIO server to only trusted origins through network traffic rules. If that is not possible, requests to the yunIO server can be made from untrusted sources. This can be a security risk, even if authentication is enabled, e.g., denial-of-service attacks.

Direct Connection #

A direct connection can be established, if firewall rules allow incoming requests from the caller’s network to the yunIO/SAP network. HTTPS should always be enabled for direct connections to protect the confidentiality and integrity of the communication. For callers in cloud environments, it might not be possible to restrict requests to the yunIO server to trusted origins through firewall rules.

  1. The caller sends the request directly to the yunIO server via HTTPS.
  2. The yunIO server communicates with SAP. The response is sent back to the caller.
    Different Network

Azure Relay #

The yunIO service can be exposed to the caller through Azure Relay. For callers in cloud environments it might not be possible to restrict requests to the yunIO server to trusted origins through Azure Relay rules. In this scenario it is not necessary to change firewall rules of the yunIO/SAP network to allow incoming requests from other networks. Only outgoing requests from the yunIO/SAP network to Azure Relay must be allowed.

  1. The yunIO server connects from the yunIO/SAP network to Azure Relay and establishes a secure tunnel.
  2. a) The caller makes a request to Azure Relay.
    b) The request is forwarded through the secure tunnel to the yunIO server.
  3. The yunIO server communicates with SAP. The response is sent back to the caller.
    Add parameters

Azure VPN #

The caller and yunIO/SAP can be connected through a secure tunnel and joined to the same VNet in Azure. The yunIO server can be protected from requests from untrusted sources by restricting access to the VNet in Azure. In this scenario it is not necessary to change firewall rules of the yunIO/SAP network to allow incoming requests from other networks. Only outgoing requests from the yunIO/SAP network to Azure must be allowed.

  1. The VPN client connects from yunIO/SAP network to Azure, establishes the secure tunnel.
  2. a) The caller makes a request to the yunIO server via VNet.
    b) The request is forwarded through the secure tunnel to the yunIO/SAP network.
    c) The request is forwarded to the yunIO server.
  3. The yunIO server communicates with SAP. The response is sent back to the caller.
    Add parameters

Microsoft On-Premises Data Gateway #

If the caller is one of the cloud services that is supported by the on-premises data gateway, requests to the yunIO server can be forwarded to the yunIO server through that gateway. The yunIO server can be protected from requests from untrusted sources using connection roles of the on-premises data gateway. Make sure that the gateway and power platform region settings are identical, see Check if the gateway is in the right region.

In this scenario it is not necessary to change firewall rules of the yunIO/SAP network to allow incoming requests from other networks. Only outgoing requests from the yunIO/SAP network to Azure must be allowed.

  1. The on-premises data gateway connects from yunIO/SAP network to Azure, establishes the secure tunnel.
  2. a) The caller makes a request to the yunIO server via gateway resource.
    b) The request is forwarded through the secure tunnel to the on-premises data gateway.
    c) The request is forwarded to the yunIO server.
  3. The yunIO server communicates with SAP. The response is sent back to the caller.
    Add parameters