Stefan Hupp
December 2025
Security
Basis
SAP profile parameters are the backbone of system security. A single misconfigured parameter can open a door that no firewall rule set will close. Yet the relevance of parameters differs significantly depending on the deployment model: what is indispensable on-premise often does not even exist in the cloud – and S/4HANA brings its own requirements. This guide presents the most important security parameters compared across all three environments.
Sound familiar?
- Your SAP parameter settings still date from the initial installation over 10 years ago
- The last audit flagged “insecure default parameters”
- You are planning the switch to S/4HANA or BTP and do not know which parameters remain relevant
- On-prem and cloud run in parallel – the security settings are not harmonised
60%
of SAP systems run with security-critical default parameters (SAP internal analysis 2025)
35+
security-relevant profile parameters that should be checked on every SAP system
3 Worlds
On-Premise, Cloud (BTP/RISE) and S/4HANA each require their own parameter strategies
1. Login & Authentication
Login parameters are the first line of defence in every SAP environment. However, the environments differ significantly here:
On-Premise (ECC / S/4HANA On-Prem)
On the classic ABAP stack, you control every aspect yourself:
- login/min_password_lng = 12 – Minimum password length. The SAP default is 8; we recommend 12 for production systems.
- login/fails_to_session_end = 3 – After 3 failed attempts the session is terminated.
- login/fails_to_user_lock = 5 – After 5 failed attempts the user is locked. Prevents brute-force attacks.
- login/password_expiration_time = 90 – Password expires after 90 days. Combined with complexity rules, a good compromise.
- login/min_password_specials = 1 – At least one special character. Together with login/min_password_digits and login/min_password_uppercase, this produces solid complexity.
- login/no_automatic_user_sapstar = 1 – Prevents automatic creation of the SAP* user with the default password. One of the most frequently overlooked parameters.
S/4HANA (On-Prem & Private Cloud)
S/4HANA uses the same ABAP parameters but brings additional aspects:
- login/password_compliance_to_current_policy = 1 – Forces existing passwords to be checked against the current policy at the next logon. Important after a migration.
- icf/set_HTTPonly_flag_on_cookies = 3 – Sets the HttpOnly flag for all cookies. Particularly relevant in S/4HANA with the Fiori interface, as significantly more HTTP-based communication takes place.
- login/accept_sso2_ticket = 0 – Disables SSO2 tickets when you use SAML or X.509 instead. The recommended approach in S/4HANA with the Identity Authentication Service (IAS).
Cloud (BTP / RISE with SAP)
In the cloud world, responsibility shifts:
- Password policies are configured via SAP Cloud Identity Services (IAS), not via profile parameters. You define minimum length, complexity and expiry in the IAS administration console.
- Multi-factor authentication (MFA) is natively available in the cloud and should be mandatory for all administrative access.
- SAML 2.0 / OpenID Connect – Cloud systems use federated authentication by default. The classic login/* parameters do not exist here.
Practical tip
For hybrid landscapes (On-Prem + Cloud), we recommend setting up the SAP Identity Authentication Service as the central instance for all systems. This ensures uniform password policies and MFA – regardless of the deployment model.
2. Communication & Encryption
Unencrypted communication is no longer an option in 2026 – regardless of the environment.
On-Premise
- snc/enable = 1 – Activates Secure Network Communication for RFC and dialog connections. Without SNC, passwords are transmitted in plain text.
- snc/data_protection/max = 3 – Maximum protection level (Privacy): encryption + integrity + authentication.
- ssl/ciphersuites – Defines the permitted TLS cipher suites. Consistently disable outdated suites (TLS 1.0/1.1).
- icm/HTTPS/verify_client = 1 – Enforces client certificate verification for HTTPS connections to the ICM.
- SAPDBHOST / rdisp/msserv_internal – Separate database and message server communication strictly from the user network.
S/4HANA
- All on-premise parameters continue to apply.
- icm/HTTP/redirect_0 = PREFIX=/, FROM=*, FROMPROT=HTTP, TOPROT=HTTPS – Enforces HTTPS redirect for all HTTP requests. Essential when using Fiori.
- is/HTTP/show_detailed_errors = FALSE – Prevents detailed error messages in the browser. Otherwise, attackers can derive system details from stack traces.
Cloud (BTP)
- TLS 1.2+ is enforced by default – you cannot disable it (which is a good thing).
- Mutual TLS (mTLS) can be configured for service-to-service communication via the BTP Service Binding.
- Destinations in BTP should always be configured with OAuth2 or client certificates – never with Basic Authentication and stored passwords.
3. Gateway & RFC Security
The SAP Gateway is a preferred attack target. How it is secured differs by environment:
On-Premise
- gw/sec_info = /usr/sap/<SID>/SYS/profile/secinfo – Defines which external programmes may call RFC functions. An empty or missing file = an open door.
- gw/reg_info = /usr/sap/<SID>/SYS/profile/reginfo – Controls the registration of external server programmes at the gateway.
- gw/reg_no_conn_info = 255 – Limits connection information. Reduces the attack surface during gateway enumeration.
- gw/acl_mode = 1 – Activates strict ACL mode. Without this parameter, secinfo/reginfo are only treated as “recommendations”.
- rfc/reject_expired_passwd = 1 – Rejects RFC connections with expired passwords. Prevents old service accounts with long-expired credentials from still functioning.
S/4HANA
- All on-premise parameters apply identically.
- Additionally: In S/4HANA with embedded Fiori, the gateway service (OData) is used more intensively. Check the ICF services under /sap/opu/odata/ – only required services should be active.
Cloud (BTP)
- The classic SAP Gateway does not exist in BTP. Instead, communication is handled via the Cloud Connector as a reverse-invoke proxy.
- In the Cloud Connector, you explicitly configure which on-premise resources (host + port + path) are accessible – a significantly more granular approach than the classic secinfo/reginfo files.
- Principle: Only release the minimum necessary resources. Each URL and each RFC function module must be individually enabled.
4. Audit & Logging
Without logging there is no traceability – and no passed audit.
On-Premise & S/4HANA
- rsau/enable = 1 – Activates the Security Audit Log (SAL). Incomprehensibly still deactivated in many systems.
- rsau/max_diskspace/local = 2000000 – 2 GB of storage for audit logs. The default value is often too small for production systems.
- rsau/integrity = 1 – Integrity protection for audit logs. Prevents retrospective manipulation of the log files.
- rec/client – Defines the clients for which table logging is active. Mandatory for production clients.
- rslg/collect_daemon/host – Central syslog host. Forward audit data to a SIEM system for centralised evaluation.
Cloud (BTP)
- Audit logging is available as the SAP Audit Log Service and must be activated per subaccount.
- Configuration is done via the BTP Cockpit API, not via profile parameters.
- Log Retention: 90 days by default. For compliance requirements, check whether archiving to SAP Data Custodian or an external SIEM is necessary.
5. System Integrity & Hardening
These parameters protect the core system integrity:
On-Premise & S/4HANA
- auth/rfc_authority_check = 6 – Strictest level of RFC authority check. Prevents RFC function modules from being called without an authorisation check.
- login/system_client – Defines the default client. Ensure that no production client is configured as the default client to avoid accidental logons.
- rdisp/gui_auto_logout = 900 – Automatic logout after 15 minutes of inactivity. Prevents unattended sessions.
- login/disable_cpic = 1 – Disables CPIC logons when not explicitly needed.
- system/secure_communication = ON – Enforces secure communication between SAP systems. Essential in S/4HANA landscapes with multiple connected systems.
S/4HANA-specific
- abap/heap_area_dia = 4000000000 – In S/4HANA with the HANA database, larger memory areas are needed. At the same time, limits protect against memory-based DoS attacks.
- icm/HTTP/logging_0 – HTTP access logging for the ICM. Critical for traceability of user access with Fiori front ends.
- is/HTTP/show_detailed_errors = FALSE – No stack trace in the browser. Particularly important for publicly accessible Fiori Launchpads.
Cloud (BTP)
- System integrity is primarily SAP’s responsibility (Shared Responsibility Model).
- Your responsibility: Secure configuration of custom applications, destinations, service keys and role collections.
- BTP Security Recommendations: SAP maintains a current list with over 80 concrete recommendations for BTP security – review them regularly.
6. Comparison Overview: Parameters by Environment
| Area |
On-Premise |
S/4HANA |
Cloud (BTP) |
| Password Policy |
login/* parameters |
login/* parameters + IAS |
IAS / IdP only |
| MFA |
External (SNC / TOTP) |
IAS native |
IAS native |
| Encryption |
SNC + SSL manual |
SNC + HTTPS redirect |
TLS 1.2+ enforced |
| Gateway |
secinfo / reginfo |
secinfo / reginfo + ICF |
Cloud Connector |
| Audit Log |
rsau/* parameters |
rsau/* + HANA Audit |
Audit Log Service |
| Responsibility |
100% Customer |
100% Customer (On-Prem) / Shared (RISE) |
Shared Responsibility |
7. Checklist: Parameter Review in 5 Steps
1
Stocktake
Export all security-relevant parameters (RZ11 / RSPARAM). Compare against SAP recommendations and industry security baselines.
2
Risk Assessment
Prioritise parameters by criticality: Red (change immediately), Amber (short-term), Green (optimisation). Focus on login, gateway and audit parameters.
3
Test in Q-System
Test all changes in the quality system first. login/* changes in particular can lock users out if not introduced carefully.
4
Production Rollout
Transfer parameters to the production system via the change management process. Plan restart-required parameters (e.g. gw/*) with a downtime window.
5
Monitoring & Review
Quarterly review of parameters. New SAP Security Notes may require additional parameter adjustments. Set up automated drift detection.
Conclusion
Profile parameters are not “set and forget”. In a world where on-prem, S/4HANA and cloud coexist, each environment needs its own parameter strategy – but a uniform security level. The good news: most parameter changes do not require a budget, but knowledge and a structured review process.
If you need a systematic parameter review for your SAP landscape – whether on-prem, cloud or hybrid – get in touch.
Request parameter review →
Stefan Hupp
Managing Director
20+ years of experience in SAP Security, Basis and Authorisations. Pragmatic solutions for complex system landscapes – documented, audit-ready and AI-powered.
Related Articles
Security
February 2026 · Stefan Hupp
SAP Security Hardening: The 10 Most Important Measures
Practical guide with 10 concrete measures for your SAP system security.
Read more →
Security
Basis
December 2025 · Stefan Hupp
S/4HANA Database Security: Securing the HANA DB
8 concrete measures for encryption, access control and auditing of your HANA DB.
Read more →
Need support with this topic?
We help you with implementation – from analysis to go-live.
Get in touch
← All articles