Interfaces (Authentication)
The Authentication Interfaces view shows detailed information about specific interfaces that use particular authentication methods. This view appears when you drill down from the Authentication Overview by clicking on authentication counts or using authentication filters.
Navigate to Reporting → Authentication → Interfaces to access detailed interface listings filtered by authentication method.
Came from Overview?
This view shows interfaces for the authentication method you selected. Use filters to refine results or return to Authentication Overview for the authentication distribution summary.
Interfaces Overview
Authentication Interfaces displays a detailed table of interfaces using specific authentication methods, allowing you to analyze which interfaces implement particular authentication types and their configurations.

Authentication Interfaces table showing detailed interface list with Interface names, Types and specific Authentication implementations
What you see:
Interface details table with interface names, types, and authentication specifications
Authentication filter to focus on specific authentication methods
Data Source filter to analyze specific integration platforms
Environment filter to switch between Production, Test, Development views
Sortable columns for organizing interface information
Using Interface Information
Interface table provides detailed information about authentication usage at the interface level:
Column | Description | Purpose |
|---|---|---|
Interface | Interface name (clickable blue links) | Navigate to detailed interface analysis |
Type | Integration platform type (SAP_IS_CI, SAP_IDOC, SAP_PO) | Understand source platform |
Authentications | Specific authentication method details | See exact authentication configuration |

How to use the interface data:
Interface names (blue links):
Click "WHINT WIC Message Mapping To Excel API" → Navigate to detailed interface documentation
Click "Handle Errors - Extend With Exception Subprocess - Error End Event" → View specific interface configuration
Click any interface name to access comprehensive interface details
Type classifications examples:
SAP_IS_CI → SAP Integration Suite (Cloud Integration) interfaces
SAP_IDOC → SAP ABAP Backend IDoc interfaces
SAP_PO → SAP Process Orchestration interfaces
Adapter specifications examples:
ProcessDirect - XI → Internal processing with XI protocol
IDOC → SAP IDoc adapter implementation
HTTP_AAE - HTTP_AAE → HTTP adapter configuration
O365_File - SFTP → Office 365 file transfer via SFTP
Filtering and Analysis
Filter options help you focus on specific authentication methods and environments:
Authentication Filter:
Select specific authentication types to see only interfaces using that method
Useful for security analysis when planning authentication upgrades or updates
Compare usage patterns across different authentication technologies
Data Source Filter:
Filter by integration platform (SAP Cloud Integration, SAP PO, etc.)
Analyze authentication usage patterns within specific technology stacks
Support platform-specific modernization planning
Environment Filter:
Switch between Production, Test, Development environments
Compare authentication usage across different landscape tiers
Validate deployment consistency across environments
Analysis workflow:
Use filters to focus on specific authentication types or platforms
Review interface names to understand business context
Click interface links to investigate specific implementations
Analyze authentication patterns to identify standardization opportunities
Authentication Interface (Selected)
When you click any blue interface name, you'll see the Interface Details view with comprehensive information about that specific interface.

Detailed interface view showing Basic Data, Reporting & Metadata, Tags, Objects, Properties and Description for the WHINT WIC Message Mapping To Excel API interface
What you see after clicking an interface:
Interface name header with the specific interface identifier
Basic Data section showing Name, Type, Data Source, Sender, and Receiver
Reporting & Metadata section with Adapter, Authentication, Last Traffic, Complexity and Timing details
Tags section for business object classifications
Objects section for associated business objects
Properties section for additional metadata
Description section for interface documentation
Key information displayed:
Authentication type (e.g. RoleBased) confirming the authentication method
Adapter type (e.g. HTTPS) showing the technical implementation
Changed showing recent updates (e.g. 2024-06-26 (S0015449940))
Complexity score indicating interface complexity (e.g. 1_low)
Created timestamp showing interface creation date
System context via Sender and Receiver information
Use the interface details to:
Verify authentication implementation and configuration specifics
Assess interface complexity through complexity scoring and adapter data
Understand business context via sender/receiver and system mappings
Track interface lifecycle using created/changed timestamps
Document interface specifications using the description field
Authentication Usage Insights
Interface-level analysis helps with:
Security compliance:
Identify all interfaces using weak or deprecated authentication methods (No Fit classification)
Assess security compliance by reviewing specific authentication implementations
Plan security upgrade sequencing based on interface criticality
Standardization opportunities:
Find interfaces using non-standard authentication configurations
Identify opportunities to consolidate similar authentication implementations
Support authentication strategy enforcement across development teams
Impact assessment:
Understand which business processes depend on specific authentication technologies
Assess potential impact of authentication changes or deprecations
Plan testing scope for authentication-related updates
Navigation
Return to overview:
Navigate back to Authentication → Overview for authentication method distribution summary
Use browser back button to return to previous authentication analysis
Access other reporting sections via left navigation menu
Deep dive into interfaces:
Click blue interface names to access detailed interface documentation
Use interface-level data for troubleshooting and optimization
Cross-reference with other KPIs (Complexity, Frequency, Robustness)
Related Documentation
For comprehensive authentication and interface analysis:
Onboarding Guide - 2.3.2 Authentication - Authentication strategy configuration
Last Updated: August 25, 2025