Skip to main content
Skip table of contents

Interfaces (Authentication)

The Authentication Interfaces view shows detailed information about specific interfaces that use particular authentication methods. This view appears when you drill down from the Authentication Overview by clicking on authentication counts or using authentication filters.

Navigate to ReportingAuthenticationInterfaces to access detailed interface listings filtered by authentication method.

Came from Overview?

This view shows interfaces for the authentication method you selected. Use filters to refine results or return to Authentication Overview for the authentication distribution summary.


Interfaces Overview

Authentication Interfaces displays a detailed table of interfaces using specific authentication methods, allowing you to analyze which interfaces implement particular authentication types and their configurations.

image-20250825-124521.png

Authentication Interfaces table showing detailed interface list with Interface names, Types and specific Authentication implementations

What you see:

  • Interface details table with interface names, types, and authentication specifications

  • Authentication filter to focus on specific authentication methods

  • Data Source filter to analyze specific integration platforms

  • Environment filter to switch between Production, Test, Development views

  • Sortable columns for organizing interface information


Using Interface Information

Interface table provides detailed information about authentication usage at the interface level:

Column

Description

Purpose

Interface

Interface name (clickable blue links)

Navigate to detailed interface analysis

Type

Integration platform type (SAP_IS_CI, SAP_IDOC, SAP_PO)

Understand source platform

Authentications

Specific authentication method details

See exact authentication configuration

image-20250825-125158.png

How to use the interface data:

Interface names (blue links):

  • Click "WHINT WIC Message Mapping To Excel API" → Navigate to detailed interface documentation

  • Click "Handle Errors - Extend With Exception Subprocess - Error End Event" → View specific interface configuration

  • Click any interface name to access comprehensive interface details

Type classifications examples:

  • SAP_IS_CI → SAP Integration Suite (Cloud Integration) interfaces

  • SAP_IDOC → SAP ABAP Backend IDoc interfaces

  • SAP_PO → SAP Process Orchestration interfaces

Adapter specifications examples:

  • ProcessDirect - XI → Internal processing with XI protocol

  • IDOC → SAP IDoc adapter implementation

  • HTTP_AAE - HTTP_AAE → HTTP adapter configuration

  • O365_File - SFTP → Office 365 file transfer via SFTP


Filtering and Analysis

Filter options help you focus on specific authentication methods and environments:

Authentication Filter:

  • Select specific authentication types to see only interfaces using that method

  • Useful for security analysis when planning authentication upgrades or updates

  • Compare usage patterns across different authentication technologies

Data Source Filter:

  • Filter by integration platform (SAP Cloud Integration, SAP PO, etc.)

  • Analyze authentication usage patterns within specific technology stacks

  • Support platform-specific modernization planning

Environment Filter:

  • Switch between Production, Test, Development environments

  • Compare authentication usage across different landscape tiers

  • Validate deployment consistency across environments

Analysis workflow:

  1. Use filters to focus on specific authentication types or platforms

  2. Review interface names to understand business context

  3. Click interface links to investigate specific implementations

  4. Analyze authentication patterns to identify standardization opportunities


Authentication Interface (Selected)

When you click any blue interface name, you'll see the Interface Details view with comprehensive information about that specific interface.

image-20250825-124436.png

Detailed interface view showing Basic Data, Reporting & Metadata, Tags, Objects, Properties and Description for the WHINT WIC Message Mapping To Excel API interface

What you see after clicking an interface:

  • Interface name header with the specific interface identifier

  • Basic Data section showing Name, Type, Data Source, Sender, and Receiver

  • Reporting & Metadata section with Adapter, Authentication, Last Traffic, Complexity and Timing details

  • Tags section for business object classifications

  • Objects section for associated business objects

  • Properties section for additional metadata

  • Description section for interface documentation

Key information displayed:

  • Authentication type (e.g. RoleBased) confirming the authentication method

  • Adapter type (e.g. HTTPS) showing the technical implementation

  • Changed showing recent updates (e.g. 2024-06-26 (S0015449940))

  • Complexity score indicating interface complexity (e.g. 1_low)

  • Created timestamp showing interface creation date

  • System context via Sender and Receiver information

Use the interface details to:

  • Verify authentication implementation and configuration specifics

  • Assess interface complexity through complexity scoring and adapter data

  • Understand business context via sender/receiver and system mappings

  • Track interface lifecycle using created/changed timestamps

  • Document interface specifications using the description field


Authentication Usage Insights

Interface-level analysis helps with:

Security compliance:

  • Identify all interfaces using weak or deprecated authentication methods (No Fit classification)

  • Assess security compliance by reviewing specific authentication implementations

  • Plan security upgrade sequencing based on interface criticality

Standardization opportunities:

  • Find interfaces using non-standard authentication configurations

  • Identify opportunities to consolidate similar authentication implementations

  • Support authentication strategy enforcement across development teams

Impact assessment:

  • Understand which business processes depend on specific authentication technologies

  • Assess potential impact of authentication changes or deprecations

  • Plan testing scope for authentication-related updates


Navigation

Return to overview:

  • Navigate back to AuthenticationOverview for authentication method distribution summary

  • Use browser back button to return to previous authentication analysis

  • Access other reporting sections via left navigation menu

Deep dive into interfaces:

  • Click blue interface names to access detailed interface documentation

  • Use interface-level data for troubleshooting and optimization

  • Cross-reference with other KPIs (Complexity, Frequency, Robustness)


Related Documentation

For comprehensive authentication and interface analysis:


Last Updated: August 25, 2025


 

JavaScript errors detected

Please note, these errors can depend on your browser setup.

If this problem persists, please contact our support.