Skip to content

Now supporting Infor LN, M3, CloudSuite, and Lawson. 6,180 tests passing. View on GitHub

Enterprise-grade security

Defense-in-depth controls protect every operation, whether triggered by a user, an API client, or an AI agent.

4-Tier Approval Model

Every operation is classified by risk. Controls escalate from auto-approved reads to dual-approval production changes.

T1

Assessment

Auto-approved, read-only

Extraction, discovery, analysis

T2

Development

Logged, reversible

Field mapping, transforms, config

T3

Staging

1 approver required

Data load, integration test

T4

Production

2 approvers, change window

Cutover, transport import

Operation tier examples

Forensic extraction (read-only)
Tier 1Auto-approved
Field mapping configuration
Tier 2Logged, reversible
Data load to staging
Tier 31 approver
Production cutover / transport import
Tier 42 approvers + change window

Input Validation

Every request is validated against strict JSON schemas with SAP-specific rules for client numbers, transport formats, and RFC function names.

Audit Logging

Immutable audit trail with full request context and SHA-256 hash chain for tamper detection. Exportable to SIEM systems via JSON or syslog.

CSRF Protection

Automatic token management with configurable rotation. Tokens are cached for 25 minutes and refresh transparently on 403 responses.

Transport Safety

All artifacts follow the safety pipeline: Generate, Quality Check, Human Review, Transport Import. Rollback via transport reversal. No direct production writes.

API Key Authentication

Keys hashed with bcrypt, configurable scopes (read, write, admin), rotatable without downtime. Failed attempts are rate-limited and logged.

XSUAA Authentication

Native SAP Authorization and Trust Management integration with JWT validation, scope-based access control, and automatic token refresh.