General, Integrations, and Security tabs
-
In the General tab, you can assign a name, and a description to the system.
-
In the Integrations tab, you can add available integration within Neptune DXP - Open Edition.
-
In the Security tab, you make web-related security settings.
General tab
General
- Name
-
Enter a name for your system.
- Description
-
Enter a short description of your system.
In the upper left of the user interface, the description is shown next to the name of the system. - Role
-
Assign one of the following roles to your system:
-
Local
-
Development
-
Integration
-
Test
-
Quality Assurance
-
Staging
-
Production
-
Sandbox
-
- HTTP Port
-
HTTP port to access the cockpit
- Session Timeout (in minutes)
-
Enter the time span in minutes for a session timeout. If the user does not refresh or request a page within this time span, the session ends and the user has to log in again.
- Delete cookie when browser session ends (i.e. all browser windows are closed)
-
Select or clear, as necessary.
- HTTP Response Timeout (in seconds)
-
Enter a timeout period in seconds that defines for how long a session remains active after the last refresh or page request.
- Background Job Interval (in seconds)
-
Enter a value in seconds for background job intervals.
- Number of Server Worker Processes
-
Enter a number for the maximum number of jobs that are processed simultaneously in the background.
- Disable update database from repository
-
Select the checkbox to disable updating of a database from a repository in a development package. The option Update database from repository in the Settings section of the GIT tab in the Development Package tool is disabled after selection. You must restart the server for this settings change to take effect.
Federated Sign-Out
If you have configured authentication of Neptune DXP - Open Edition with an external identity provider, for example Microsoft Entra ID, with federated sign-out, you can choose that when you sign out from the Cockpit and/or a launchpad, you sign out simultaneously from the identity provider.
Logging
- Log all requests to stdout (standard output) and logs/requests
-
Select or clear, as necessary.
- Disable audit log
-
Select or clear, as necessary. Disabling the audit log is an optional step, as the data generated from the audit log can accumulate to a substantial size over time.
Language Server
Select to enable auto-completion features when you use the App Editor.
This is hidden when you run Neptune DXP - Open Edition on Neptune DXP Cloud. |
Login
- Disable Local authentication
-
Select to disable the local authentication option from the login options. For example, if you want to use JSON Web Token (JWT) authentication as default, then disable local authentication.
- Default login url
-
To redirect unauthenticated users to a login page different from the standard one, enter the URL here. This is typically used to redirect users from the base domain
https://<domain>.com/
of your system to the standard launchpad for external users. Entering/launchpad/<launchpad_name>
will redirect users tohttps://<domain>.com/launchpad/<launchpad_name>
for login. - Disable "Change Password" option in launchpads
-
To prevent users from changing their password in a launchpad, select to remove the Change Password option in the user menu of launchpads.
The selection removes the Change Password option from all launchpads created in the system. - Automatically Import User Groups When Signing in from External Systems, e.g. Microsoft Entra ID, OpenID Connect, SAML
-
You can select the checkbox to automatically import user groups configured within your identity provider, when signing in to Neptune DXP - Open Edition through authentication methods from external systems, for example, Microsoft Entra ID, OpenID Connect, SAML. The checkbox is not selected by default.
This setting is not applied to the LDAP protocol as an authentication method to sign in to Neptune DXP - Open Edition. LDAP auto-imports user groups when you sign in from an external system.
Error Notifications
Select the system components you want to receive error notifications from. Enter email addresses to receive these notifications.
SSL Settings
Enable SSL by specifying the port and adding a certificate. You can generate one in Certificates.
Integrations tab
Firebase - push notifications
Firebase Cloud Messaging (FCM) is used to deliver push notifications to Android devices, Google Chrome and Mozilla Firefox. Use your FCM credentials to set up web push notifications for your site. The API keys that you enter here are stored securely and are used by the web push notifications service to connect to the FCM server. The Message Sender ID (project number) that you enter here is used by the Android SDK and JS SDK for Google
Fiori Remote System
When this setting is enabled, Neptune DXP - Open Edition can act as a proxy for a Neptune DXP - SAP Edition system on specific paths. Turn on the switch and select the pre-configured remote system from Fiori System.
Requests for data at the relative paths /sap/
and /neptune/
are proxied to
the selected remote Neptune DXP - SAP Edition system. Neptune DXP - Open Edition
automatically appends authentication for the remote system when authentication
is configured for the remote system.
Security tab
In the Security tab, you perform the following tasks:
- Disable Frame Guard (X-Frame-Options)
-
Select or clear, as necessary. Allows your instance to be embedded within frames or iframes on other websites.
- Accessed using HTTPS (will enable secure cookies). Remember to set 'X-Forwarded-Proto': 'https' if you are using a reverse proxy
-
Select or clear, as necessary.
- Only allow API, OData, or Remote System endpoints when sending requests through proxy
-
To restrict URL endpoints sent through the Neptune proxy, only endpoints defined in an API (in the API Designer), OData (in the OData Source tool, or a remote system (in the Remote Systems_ tool) are permitted when sending requests through the proxy. The route
/proxy/:url
only accepts endpoints listed in the proxy whitelist, and requests to/proxy/:url/:apiID
and/proxy/remote/:url/:systemID
only accept endpoints defined within the API, the OData source, or the remote system associated with the correspondingapiID
orsystemID
. If theurl
parameter does not match a URL defined in the API, the OData source, or the remote system, the request will be blocked.This also avoids manual entry of endpoints to Proxy whitelist, when not required. The setting can, however, be used in combination with entries to the Proxy whitelist.
- Cookie attribute SameSite value
-
Select the cookie type.
The SameSite attribute in cookies determines when and how they should be sent with cross-origin requests. It has three values:
-
Strict: Only sent in first-party contexts, providing high security.
-
Lax: Sent with top-level navigations, but not with cross-origin sub-requests, balancing security and usability.
-
None: Sent with both top-level navigations and cross-origin sub-requests, but requires Secure and HTTPS, used judiciously for specific cases like Single Sign-On
-
In the following sections you can enter URLs to whitelists for Proxy, CORS, and CSP.