What is the S4Kit Platform?
The S4Kit Platform is the backend infrastructure that powers the SDK. It acts as a secure proxy between your application and SAP S/4HANA systems, handling:- Authentication: Manages SAP credentials securely
- Authorization: Controls access with granular permissions
- Rate Limiting: Protects SAP systems from overload
- Request Logging: Provides audit trails and monitoring
- Multi-tenancy: Isolates data per organization
Architecture
Core Concepts
Organizations
Organizations are the top-level container for all your data. Each organization has:- Team members with roles (owner, admin, developer)
- SAP systems and instances
- API keys and permissions
- Request logs
Systems
A System represents an SAP landscape (e.g., “Production ERP”, “S/4HANA Cloud”). Each system can have multiple instances.Instances
Instances are specific environments within a system:- Sandbox - Testing with mock data
- Development - Dev environment
- Quality - QA testing
- Pre-production - Staging
- Production - Live system
Services
OData services exposed by SAP (e.g.,API_BUSINESS_PARTNER, API_SALES_ORDER_SRV). The platform includes a catalog of 500+ predefined SAP APIs.
API Keys
Secure tokens that authenticate SDK requests. Each key has:- Configurable permissions per entity/operation
- Rate limits (per-minute and per-day)
- Access to specific instances
Request Flow
- SDK Request: Your app calls
client.A_BusinessPartner.list() - API Key Validation: Platform validates the API key
- Permission Check: Verifies the key can list BusinessPartner
- Rate Limit Check: Ensures limits aren’t exceeded
- Proxy Request: Platform authenticates to SAP and forwards request
- Response Processing: Strips OData metadata, handles errors
- Logging: Records the request for audit
- Return: SDK receives clean JSON response
Dashboard Features
The web dashboard atapp.s4kit.com provides:
Systems
Register and manage SAP systems
Instances
Configure environment endpoints
Services
Browse and bind OData services
API Keys
Generate and manage API keys
Logs
View request history and errors
Team
Manage team members and roles
Security
Credential Storage
SAP credentials are encrypted using libsodium before storage. The encryption key is never stored with the encrypted data.API Key Security
- Keys are hashed before storage (only prefix and last 4 chars visible)
- Keys can be revoked instantly
- All requests are logged with key identifiers
Network Security
- All traffic is encrypted with TLS 1.3
- SAP connections use your configured auth method
- No SAP credentials are ever exposed to the SDK