Home kellton

Main navigation

  • Services
    • Digital Business Services
      • AI Services
        • Generative Al Services
        • Agentic Al & Automation
        • Traditional Al Solutions
        • Al Engineering & Platforms
        • Al Governance & Risk
        • Data Engineering for Al
      • Digital Experience
        • Product Strategy & Consulting
        • Product Design
        • Product Management
      • Product Engineering
        • Digital Application Development
        • Mobile Engineering
        • IoT & Wearables Solutions
        • Quality Engineering
      • Data & Analytics
        • Data Consulting
        • Data Engineering
        • Data Migration & Modernization
        • Analytics Services
        • Integration & API
      • Cloud Engineering
        • Cloud Consulting
        • Cloud Migration
        • Cloud Managed Services
        • DevSecOps
      • NextGen Services
        • Blockchain
        • Web3
        • Metaverse
        • Digital Signage Solutions
    • SAP Hide
      • ServiceNow
        • AI Solutions
        • Implementation Services
        • Optimization Services
        • Consulting Services
      • SAP
        • S/4HANA Implementations
        • SAP AMS Support
        • SAP Automation
        • SAP Security & GRC
        • SAP Value Added Solutions
        • Other SAP Implementations
      • View All Services
  • Platforms & Products
    • Structi.ai
    • Phoenix.ai
    • Hooper
    • Optima
    • tHRive
    • Tasks.io
    • Audit.io
    • Kai SDLC 360
    • Our Data Accelerators
      • Digital DataTwin
      • SmartScope
      • DataLift
      • SchemaLift
      • Reconcile360
    • View All Products
  • Industries
    • Fintech, Banking, Financial Services & Insurance
    • Retail, E-Commerce & Distribution
    • Pharma, Healthcare & Life Sciences
    • Non-Profit, Government & Education
    • Travel, Logistics & Hospitality
    • HiTech, SaaS, ISV & Communications
    • Manufacturing
    • Oil,Gas & Mining
    • Energy & Utilities
    • View All Industries
  • Our Partners
    • AWS
    • Microsoft
    • ServiceNow
    • View All Partners
  • Insights
    • Blogs
    • Brochures
    • Success Stories
    • News / Announcements
    • Webinars
    • White Papers
  • Careers
    • Life At Kellton
    • Jobs
  • About
    • About Us
    • Our Leadership
    • Testimonials
    • Analyst Recognitions
    • Investors
    • Corporate Sustainability
    • Privacy-Policy
    • Contact Us
    • Our Delivery Centers
      • India Delivery Center
      • Europe Delivery Center
Search
  1. Home
  2. All Insights
  3. Blogs

How to Generate and Import SSH Keys in SAP PI/PO?

SAP
September 21 , 2023
Posted By:
Dr. Srinivas Bandi
linkedin
7 min read
How to Generate and Import SSH Keys in SAP PIPO

Other recent blogs

Mobile App Development Services for Your Startup
How to Choose Right Mobile App Development Services for Your Startup
May 20 , 2026
What is Claude Cowork
Claude Cowork: Discover the budget and ROI map to build your own private version
May 19 , 2026
AI-led legacy modernization
How systematic refactoring works as a product engineering framework for deep legacy modernization?
May 18 , 2026

Let's talk

Reach out, we'd love to hear from you!

Image CAPTCHA
Enter the characters shown in the image.
Get new captcha!

What is the Full Form of SAP PI/PO?

The full form of SAP PI is Process Integration, and SAP PO stands for Process Orchestration. These are enterprise integration platforms used to connect SAP and non-SAP systems. While SAP PI is the legacy Java-based integration tool, SAP PO is the modern, more robust version that combines PI, Business Process Management (BPM), and Business Rules Management (BRM) into a single solution.

SAP Process Integration/Process Orchestration (PI/P0), a critical integration platform developed by SAP, enables businesses to expeditiously unite disparate systems, applications, and data sources. The deep integration capabilities introduced by SAP PI/PO usher in a new era of connectivity and dramatically improve an organization’s capability to innovate and build products at the speed of business.

For modern-day businesses, this integration prowess is not merely a convenience; instead, it is imperative for companies striving to stay agile, adaptive, and resilient in an increasingly complex and interconnected world.

Harnessing the integration capabilities of SAP PI/PO to connect SAP systems with legacy or non-SAP systems and applications leads to data consistency, accelerated decision-making, superior customer experiences, and optimized operational efficiency. And this is not all: in fact, the strategic dismantling of silos within the enterprise also lays the foundation for a more impactful foundation for digital transformation initiatives, enabling companies to create new synergies with the strategic adoption of new and emerging technologies such as Generative AI, Internet of Things (IoT), artificial intelligence (AI), and cloud computing.

Quick Guide: Generating RSA Keys for SAP Migration

  • Primary Goal: Establish secure SFTP authentication using RSA encryption.
  • Tools Required: PuTTYgen, OpenSSL, and SAP NetWeaver Administrator (NWA).
  • Core Process: Generate a public/private key pair → Convert to .pem → Create a .p12 (PKCS12) certificate → Import to SAP Key Storage.
  • Use Case: Critical for SAP PI to PO migration and secure third-party system integrations.

SSH keys in SAP PI/PO

SSH keys facilitate seamless and secure access to remote servers and devices over the Internet. In SAP PI/PO, they are used for authentication and encryption purposes, allowing secure transfer of data via protocols like SFTP (SSH File Transfer Protocol) or SCP (Secure Copy Protocol).

SSH keys are seen as a robust alternative to traditional password-based authentication methods, which dramatically improves the overall security and reliability of SAP PI/PO integrations. As the technology relies on cryptographic keys, it becomes increasingly difficult for hackers to tamper with the systems. To fortify their digital security, the SAP PI/PO administrators generate SSH key pairs - usually a public key and a private key.

To securely access or log into the system, you’d need both the keys. While the public key is stored on the SAP PI/PO system, the private key remains with the user or system requiring access. This mechanism not only boosts the overall security but also simplifies the management of user access, making it an integral part of SAP PI/PO's security infrastructure.

Key benefits of SSH keys

Step-by-Step: How to Generate RSA SSH Keys for SAP PI/PO Migration

Follow these instructions if you’re a novice and willing to learn the entire process of setting up SSH keys in a flash.

Step 1: Generate a brand new SSH key. 

  • Open Putty Key Gen.

ssh key

  • Click “Generate.”

PuTTy Key

  • Below is how the generated key will look like. 

PuTTy Key Generator

  • Save the public and private keys on your system.

Save Public Key

Save Private Key

Step 2: Open PuttyGen and load the private key that was exported in Step 1.

PuTTy Key Generator1

  • Click “Conversions” and export OpenSSH key.

PuTTy key Generator2

  • Save the file with .pem extension. 

Save Private Key 1

So far, we have generated three keys:

  • .pem is the ppk file exported from Putty in “OpenSSHFormat.”
  • .ppk is generated from PuttyGen.
  • .txt is the public key.

SSH

Step 3: If this is the first time you are using Open SSL, you may need to add it to the Environment Variable.

OPEN

Environment Variable

Open command prompt (may need to be in Administrator mode) and test the Variable:

Window

  • Copy the .pem version of the private key in Openssl >> Bin Folder.

Openssl

  • Open Command Prompt and navigate to Openssl >> Bin Folder.

Command Prompt

Specify the command.

Command prompt

  • The command has to be in the below format: openssl req -new -x509 -days 3650 -key <PrivateKey.pem> -out <x509_PrivateKey.pem>
Note: In the above example, 3650 is used to give 10 years key. If you want to generate two-year key, specify 730 (i.e. 365*2)
  • Going ahead, answer the below questions and soon x509 certificate will be generated. 

Command Prompt 2

Openssl_win32

  • Now, generate the PKCS12 key for it.

Command

  • The command has to be in the below format: openssl pkcs12 -export -in <x509_PrivateKey.pem> -inkey <PrivateKey.pem> -out <PrivateKey.p12>

Step 4: Here, we need to import the PKCS 12 in PI/PO. Login to NWA on PI/PO server and go to “Certificates and Keys: Key Storage.” If you already see a “View” for SFTP, use it or create your own view. 

Certificates

  • Click “Import Entry.”
  • Select PKCS12 and give the .p12 key name. Specify a password.

Entry Point

  • The key is imported successfully.

Entry

Step 5: Specify this key in the PI/PO Communication Channel as needed.

Adapter

Common SSH Key Troubleshooting in SAP

IssuePotential CauseRecommended Fix
Authentication FailedPublic key not in authorized_keysEnsure the .txt public key is shared with the target server admin.
Invalid Private KeyFormat MismatchUse OpenSSL to ensure your key is in the correct PKCS12 (.p12) format before NWA import.
SFTP Connection TimeoutPort 22 BlockedVerify that the firewall allows SSH traffic for your SAP PI/PO instance.
RSA Key Not RecognizedOld Encryption StandardEnsure you are using RSA-2048 or higher during the PuTTYgen step.

Wrapping up

SAP PI/PO can be a stepping stone for any organization that plans to evolve into a more integrated and secure enterprise. In the same spirit, SSH keys allow for a secure connection and communication between different systems and applications. Using these keys often leads to a multitude of benefits, such as:

  • Improved security: SSH keys provide strong encryption and authentication, reducing the risk of unauthorized access compared to traditional password-based authentication.
  • Ease of automation: SSH keys simplify automated processes and scripting by allowing secure access without requiring manual password entry.
  • No password management: Users don't need to remember or update passwords, reducing the burden of password management and the risk of weak or compromised passwords.
  • Multi-factor authentication: Combining SSH keys with passwords or passphrases creates a robust multi-factor authentication (MFA) system for additional security layers.
  • Centralized access control: SSH keys can be centrally managed, making it easier to revoke access, audit user activity, and enforce security policies across a network or infrastructure.

Data breaches are a common occurrence these days. Hackers are using more sophisticated systems and methods than ever before. To keep your organization or sensitive data and systems out of harm’s way, it is pivotal for IT leaders to use SSH keys to secure their integrated systems, applications, and data. We hope the steps shared in this blog help you successfully generate and import SSH keys. If you need any further assistance or have questions, please reach out to our SAP experts.

Frequently Asked Questions (FAQ)

Q: What is an SSH key in SAP PI/PO?

A: An SSH key is a secure authentication method for SFTP and SCP adapters, replacing traditional passwords with cryptographic key pairs (RSA).

Q: How do I generate an SAP access key for SFTP?

You can use PuTTYgen to generate a key pair and OpenSSL to convert it into a .p12 format compatible with the SAP NWA Keystore.

Q: Is there a difference between PI and PO keys?

A: The generation process is similar, but SAP PO typically manages these via the NetWeaver Administrator (NWA) centralized keystore for better security during migrations.

Want to know more?

SAP BTP Side-by-Side Extensions
Blog
The Definitive Guide to SAP BTP Side-by-Side Extensions in 2026
April 28 , 2026
ERP cloud migration for manufacturing
Blog
ERP cloud migration for manufacturing: quick tips on achieving 30% growth with SAP on AWS
February 27 , 2026
SAP S/4HANA Data Migration
Blog
SAP S/4HANA Data Migration approach guide in AI-first landscape
December 01 , 2025

North America: +1.844.469.8900

Asia: +91.124.469.8900

Europe: +44.203.807.6911

Email: ask@kellton.com

Footer menu right

  • Services
  • Platforms & Products
  • Industries
  • Insights

Footer Menu Left

  • About
  • News
  • Careers
  • Contact
LinkedIn Twitter Youtube Facebook
Chatbot
Kellton Kellton Assistant

Feel free to inquire about any Digital Transformation Initiative

Hi there! Welcome to Kellton! It's great to have you here. How can I assist you today?
Recognized as a leader in Zinnov Zones Digital Engineering and ER&D services
Kellton: 'Product Challenger' in 2023 ISG Provider Lens™ SAP Ecosystem
Recognized as a 'Challenger' in Avasant's SAP S/4HANA services
Footer bottom row seperator

© 2026 Kellton