Business Process Management Security GuideLocate this document in the navigation structure

Use

This security guide is an integral part of the CE Security Guide and outlines only those security issues that are specific to Business Process Management .

Target Audience

  • Technology consultants

  • System administrators

This document is not included as part of the Installation Guides, Configuration Guides, Technical Operation Manuals, or Upgrade Guides. Such guides are only relevant for a certain phase of the software life cycle, whereas Security Guides provide information that is relevant for all life cycle phases.

Why Is Security Necessary?

With the increasing use of distributed systems and the Internet for managing business data, the demands on security are also on the rise. When using a distributed system, you need to be sure that your data and processes support your business needs without allowing unauthorized access to critical information. User errors, negligence, or attempted manipulation should not result in the loss of information or processing time on your system. These demands on security also apply to Business Process Management . To assist you in securing the Business Process Management , we provide this security guide.

About this Document

This security guide provides an overview of the security-relevant information that applies to Business Process Management . It contains an overview of the security considerations for Business Process Management and links to the security administration or development functions in the Business Process Management Administration and Development Manuals respectively. It also links to other relevant security guides, for example to the Portal Security Guide .

The Security Guide contains the following sections:

  • Before You Start

    This section provides links to additional information, a list of important SAP Notes and other security guides that apply to securing Business Process Management .

  • Technical System Landscape

    This section provides an overview of the technical components and communication paths that are used by Business Process Management

  • User Administration and Authentication

    This section describes user management, standard user types and lists the recommended tools for user management.

  • Authorizations and Roles

    This section provides an overview of the authorization and roles concept that applies to Business Process Management .