Background documentationSecurity Guide Locate this document in the navigation structure

 

Note Note

This guide does not replace the administration guide or the solution operations guide that are available for productive operations.

End of the note.

This content is not included in the installation guides, configuration guides, operation guides, nor upgrade guides. Such guides are only relevant for a certain phase of the software life cycle, whereas a security guide provides information that is relevant for all life cycle phases.

For the most current information, see SAP Note 1367252 - SAP NetWeaver Enterprise Search 7.2: Security Guide.

Target Audience
  • Technology consultants

  • System administrators

Why Is Security Necessary?

With the increasing use of distributed systems and the Internet for managing business data, the demands on security are also on the rise. When using a distributed system, you need to be sure that your data and processes support your business needs without allowing unauthorized access to critical information. User errors, negligence, or attempted manipulation on your system should not result in loss of information or processing time. These demands on security apply likewise to SAP NetWeaver Enterprise Search. To assist you in securing Enterprise Search, we provide this Security Guide.

About This Document

The SAP NetWeaver Enterprise Search Security Guide provides an overview of the security-relevant information that affects SAP NetWeaver Enterprise Search.

It comprises the following sections:

  • Before You Start

    This section explains why security is necessary, describes how to use this document, and gives references to other security guides that are the foundation for this security guide.

  • Technical System Landscape

    This section provides an overview of the technical components and communication paths that are used by Enterprise Search.

  • User Administration and Authentication

    This section provides an overview of the following user administration and authentication aspects:

    • Recommended tools to use for user management

    • User types required for SAP NetWeaver Enterprise Search

    • Standard users provided with SAP NetWeaver Enterprise Search

    • Authentication mechanisms supported by SAP NetWeaver Enterprise Search

    • Options for user synchronization strategies

  • Search authorizations

    This section explains the authorization concept that applies to SAP NetWeaver Enterprise Search.

  • Network and Communications Security

    This section explains the different communication paths and security mechanisms that are relevant for SAP NetWeaver Enterprise Search.

  • Data Storage Security

    This section provides an overview of important data storage locations and security mechanisms relevant for SAP NetWeaver Enterprise Search.

  • Security Logging and Tracing

    This section describes the trace and log files that contain security-relevant information, from which, for example, you can reproduce activities if a security breach does occur.

  • Overview of Active Web Dynpro Services

    This section contains a list of all active Web Dynpro services that are required for SAP NetWeaver Enterprise Search.

Prerequisites

You should have read Introducing SAP NetWeaver Enterprise Search, which gives an overview of SAP NetWeaver Enterprise Search, its architecture, and the general concepts behind SAP NetWeaver Enterprise Search. In addition, the overview contains the naming conventions used in the documentation and a list of the available configuration tools and administration tools.