Start of Content Area

Procedure documentation ACC Security  Locate the document in its SAP Library structure

The Adaptive Computing Controller (ACC) application enables centralized management of large scale system landscapes and offers flexible service and resource management. As a single point of control, ACC needs to be secured against unauthorized access.

This graphic is explained in the accompanying text

The most important factor in providing system security is your own security policy. This help topic helps in implementing a security policy, but it cannot replace your own investment of time, assets, and strict adherence to the security guidelines of your software vendors (such as database and operating system). We recommend that you dedicate sufficient time and allocate ample resources to implement your security policy and to maintain the level of security that you desire.

The important factors to be considered for ACC security are:

...

·        User Management: Only authorized users are granted access to ACC. User credentials must remain strictly confidential to ensure maximum security.

More information: ACC User Management

·        Network Security: Communication needs must be supported without allowing unauthorized access to your network.

More information: ACC Network Security

·        Database Connection: Unauthorized access is not allowed to the database.

More information: ACC Database Connection

ACC Administrator Security Roles

ACC supports role-based access. This facilitates users to perform observations, operations (start/stop/relocate), configurations, mass operations (start/stop), and archiving in ACC.

The groups and roles defined for ACC are:

Group

Roles

AC_Observer

ACC_Observing

AC_Operator

ACC_Observing , ACC_Operation

AC_Administrator

ACC_Observing, ACC_Operation, ACC_Configuration, ACC_Archiving

More information:

Defining ACC Actions

End of Content Area