Start of Content Area

Background documentation Security and User Administration  Locate the document in its SAP Library structure

There are several security and user administration functions available with SAP NetWeaver CE. These are divided into the categories shown below.

User Administration

SAP systems within the SAP NetWeaver technology platform perform authorizations using a role-based identity management approach. This means that you assign authorizations to users based on the job they perform using the particular system.

The tools available for performing identity management functions depend on the type of installation you have. There are also tools for multiple systems. These tools and functions are described in the following sections:

·        User Management of the Application Server Java

This section summarizes the tasks need to perform user management on a local SAP NetWeaver Application Server (AS) Java.

      SAP NetWeaver Identity Management Identity Center

SAP NetWeaver Identity Management Identity Center enables you to manage identities across SAP systems as well as non SAP systems. It also provides workflows and event-triggered activities to ensure each user has the access required for each system.

      Integration of User Management in Your System Landscape 

Without Identity Center, you can still integrate user management between SAP systems or SAP systems and an LDAP.

Cryptographic Services

Cryptography is used with SAP NetWeaver for certain security functions such as:

·        Secure Sockets Layer (SSL)

·        Secure Network Communications (SNC)

      Digital signatures and data encryption using Secure Store and Forward (SSF)

      Secure Storage

Tools and Tasks

To maintain the cryptographic keys that are used for these functions, use the Keystore service on the AS Java.

Prerequisites

To use cryptography, you must first install the cryptographic software on the server. For digital signatures, encryption, and secure storage, the AS Java uses the SAP Java Cryptographic Toolkit, which is provided during the installation. For SSL and SNC, you need to obtain the SAP Cryptographic Library, which is available on the SAP Service Marketplace.

More information: Deploying the SAP Cryptographic Software

Restrictions

The distribution of cryptographic software is subject to and controlled by German export regulations and is not available to all customers. In addition, the library may be subject to local regulations of your own country that may further restrict the import, use and (re)export of cryptographic software. If you have any further questions on this issue, contact your local SAP subsidiary.

Tasks on Demand

The tasks involved include managing keystores, keystore views and certificates.

More information: Using the AS Java Key Storage

More Information

For other related tasks, see the configuration for the particular function.

More information: Configuring Security 

 

 

End of Content Area