Incentive and Sales Force Management (ISF) Security Guide Locate this document in the navigation structure

Purpose

Incentive and Sales Force Management (ISF) offers a range of security-related functions to handle your security requirements. In addition to the specific Incentive and Sales Force Management topics, see also the SAP Security Guide that covers the SAP security standard as a whole.

Features

Here you find all of the security topics related to Incentive and Sales Force Management and links to the relevant sections in theSAPSecurity Guide.

Introduction

An explanation of the importance of security and for which target groups the Security Guide is relevant.

Before You Start

Where to find more information on security.

Technical System Landscape

An overview of the technical system landscape of Incentive and Sales Force Management .

User Management and Authentication

Authorization Management

User Data Synchronization

Integration in Single Sign-On Environments

Authorizations

Authorization Profiles

Authorization Types

Network and Communication Security

All (RFC) interface modules undergo the same authorization check as the transactions in the dialog of Incentive and Sales Force Management .

Interfaces and Data Transfer in ICM

See theSAPSecurity Guide Volume II, Communication Interfaces section

Virus Protection

Data Protection in Incentive and Sales Force Management

All posting-relevant data is available for audit in Incentive and Sales Force Management . Note that changes to important data can only be made when all the necessary parameters (user, time, and so on) are logged, because otherwise the changes cannot be tracked. For more information, see Period and Version Management

Security of Data Storage in Incentive and Sales Force Management

See Revision Security in ISF

Procedure Documentation in Incentive and Sales Force Management

See Procedure Documentation in ISF