
Incentive and Sales Force Management (ISF) offers a range of security-related functions to handle your security requirements. In addition to the specific Incentive and Sales Force Management topics, see also the SAP Security Guide that covers the SAP security standard as a whole.
Here you find all of the security topics related to Incentive and Sales Force Management and links to the relevant sections in theSAPSecurity Guide.
Introduction
An explanation of the importance of security and for which target groups the Security Guide is relevant.
Before You Start
Where to find more information on security.
Technical System Landscape
An overview of the technical system landscape of Incentive and Sales Force Management .
User Management and Authentication
Authorization Management
User Data Synchronization
Integration in Single Sign-On Environments
Authorizations
Authorization Profiles
Authorization Types
Network and Communication Security
All (RFC) interface modules undergo the same authorization check as the transactions in the dialog of Incentive and Sales Force Management .
Interfaces and Data Transfer in ICM
See theSAPSecurity Guide Volume II, Communication Interfaces section
Virus Protection
Data Protection in Incentive and Sales Force Management
All posting-relevant data is available for audit in Incentive and Sales Force Management . Note that changes to important data can only be made when all the necessary parameters (user, time, and so on) are logged, because otherwise the changes cannot be tracked. For more information, see Period and Version Management
Security of Data Storage in Incentive and Sales Force Management
Procedure Documentation in Incentive and Sales Force Management