Performance ManagementThis chapter of the Security Guide provides an overview of the security-relevant information for the Performance Management
(PA-PD-PM) application component.
Note
We use the name of the Performance Management
to mean the same as the name Objective Setting and Appraisals
. Both names correspond to the technical application component ID PA-PD-PM
.
The following aspects relevant to security apply to SAP ERP Central Component (ECC) or Human Resources overall and thus also to Performance Management:
Mechanisms for user management and user authentication:
User Management
For more information, see the following:
User Management (Human Resources)
User Administration (SAP ECC)
User Data Synchronization
For more information, see the section User Data Synchronization of the SAP ECC Security Guide.
Integration into Single Sign-On Environments
For more information, see the section Integration in Single Sign-On Environments of the SAP ECC Security Guide.
Session Security Protection
For more information, see the section Session Security Protection of the SAP ECC Security Guide.
Enterprise Services Security
For more information, see the section Enterprise Services Security of the SAP ECC Security Guide.
Services in Lifecycle Management for Security
For more information, see the section Services in Lifecycle Management for Security of the SAP ECC Security Guide.
The following sections contain the security-relevant information that is specific to “Performance Management”:
This section provides information on why security is necessary and how the document is used, as well as references to other Security Guides on which this Security Guide is based.
This section provides an overview of the technical components and communication paths used by Performance Management.
Security Aspects for Data, Data Flow, and Processes
This section provides an overview of the security aspects of the most frequently used processes in Performance Management.
This section provides an overview of the authorization concept used for Performance Management.
Network and Communication Security
This section provides an overview of the following aspects:
Internet Communication Framework Security
This section provides an overview of the services for the Internet Communication Framework (ICF) used by Performance Management.
This section provides an overview of all critical data used by the scenario, component, and application as well as the security mechanisms used.
Other Security-Relevant Information
This section contains information on uploading and displaying attachments.
Security-Relevant Logging and Tracing
This section provides an overview of the trace and log files that contain security-relevant information and that enable you to reproduce activities, for example, if there is a security violation.