Enterprise Compensation ManagementThis chapter of the Security Guide provides an overview of the security-relevant information for the Enterprise Compensation Management
(PA-EC) application component.
The following aspects relevant to security apply to SAP ERP Central Component (ECC) or Human Resources overall and thus also to Enterprise Compensation Management:
Before You Start
This section provides information on why security is necessary and how the document is used, as well as references to other Security Guides on which this Security Guide is based.
For more information, see the section Before You Start of the SAP ECC Security Guide.
Technical System Landscape
For more information, see the section Technical System Landscape of the SAP ECC Security Guide.
Mechanisms for user management and user authentication:
User Management
For more information, see the following:
User Management (Human Resources)
User Administration (SAP ECC)
User Data Synchronization
For more information, see the section User Data Synchronization of the SAP ECC Security Guide.
Integration into Single Sign-On Environments
For more information, see the section Integration in Single Sign-On Environments of the SAP ECC Security Guide.
Session Security Protection
For more information, see the section Session Security Protection of the SAP ECC Security Guide.
Network Security
For more information, see the section Network Security of the SAP ECC Security Guide.
Enterprise Services Security
For more information, see the section Enterprise Services Security of the SAP ECC Security Guide.
Services in Lifecycle Management for Security
For more information, see the section Services in Lifecycle Management for Security of the SAP ECC Security Guide.
The following sections contain the security-relevant information that is specific to “Enterprise Compensation Management”:
This section lists the most important SAP Notes with regard to the security of Enterprise Compensation Management.
Security Aspects for Data, Data Flow, and Processes
This section provides an overview of the security aspects of the most frequently used processes in Enterprise Compensation Management.
This section provides an overview of the authorization concept used for Enterprise Compensation Management.
Communication Channel Security
This section describes the communication paths and logs that Enterprise Compensation Management uses.
Internet Communication Framework Security
This section provides an overview of the services for the Internet Communication Framework (ICF) used by Enterprise Compensation Management.
This section provides an overview of all critical data used by Enterprise Compensation Management, as well as the security mechanisms used.
Security-Relevant Logging and Tracing
This section provides an overview of the trace and log files that contain security-relevant information and that enable you to reproduce activities, for example, if there is a security violation.