SAP NetWeaver Security Guide
SAP NetWeaver Security Guide
Content
SAP NetWeaver Security Guide
Technical System Landscape
User Administration and Authentication
User Management
User Authentication and Single Sign-On
SAP HANA Authorizations for SAP NetWeaver Application Server
Network and Communication Security
Basic Network Topology for SAP Systems
Network Services
Using Firewall Systems for Access Control
Application-Level Gateways Provided by SAP
Example Network Topology Using an SAProuter
Example Network Topology When Using SAP Remote Services
Using Multiple Network Zones
Transport Layer Security
Secure Network Communications (SNC)
SNC-Protected Communication Paths in SAP Systems
Preventing Cross-Site Scripting From Uploads
Additional Information on Network Security
Security Guides for SAP NetWeaver Functional Units
Security Guides for the Application Server
Security Aspects for AS Infrastructure Functional Units
Security Settings for the SAP Message Server
Security Information for SAP Web Dispatcher
AS ABAP with Integrated ITS
Security Guides for AS ABAP
Security Aspects for BSP
Security Guides for AS Java
The SAP NetWeaver Developer Studio: Security Aspects
Deployment Authorizations When Using Deploy Service
Security Guides for Business Services
SAP Content Server Security Guide
Introduction
User Administration and Authentication
User Management
User Data Synchronization Unix
User Data Synchronization Windows
Communication Channel Security
Network Security
Data Storage Security
Other Security-Relevant Information
Trace and Log Files
Security Guides for Composition Environment
Security Aspects of Web Dynpro for Java
Security Guides for Enterprise Portal (EP) and EP Core - Application Portal (EPC)
Universal Worklist
Security Guide for Search and Operational Analytics
User Administration and Authentication
User Management
Authorizations
Authorizations for Operational Data Provisioning
Network and Communication Security
Security of the Communication Channels
Communication Destinations
Data Storage Security
Security of Logs and Traces
Security Guides for Connectivity and Interoperability Technologies
Security Guide ALE (ALE Applications)
General Security Measures (ALE)
Protecting the ALE Distribution Model
Measures to Take in the Source System
Measures to Take in the Target System
Assigning Authorizations When Using Background Processing
Assigning Authorizations When Using Immediate Processing
Handling Sensitive Data in IDocs
Security Aspects for Lifecycle Management
Security Issues in ABAP Software Maintenance
Security Guide for ADK-Based Data Archiving
Security Guide for XML DAS Archiving
Virus Protection and SAP GUI Integrity Checks
Security Guides for the Operating System and Database Platforms
Operating System Security
SAP System Security Under UNIX/LINUX
Securing the Base Installation
Protecting Specific Properties, Files and Services
Setting Access Privileges for SAP System Directories Under UNIX/LINUX
Setting Rights for an Installation with Several SAP Systems
Additional Security Mechanisms on Linux
Additional Information on UNIX/LINUX Security
SAP System Security on Windows
Windows Groups and Users in an SAP System Environment
Windows Operating System User Settings in an SAP System
Setting Access Privileges for SAP System Directories Under Windows
SAP Systems in the Windows Domain Concept
SAP System Security When Using Windows Trusted Domains
Protecting SAP Systems on Windows Using Firewalls
Security Settings for SAP System Resources
Securing Data Relevant to the SAP System
Defining Start and Stop Permissions
Protecting Database Files
Database Access Protection
General Recommendations
Access Using Database Tools
IBM Db2 for Linux, UNIX, and Windows: Security
IBM Db2 for z/OS: Security
Microsoft SQL Server on Windows
Setting Authentication
Registering a Server
Protecting the Database Standard Logins
Changing Passwords for SQL Server Logins
Changing Passwords of Windows Accounts
Access Privileges for Database-Related Resources
Restricting Access to the Database
Oracle on UNIX
Protecting the Database Standard Users
The OPS$ Mechanism Under UNIX
Protecting the SAP Database User
Changing Passwords for Database Users with BRCONNECT
Changing the Passwords for <sapsid>adm and ora<dbsid>
Access Privileges for Database-Related Resources
Setting Access Privileges for Files and Directories
Access Privileges for BR*Tools
Oracle on Windows
Protecting the Database Standard Users
The OPS$ Mechanism on Windows
Protecting the SAP Database User
Changing Passwords for Database Users with BRCONNECT
Apply Security Settings for Database-Related File System Resources
Access Privileges for BR*Tools
SAP Adaptive Server Enterprise
Services for Security Lifecycle Management