Skip to content
Administration Guide for SAP Performance Management for Financial Services
Administration Guide for SAP Performance Management for Financial Services
Content
Document History
Getting Started
About this Guide
Installation Information
Important SAP Notes
Implementation Sequence
Planning
System Landscape
Hardware and Software Requirements
Preparation
Installation
Post Installation Steps
ABAP Steps
Setting Namespaces
Activate NXI ABAP Web Dynpro Service
Create DBCON Database Connection
Create RFC Destination
Set Number Range Intervals
Adjust Maximum Record Length
Create Tool BW Client
Create HANA Source System
Activate Deep HANA Integration
Activate Planning Function Type
Create Semantic Object
Create SAP System Alias
Assign SAP System Alias to NXI services
Implement Important SAP Notes
HANA Steps
Create NXI Schema in SAP HANA Studio
Grant Full Authorization on NXI Schema to SAP DB Connection User in SAP HANA Studio
Grant Full Authorization on _SYS_BIC Schema to SAP DB User in SAP HANA Studio
Grant SELECT and EXECUTE Authorizations to _SYS_REPO User on Default SAP System Schema in SAP HANA Studio
Grant SELECT and EXECUTE Authorizations to _SYS_REPO User on NXI Schema in SAP HANA Studio
Adjust SAP HANA DB Parameters
Privileges for Virtual Table Creation in Model View Function (Optional)
Maintain Schema Mapping for NXI Schema
Privileges for Import/Export in File Adapter Function (Optional)
Privileges for HANA R Script in Remote Function Adapter (Optional)
Default Environment Steps
SAP Fiori Launchpad Applications
Transport
Integration with Bank Analyzer/Insurance Analyzer
Upgrade Information
Sample Content Information
Install the content in other SAP Performance Management for Financial Services clients in your system
Operations Information
Delete Temporary Data
Generate Functions/ Mass Generation
Execute Function
Security Information
User Administration and Authentication
User Management
User Data Synchronization
Integration into Single Sign-On Environments
Authorizations
Session Security Protection
Network and Communication Security
Communication Channel Security
Network Security
Communications Destinations
Data Protection
Security-Relevant Logging and Tracing