Security Guide
Target Audience
- System administrators
- ABAP developers
Why Is Security Necessary?
With the increasing use of distributed systems for managing business data, the demands on security are also on the rise. When using a distributed system, you need to be sure that your data and processes support your business needs without allowing unauthorized access to critical information.
To assist you in making the ABAP development process secure using the ABAP Development Tools, we provide this Security Guide.
About This Document
The Security Guide comprises the following sections:
- User Authentication on Front-End Client
This section provides an overview of the authentication aspects.
- Role and Authorization Concept
This section introduces the authorization concept that applies to ABAP Development Tools.
- Resource Protection on Front-End Client
This section explains how you can protect local resources of ABAP projects.
- Installing Plug-ins from Third Parties
This section points to risks caused by installing third party plug-ins.
Additional Information
For more information about specific topics, see the Quick Links as shown in the table below.
| Content | Quick Link on SAP Service Marketplace or SAP Community |
|---|---|
| Security | Security Community![]() |
| Security Guides | SAP Security Guides![]() |
| Related SAP Notes | SAP Security Notes & News![]() |
| SAP NetWeaver | SAP NetWeaver Technology Community![]() |
