Show TOC

Security Guide for Search and Operational AnalyticsLocate this document in the navigation structure

Use
Note

You can find up-to-date information that only became available after publication of this document in SAP Note 1254893 Information published on SAP site.

Target Audience

  • Technology consultants

  • System administrators

Fundamental Security Guides

Search and Operational Analytics uses standard SAP NetWeaver components (Application Server ABAP and Search and Classification (TREX) or SAP HANA or SAP Business Warehouse Accelerator(BWA)), therefore the respective security guides for these components are also relevant for Search and Operational Analytics.

The following security guide is relevant irrespective of the search technology used:

Each search technology has a respective security guide:

  • Search and Classification (TREX) Security Guide

  • For security-relevant information about SAP HANA, see the SAP HANA security guides in the Security Information section at http://help.sap.com/hana_appliance.

  • For security-relevant information about SAP Business Warehouse Accelerator (BWA), see Technical Operations Manual for SAP BW Accelerator 7.20, section Documentation at http://www.sdn.sap.com/irj/sdn/bwaInformation published on SAP site.

About This Guide

This security guide provides an overview of the security-relevant information that affects Search and Operational Analytics.

It comprises the following sections:

  • User Administration and Authentication

    This section contains information about the user types and roles in Search and Operational Analytics. User Administration and Authentication:

  • Authorizations

    This section contains explanations of the authorization concept and information about the roles used in Search and Operational Analytics.

  • Network and Communication Security

    This section describes the communication paths used by Search and Operational Analytics and the security mechanisms that apply.

  • Data Storage Security

    This section provides an overview of any critical data that is used by Search and Operational Analytics and the security mechanisms that apply.

  • Security Logging and Tracing

    Search and Operational Analytics does not provide any specific logs or traces that are relevant for security.

Additional Information

For more information about specific topics, see the addresses on SAP Service Marketplace as shown in the table below.

Content

SAP Service Marketplace Address

Security

https://service.sap.com/securityInformation published on SAP site

Security Guides

https://service.sap.com/securityguideInformation published on SAP site

Related SAP Notes

https://service.sap.com/notesInformation published on SAP site

Released platforms

https://service.sap.com/platformsInformation published on SAP site

SAP Solution Manager

https://service.sap.com/solutionmanagerInformation published on SAP site