SAP NetWeaver Application Server Security Guide
SAP NetWeaver Application Server ABAP Security Guide
User Authentication
Authentication and Single Sign-On
Logon and Password Security in the ABAP System
Password Rules
Security Measures Related to Password Rules
Password Storage and Transport
Profile Parameters for Logon and Password (Login Parameters)
Secure Network Communications (SNC)
Client Certificates
Logon Tickets
User Types
Protecting Standard Users
Defining a New Superuser and Deactivating SAP*
Preventing Unauthorized Logons
Recognizing and Preventing Multiple Dialog User Logons
Security Measures When Using SAP Shortcuts
Additional Information on User Authentication
AS ABAP Authorization Concept
Overview
Organizing Authorization Administration
Organization if You Are Using the Profile Generator
Setting Up User and Authorization Administrators
Setting Up the Role Administration Tool
Authorization Objects Checked in Role Administration
Organization without the Profile Generator
Creating and Maintaining Authorizations/Profiles Manually
Authorization Checks
Defining the Scope of Authorization Checks
Searching for Deactivated Authority Checks
Globally Deactivating Authorization Checks
Protective Measures for Special Profiles
Authorization Profile SAP_ALL
Authorization Profile SAP_NEW
User Information System
Central User Administration
Security Aspects of the CUA
Additional Information About the SAP Authorization Concept
Network Security for SAP Web AS ABAP
AS ABAP Ports
Protecting Your Productive System (Change & Transport System)
The SAP System Landscape
The Three-Tier System Landscape
The Common Transport Directory
Using the TMS Quality Assurance Approval Procedure
Configuring the System Landscape for Changes
Release 3.1
As of Release 4.0
Defining the Transport Process
Transport Routes
The Transport Process
Responsibilities and Their Corresponding Authorizations
Roles and Responsibilities
Authorizations
Security for the RFC Connections
Default
TMS Trusted Services
Secure Network Communications
Protecting Security-Critical Objects
Protecting the System Profile Parameter Files
Protecting the Table for Maintaining System Clients (Table T000)
Protecting Other Security-Critical Objects
Emergency Changes in the Productive System
Additional Information on the Change and Transport System
eCATT Security Guide
Before You Start
Technical System Landscape
Authorizations
Authorization Objects Used in eCATT Authorization
Test Developer Authorizations
Tester Authorizations
Setting up authorizations when execution is done locally
Network and Communication Security
Security for Additional Applications
Other Security-Relevant Information
Security Guide for Embedded Search
User Administration and Authentication
User Management
Authorizations
Network and Communications Security
Security of the Communications Channels
Communication Destinations
Data Storage Security
Security Aspects When Using Business Objects
SAP Business Partner Security
SAP Product Security
Secure Store & Forward Mechanisms (SSF) and Digital Signatures
General Information
Protecting Keys
Protecting the Application Servers Keys
Additional Information on SSF and Digital Signatures
Special Topics
Checking User Input for Program Commands
Logical Operating System Commands
Restrict Authorizations for Maintaining External Commands
Restrict Authorizations for Executing External Commands
Additional Information on Logical Operating System Commands
Batch Input
An Overview of the Batch Input Process
Protecting the Batch Input Sessions
Protecting Disclosure of the SAPconnect RFC User
Preventing or Logging List Downloads
Internet Graphics Service Security
SAP NetWeaver Application Server Java Security Guide
Before You Start
Technical System Landscape
User Administration and Authentication
User Administration and Standard Users
User Administration Tools
User Types
Standard Users
Standard User Groups
User Data Synchronization
Authentication Mechanisms and Single Sign-On Integration
Declarative and Programmatic Authentication
Login Modules and Login Module Stacks
Login Modules
Login Module Stacks
Authentication Schemes
Integration in Single Sign-On Environments
Authorizations
Standard Roles
Permissions, Actions, and UME Roles
Standard UME Actions
Network Security
Transport Layer Security
Communication Channel Security
Using an Intermediary Server to Connect to the AS Java
Communication Security for the Web Container
Communication Security for the EJB Container
Communication Security for Web Services
Communication Security for Persistency Stores
Communication Security for Software Deployment
AS Java Ports
Data Storage Security
Dispensable Functions with Impacts on Security
Other Security Relevant Information
JMS Provider Security Aspects
Java Virtual Machine Security
Security Aspects for the Database Connection
Working with the SDM
Destination Service
Protecting Sessions Security
Tracing and Logging
UME Logging and Monitoring
Security Aspects When Using HTTP and Web Container Tracing
Masking Security-sensitive Data in the HTTP Access Log
Virus Protection and SAP GUI Integrity Checks