Show TOC

Background documentationSecurity Guide for Embedded Search Locate this document in the navigation structure

 

Note Note

You can find up-to-date information that only became available after publication of this document in SAP Note 1254893.

End of the note.
Target Audience
  • Technology consultants

  • System administrators

Fundamental Security Guides

Embedded Search uses standard components of SAP NetWeaver (Application Server ABAP and Search and Classification (TREX)), therefore the corresponding security guides also apply for Embedded Search.

Note the following guides in the SAP NetWeaver Security Guide:

About this Guide

This security guide provides an overview of the security-relevant information that affects Embedded Search.

It comprises the following sections:

  • User Administration and Authentication

    This section contains information about the user types and roles in Embedded Search. User Administration and Authentication:

  • Authorizations

    This secetion contains explanations of the authorization concept and information about the roles used in Embedded Search.

  • Network and Communications Security

    This section describes the communication paths used by Embedded Search and the security mechanisms that apply.

  • Data Storage Security

    This section provides an overview of any critical data that is used by Embedded Search and the security mechanisms that apply.

  • Security Logging and Tracing

    Embedded Search does not provide any specific logs or traces that are relevant for security.

Further Information

For more information about specific topics, see the addresses on the SAP Service Marketplace as shown in the table below.

Content

Addresses on the SAP Service Marketplace

Security

https://service.sap.com/security

Security Guide

https://service.sap.com/securityguide

Related SAP Notes

https://service.sap.com/notes

Released platforms

https://service.sap.com/platforms

SAP Solution Manager

https://service.sap.com/solutionmanager