Security Guide for Embedded Search 
Note
You can find up-to-date information that only became available after publication of this document in SAP Note 1254893.
Technology consultants
System administrators
Embedded Search uses standard components of SAP NetWeaver (Application Server ABAP and Search and Classification (TREX)), therefore the corresponding security guides also apply for Embedded Search.
Note the following guides in the SAP NetWeaver Security Guide:
This security guide provides an overview of the security-relevant information that affects Embedded Search.
It comprises the following sections:
User Administration and Authentication
This section contains information about the user types and roles in Embedded Search. User Administration and Authentication:
Authorizations
This secetion contains explanations of the authorization concept and information about the roles used in Embedded Search.
Network and Communications Security
This section describes the communication paths used by Embedded Search and the security mechanisms that apply.
Data Storage Security
This section provides an overview of any critical data that is used by Embedded Search and the security mechanisms that apply.
Security Logging and Tracing
Embedded Search does not provide any specific logs or traces that are relevant for security.
For more information about specific topics, see the addresses on the SAP Service Marketplace as shown in the table below.
Content |
Addresses on the SAP Service Marketplace |
|---|---|
Security |
|
Security Guide |
|
Related SAP Notes |
|
Released platforms |
|
SAP Solution Manager |