SAP NetWeaver Application Server ABAP Security Guide
User Authentication
Authentication and Single Sign-On
Logon and Password Security in the ABAP-System
Password Rules
Security Measures Related to Password Rules
Password Storage and Transport
Profile Parameters for Logon and Password (Login Parameters)
Secure Network Communications (SNC)
Client Certificates
Logon Tickets
User Types
Protecting Standard Users
Defining a New Superuser and Deactivating SAP*
Preventing Unauthorized Logons
Recognizing and Preventing Multiple Dialog User Logons
Security Measures When Using SAP Shortcuts
Additional Information on User Authentication
AS ABAP Authorization Concept
Overview
Organizing Authorization Administration
Organization if You Are Using the Profile Generator
Setting Up User and Authorization Administrators
Setting Up the Role Administration Tool
Authorization Objects Checked in Role Administration
Organization without the Profile Generator
Creating and Maintaining Authorizations/Profiles Manually
Authorization Checks
Defining the Scope of Authorization Checks
Searching for Deactivated Authority Checks
Globally Deactivating Authorization Checks
Protective Measures for Special Profiles
Authorization Profile SAP_ALL
Authorization Profile SAP_NEW
User Information System
Central User Administration
Security Aspects of the CUA
Additional Information About the SAP Authorization Concept
Network Security for SAP Web AS ABAP
AS ABAP Ports
Protecting Your Productive System (Change & Transport System)
The SAP System Landscape
The Three-Tier System Landscape
The Common Transport Directory
Using the TMS Quality Assurance Approval Procedure
Configuring the System Landscape for Changes
Release 3.1
As of Release 4.0
Defining the Transport Process
Transport Routes
The Transport Process
Responsibilities and Their Corresponding Authorizations
Roles and Responsibilities
Authorizations
Security for the RFC Connections
Default
TMS Trusted Services
Secure Network Communications
Protecting Security-Critical Objects
Protecting the System Profile Parameter Files
Protecting the Table for Maintaining System Clients (Table T000)
Protecting Other Security-Critical Objects
Emergency Changes in the Productive System
Additional Information on the Change and Transport System
Web Dynpro ABAP Security Guide
eCATT Security Guide
Before You Start
Technical System Landscape
Authorizations
Authorization Objects Used in eCATT Authorization
Test Developer Authorizations
Tester Authorizations
Setting up authorizations when execution is done locally
Network and Communication Security
Security for Additional Applications
Other Security-Relevant Information
Security Guide for Embedded Search
User Administration and Authentication
User Management
Authorizations
Network and Communications Security
Security of the Communications Channels
Communication Destinations
Data Storage Security
Security Aspects When Using Business Objects
SAP Business Partner Security
SAP Product Security
Secure Store & Forward Mechanisms (SSF) and Digital Signatures
General Information
Protecting Keys
Protecting the Application Servers Keys
Additional Information on SSF and Digital Signatures
Special Topics
Checking User Input for Program Commands
Logical Operating System Commands
Restrict Authorizations for Maintaining External Commands
Restrict Authorizations for Executing External Commands
Additional Information on Logical Operating System Commands
Protecting Access to the File System Using Logical Path and File
Batch Input
An Overview of the Batch Input Process
Protecting the Batch Input Sessions
HTTP Session Security Protection
Protecting Disclosure of the SAPconnect RFC User
Preventing or Logging List Downloads
Internet Graphics Service Security