SAP NetWeaver Application Server ABAP Security Guide
User Administration and Authentication
User Management
User Data Synchronization
User Authentication
Preventing Unauthorized Logons
Recognizing and Preventing Multiple Dialog User Logons
Authentifizierungssicherheit für SAP-Verknüpfungen
Additional Information on User Authentication
Integration in Single Sign-On Environments
Protective Measures for Logons and Passwords in ABAP Systems
Secure Network Communications (SNC)
Client Certificates
Anmeldetickets
AS ABAP Authorization Concept
Organizing Authorization Administration
Protective Measures for Special Profiles
Zusatzinformationen zum SAP-Berechtigungskonzept
Network Security for SAP NetWeaver AS ABAP
AS ABAP Ports
Protecting Your Productive System (Change & Transport System)
The SAP System Landscape
The Three-Tier System Landscape
The Common Transport Directory
Using the TMS Quality Assurance Approval Procedure
Configuring the System Landscape for Changes
Release 3.1
As of Release 4.0
Defining the Transport Process
Transport Routes
The Transport Process
Responsibilities and Their Corresponding Authorizations
Roles and Responsibilities
Authorizations
Security for the RFC Connections
Default
TMS Trusted Services
Secure Network Communications
Protecting Security-Critical Objects
Protecting the System Profile Parameter Files
Protecting the Table for Maintaining System Clients (Table T000)
Protecting Other Security-Critical Objects
Emergency Changes in the Productive System
Additional Information on the Change and Transport System
Web Dynpro ABAP Security Guide
eCATT Security Guide
Sicherheitsleitfaden
Benutzerauthentifizierung und -administration
Benutzerverwaltung
Berechtigungen
Berechtigungen für Operational Data Provisioning
Netzwerk- und Kommunikationssicherheit
Sicherheit der Kommunikationskanäle
Kommunikationsdestinationen
Datenspeicherungssicherheit
Sicherheit von Protokollen und Traces
Security Aspects When Using Business Objects
SAP Business Partner Security
SAP Product Security
Secure Store & Forward Mechanisms (SSF) and Digital Signatures
General Information
Protecting Keys
Protecting the Application Servers Keys
Additional Information on SSF and Digital Signatures
Auditing and Logging
The Audit Info System (AIS)
The Security Audit Log
Example Filters
The System Log
Statistic Records in CCMS
Logging of Specific Activities
Application Logging
Logging Workflow Execution
Logging Using Change Documents
Logging Changes to Table Data
Logging Changes Made Using the Change & Transport System
Logging Changes Made to User and Authorization Information
Additional Information on Auditing and Logging
Security Aspects for AS ABAP System Management
Hintergrundverarbeitung
Definieren von Benutzern für die Hintergrundverarbeitung
Ausführung externer Programme in Job-Steps
Rollen und Berechtigungen für die Hintergrundverarbeitung
Print and Output Management
Alert Management (ALM)
Central Monitoring with CCMS
Sicherheitsaspekte für die Service Implementation Workbench (SIW
Special Topics
Batch Input
An Overview of the Batch Input Process
Protecting the Batch Input Sessions
HTTP Session Security Protection
Offenlegung von Informationen
Internet Graphics Service Security
Logical Operating System Commands
Restrict Authorizations for Maintaining External Commands
Restrict Authorizations for Executing External Commands
Additional Information on Logical Operating System Commands
Protecting Access to the File System Using Logical Path and File
Protecting Disclosure of the SAPconnect RFC User
Protecting FTP Access to the AS ABAP
Preventing or Logging List Downloads