Background documentationSecurity Guide for SAP NetWeaver Voice Locate this document in the navigation structure

 

This document is not part of the Developers' Guide, Installation Guide, Configuration Guide, Administration Guide, or Upgrade Guide. The above listed guides are only relevant for a certain phase in the software lifecycle. The Security Guide, in contrast, provides information that affects all phases of the lifecycle.

Caution Caution

This guide does not replace the daily operations handbook that we recommend customers to create for their specific productive operations.

End of the caution.
Target Groups
  • Developers

  • Technical consultants

  • System administrators

Why Is Security Necessary?

The increasing use of distributed systems and Internet to manage business data has resulted in an increase in security requirements. With a distributed system, you must ensure that your data and processes support the needs of your enterprise without allowing unauthorized access to critical information. User errors, negligence, or attempted manipulation on your system should not result in loss of information or processing time. To assist you in securing voice-based access to business functionality via SAP NetWeaver Voice we provide this Security Guide.

About This Document

The Security Guide provides an overview of the security-relevant information that applies to SAP NetWeaver Voice.

The Security Guide comprises the following sections:

  • Before You Start

    This section contains information on references to other Security Guides that form the basis of the voice security guide.

  • SAP NetWeaver Voice Landscape

    This section provides an overview of the components and communication paths that SAP NetWeaver Voice uses.

  • User Administration and Authentication

    This section provides an overview of the following user administration and authentication aspects in SAP NetWeaver Voice:

    • Recommended tools to use for user management

    • User types that are required by SAP NetWeaver Voice

    • Standard users that are delivered with SAP NetWeaver Voice

    • Limitations on Authentication

  • Authorizations

    This section provides an overview of the authorization concept that applies to SAP NetWeaver Voice.

  • Network and Communication Security

    This section provides an overview of the communication paths used by SAP NetWeaver Voice.

  • Other Security-Relevant Information

    This section provides an overview of the trace and log files that contain security-relevant information. These logs help you to reproduce activities in case a security breach occurs.