SAP NetWeaver Application Server ABAP Security Guide
User Administration and Authentication
User Management
User Data Synchronization
User Authentication
Preventing Unauthorized Logons
Recognizing and Preventing Multiple Dialog User Logons
Authentication Security for SAP Shortcuts
Additional Information on User Authentication
Integration in Single Sign-On Environments
Protective Measures for Logons and Passwords in ABAP Systems
Secure Network Communications (SNC)
Client Certificates
Logon Tickets
AS ABAP Authorization Concept
Organizing Authorization Administration
Protective Measures for Special Authorization Objects
Additional Information About the SAP Authorization Concept
Network Security for SAP NetWeaver Application Server ABAP
Ports of SAP NetWeaver Application Server ABAP
Security Aspects for SAP NetWeaver AS Infrastructure and Connectivity
Security Aspects for the Change and Transport System
Technical System Landscape for CTS
Securing the Transport Directory
CTS User Administration and Authentication
CTS Roles and Authorizations
CTS Network and Communication Security
CTS Communication Destinations
Scenarios for CTS RFC Communication
Security Aspects of CTS Data, Data Flow, and Processes
Defining the Transport Process
Securing Production Operation
Monitoring Transport Activities
Security for the Enhanced Change and Transport System (CTS+)
Security Considerations for Web Dynpro Applications
eCATT Security Guide
Security Guide for Search and Operational Analytics
Security Aspects When Using Business Objects
SAP Business Partner Security
SAP Product Security
Secure Store & Forward Mechanisms (SSF) and Digital Signatures
General Information
Protecting Keys
Protecting the Application Server's Keys
Additional Information on SSF and Digital Signatures
Auditing and Logging
Security Aspects for AS ABAP System Management
Background Processing
Defining Users for Background Processing
Specifying the Execution of External Programs from Job Steps
Roles and Authorizations for Background Processing
Print and Output Management
Alert Management (ALM)
Central Monitoring with CCMS
Security Aspects for the Service Implementation Workbench
Special Topics
Batch Input
An Overview of the Batch Input Process
Protecting the Batch Input Sessions
HTTP Session Security Protection
Information Disclosure
Internet Graphics Service Security
Logical Operating System Commands
Restrict Authorizations for Maintaining External Commands
Restrict Authorizations for Executing External Commands
Additional Information on Logical Operating System Commands
Protecting Access to the File System Using Logical Path and File Names
Protecting Disclosure of the SAPconnect RFC User
Protecting FTP Access to the AS ABAP
Protecting the System Profile Parameter Files
Protecting the Table for Maintaining System Clients (Table T000)
Preventing or Logging List Downloads