SAP NetWeaver Security Guide
Technical System Landscape
User Administration and Authentication
User Management
User Authentication and Single Sign-On
Network and Communication Security
Basic Network Topology for SAP Systems
Network Services
Using Firewall Systems for Access Control
Application-Level Gateways Provided by SAP
Example Network Topology Using a SAProuter
Example Network Topology When Using SAP Remote Services
Using Multiple Network Zones
Reverse Invoke
Transport Layer Security
Secure Network Communications (SNC)
SNC-Protected Communication Paths in SAP Systems
Additional Information on Network Security
Security Guides for SAP NetWeaver According to Usage Types
Security Guide for Usage Type AS
SAP NetWeaver Application Server ABAP Security Guide
SAP NetWeaver Application Server Java Security Guide
Security Settings for the SAP Message Server
SAP Interactive Forms by Adobe Security Guide
SAP Knowledge Warehouse Security Guide
Introduction
Technical System Landscape
User Administration and Authentication
User Management
Integration Into Single Sign-On Environments
Authorizations
Network and Communication Security
Communication Channel Security
Network Security
Communication Destinations
Data Storage Security
Minimal Installation
Other Security-Relevant Information
Trace and Log Files
Appendix
Composite Application Framework Core Security Guide
Virus Protection and SAP GUI Integrity Checks
AS ABAP with Integrated ITS
Security Guides for Usage Types EPC and EP
Portal Security Guide
Knowledge Management Security Guide
Collaboration Security Guide
Security Guide for Guided Procedures
SAP NetWeaver Visual Composer Security Guide
Before You Start
Technical System Landscape
User Administration and Authentication
Network and Communication Security
Setting Secure Mode
Data Storage Security
Development Server Repository Security
Security Risks with the SQL Editor and MDX Editor
Virus Scanner
Other Security Relevant Information
Trace and Log Files
Universal Worklist
PDK for .NET Security Guide
Security Guide for Usage Type BI
Security Guide for SAP NetWeaver BI
Security Aspects for Usage Type DI and Other Development Technol
Security of the SAP NetWeaver Development Infrastructure
The SAP NetWeaver Developer Studio: Security Aspects
Deployment Authorizations When Using Deploy Service
Security Aspects of Web Dynpro for Java
Web Dynpro ABAP Security Guide
Data Security in Web Applications
Security of View Context Data
Permissibility of Database Changes for Start, Resume, TimedTrigg
Application Logoff Page
Application Error Page
Security Notes for FileUpload UI Elements
Security Risk List
URL Generation in an AS-ABAP - Web Dispatcher Configuration
Host Header
Absolute URL Generation
Configuration Table HTTPURLLOC
Programming Interface
Scenario 1: Direct Browser - AS-ABAP Communication
Scenario 2: Browser - AS-ABAP Communication Through a Reverse Pr
Szenario 3: Direct Communication and Communication Through a Rev
Scenario 4: Communication with Protocol Switch Through Reverse P
Special Case: Combination with the Logon Application
Security Aspects for BSP
Security Risk List
URL Generation in an AS-ABAP - Web Dispatcher Configuration
Host Header
Absolute URL Generation
Configuration Table HTTPURLLOC
Programming Interface
Scenario 1: Direct Browser - AS-ABAP Communication
Scenario 2: Browser - AS-ABAP Communication Through a Reverse Pr
Szenario 3: Direct Communication and Communication Through a Rev
Scenario 4: Communication with Protocol Switch Through Reverse P
Special Case: Combination with the Logon Application
Security Guide for Usage Type MI
Security Guide for SAP Mobile Infrastructure
Security Guides for Standalone Engines, Clients and Tools
Search and Classification (TREX) Security Guide
SAP Content Server Security Guide
Introduction
User Administration and Authentication
User Management
User Data Synchronization Unix
User Data Synchronization Windows
Communication Channel Security
Network Security
Data Storage Security
Other Security-Relevant Information
Trace and Log Files
Security Information SAP Web Dispatcher
SAP NetWeaver Business Client
Security Guides for Connectivity and Interoperability Technologi
RFC/ICF Security Guide
Security Settings in the SAP Gateway
Security Guide ALE (ALE Applications)
General Security Measures (ALE)
Protecting the ALE Distribution Model
Measures to Take in the Source System
Measures to Take in the Target System
Assigning Authorizations When Using Background Processing
Assigning Authorizations When Using Immediate Processing
Handling Sensitive Data in IDocs
Security Guide for Connectivity with the J2EE Engine
Security Guide Web Services (ABAP)
Before You Start
Web Services Design Time
Technical System Landscape at Design Time
Technical Communication at Design Time
User Administration and Authentication
Defining Operation-Specific Security Authorizations for Web Serv
Checking Input Values
Web Service Runtime Configuration
Technical System Landscape at Runtime
Transport Security for Web Services
Authentication for Web Services
Web Services Security
Security Guide Communication Interfaces
Security Guides for the Operating System and Database Platforms
Operating System Security
SAP System Security Under UNIX/LINUX
Securing the Base Installation
Protecting Specific Properties, Files and Services
Setting Access Privileges for SAP System Directories Under UNIX/
Setting Rights for an Installation with Several SAP Systems
Additional Security Mechanisms on Linux
Additional Information on UNIX/LINUX Security
SAP System Security on Windows
Windows Groups and Users in an SAP System Environment
Windows Operating System User Settings in an SAP System
SAP Systems in the Windows Domain Concept
SAP System Security When Using Windows Trusted Domains
Security Settings for SAP System Resources
Securing Data Relevant to the SAP System
Defining Start and Stop Permissions
Security Settings for Shared Memory
Security Settings for Dynamically-Created Files (Files Created b
Protecting Database Files
Database Access Protection
General Recommendations
Access Using Database Tools
Oracle Under UNIX
Protecting the Database Standard Users
The OPS$ Mechanism Under UNIX
Protecting the SAP Database User
Changing Passwords for Database Users with BRCONNECT
Changing the Passwords for <sapsid>adm and ora<dbsid>
Access Privileges for Database-Related Resources
Setting Access Privileges for Files and Directories
Access Privileges for BR*Tools
Additional Information on Oracle Under UNIX
Oracle on Windows
Protecting the Database Standard Users
The OPS$ Mechanism on Windows
Protecting the SAP Database User
Changing Passwords for Database Users with BRCONNECT
Apply Security Settings for Database-Related File System Resourc
Access Privileges for BR*Tools
Microsoft SQL Server on Windows
Setting Authentication
Registering a Server
Protecting the Database Standard Logins
Changing Passwords for SQL Server Logins
Changing Passwords of Windows Accounts
Access Privileges for Database-Related Resources
Restricting Access to the Database
IBM DB2 for Linux, UNIX, and Windows
SAP MaxDB Security Guide
Technical System Landscape
User Administration and Authentication
Changing Passwords of Standard Users
Checking Log Files for Failed Logon Attempts
Authorizations
Defining Clear Authorizations for Users
Network and Communication Security
Securing Communication Channels
Accessing Databases Behind a Firewall
Using Web Tools Behind a Firewall
Data Storage Security
Changing Passwords of SAP Standard Operating System Users
Encrypting Backups
Dispensable Functions with Impact on Security
Switching Off the Global Listener and SAP MaxDB X Servers
Starting the Global Listener Without NI Support (Unix and Linux)
Removing Demo Data
Other Security-Relevant Information
Checking User Input in SQL Statements
Trace and Log Files
Restricting Access to Log Files
Appendix
SAP Security for IBM i
IBM DB2 for z/OS
Security Aspects for System Management
System Landscape Administration with SAP NetWeaver Administrator
Security Issues in ABAP Software Maintenance
Background Processing
Defining Users for Background Processing
Specifying the Execution of External Programs from Job Steps
Roles and Authorizations Used in Background Processing
Print and Output Management
Alert Management (ALM)
Central Monitoring with CCMS
Security Guide for the SAP System Landscape Directory
Network Topology for the SLD Server
Securing HTTP(S) Connections to the SLD
Securing RFC/JCo Connections to the SLD
Using Logon Tickets for Single Sign-On
Application Access Restrictions
Configuring SLD User Authorizations
SLM Roles
Security Guide for ADK-Based Data Archiving
Security Guide for XML DAS Archiving
Auditing and Logging
Security Guides for the SAP NetWeaver Scenarios
Running an Enterprise Portal: Security Aspects
Providing Uniform Content Access
Implementing a Federated Portal Network
Implementing an External-Facing Portal