
This guide does not replace the daily operations handbook that we recommend customers to create for their specific productive operations.
Target Audience
Technical consultants
System administrators
About This Document
The security guide provides an overview of the security-relevant information that applies to the test automation tool eCATT.
The aim of this guide is to help you make informed choices about your security policy in your testing environment by explaining the authorizations and other settings required for different kinds of eCATT users. It also explains the security features implemented to protect your systems from unwanted scripting access and unwanted automation.
Overview of the Main Sections
The Security Guide comprises the following main sections:
This section refers to further documentation and guides. In addition, it contains information about the basic settings that you must specify in each client of your SAP system in which you want to run CATT procedures or eCATT test scripts.
This section provides an overview of the technical components used in eCATT test scenarios. The understanding of the technical system landscape is important to be able to understand the eCATT security concept in general.
This section provides an overview of the authorization concept that applies to eCATT. The subsections contain information on the specific role a user can have:
Network and Communication Security
This section provides an overview of the communication paths used by eCATT and how to set up Trusted RFC.
Security for eCATT Log Administration
In this section you find information on log administration security.
Security for Web Dynpro Testing
This section contains information regarding Web Dynpro Testing.
Security for External Tools Integration
This section provides security information that applies to third-party tools used with eCATT.
Security for the Use of SAP GUI Scripting
This section contains information regarding SAP GUI Scripting access.