SAP NetWeaver Application Server ABAP Security Guide
User Authentication
Authentication and Single Sign-On
Logon and Password Security in the ABAP-System
Password Rules
Security Measures Related to Password Rules
Password Storage and Transport
Profile Parameters for Logon and Password (Login Parameters)
Secure Network Communications (SNC)
Client Certificates
Logon Tickets
User Types
Protecting Standard Users
Preventing Unauthorized Logons
Recognizing and Preventing Multiple Dialog User Logons
Security Measures When Using SAP Shortcuts
Additional Information on User Authentication
AS ABAP Authorization Concept
Overview
Organizing Authorization Administration
Organization if You Are Using the Profile Generator
Setting Up User and Authorization Administrators
Setting Up the Role Administration Tool
Authorization Objects Checked in Role Administration
Organization without the Profile Generator
Creating and Maintaining Authorizations/Profiles Manually
Authorization Checks
Defining the Scope of Authorization Checks
Searching for Deactivated Authority Checks
Globally Deactivating Authorization Checks
Protective Measures for Special Authorization Objects
Generated Role SAP_NEW
Authorization Profile SAP_ALL
User Information System
Central User Administration
Security Aspects of the CUA
Additional Information About the SAP Authorization Concept
Network Security for SAP NetWeaver AS ABAP
AS ABAP Ports
Security Aspects for the Change and Transport System
Technical System Landscape for CTS
Securing the Transport Directory
CTS User Administration and Authentication
CTS Roles and Authorizations
CTS Network and Communication Security
CTS Communication Destinations
Scenarios for CTS RFC Communication
Security Aspects of CTS Data, Data Flow, and Processes
Defining the Transport Process
Securing Production Operation
Monitoring Transport Activities
Web Dynpro ABAP Security Guide
eCATT Security Guide
Before You Start
Technical System Landscape
Authorizations
Authorization Objects Used in eCATT Authorization
Test Developer Authorizations
Tester Authorizations
Test Administrator Authorizations
Setting up authorizations when execution is done locally
Network and Communication Security
Security for eCATT Log Administration
Security for Web Dynpro Testing
Security for External Tool Integration
Security for the Use of SAP GUI Scripting
Security Guide for Embedded Search
User Administration and Authentication
User Management
Authorizations
Network and Communications Security
Security of the Communications Channels
Communication Destinations
Data Storage Security
Security Aspects When Using Business Objects
SAP Business Partner Security
SAP Product Security
Secure Store & Forward Mechanisms (SSF) and Digital Signatures
General Information
Protecting Keys
Protecting the Application Servers Keys
Additional Information on SSF and Digital Signatures
Special Topics
Checking User Input for Program Commands
Logical Operating System Commands
Restrict Authorizations for Maintaining External Commands
Restrict Authorizations for Executing External Commands
Additional Information on Logical Operating System Commands
Protecting Access to the File System Using Logical Path and File
Batch Input
An Overview of the Batch Input Process
Protecting the Batch Input Sessions
HTTP Session Security Protection
Protecting Disclosure of the SAPconnect RFC User
Preventing or Logging List Downloads
Internet Graphics Service Security