
This document is not part of the Developers' Guide, Installation Guide, Configuration Guide, Administration Guide, or Upgrade Guide. The above listed guides are only relevant for a certain phase in the software lifecycle. The Security Guide, in contrast, provides information that affects all phases of the lifecycle.
This guide does not replace the daily operations handbook that we recommend customers to create for their specific productive operations.
Target Groups
Developers
Technical consultants
System administrators
Why Is Security Necessary?
The increasing use of distributed systems and Internet to manage business data has resulted in an increase in security requirements. With a distributed system, you must ensure that your data and processes support the needs of your enterprise without allowing unauthorized access to critical information. User errors, negligence, or attempted manipulation on your system should not result in loss of information or processing time. To assist you in securing voice-based access to business functionality via SAP NetWeaver Voice we provide this Security Guide.
About This Document
The Security Guide provides an overview of the security-relevant information that applies to SAP NetWeaver Voice.
The Security Guide comprises the following sections:
This section contains information on references to other Security Guides that form the basis of the voice security guide.
This section provides an overview of the components and communication paths that SAP NetWeaver Voice uses.
User Administration and Authentication
This section provides an overview of the following user administration and authentication aspects in SAP NetWeaver Voice:
Recommended tools to use for user management
User types that are required by SAP NetWeaver Voice
Standard users that are delivered with SAP NetWeaver Voice
Limitations on Authentication
This section provides an overview of the authorization concept that applies to SAP NetWeaver Voice.
Network and Communication Security
This section provides an overview of the communication paths used by SAP NetWeaver Voice.
Other Security-Relevant Information
This section provides an overview of the trace and log files that contain security-relevant information. These logs help you to reproduce activities in case a security breach occurs.