Introduction

This guide does not replace the administration or operation guides that are available for productive operations.
· Technology consultants
· System administrators
This document is not included as part of the Installation Guides, Configuration Guides, Technical Operation Manuals, or Upgrade Guides. Such guides are only relevant for a certain phase of the software life cycle, whereby the Security Guides provide information that is relevant for all life cycle phases.
With the increasing use of distributed systems and the Internet for managing business data, the demands on security are also on the rise. When using a distributed system, you need to be sure that your data and processes support your business needs without allowing unauthorized access to critical information. User errors, negligence, or attempted manipulation of your system must not result in loss of information or processing time. These security requirements apply equally to Master Data Framework. To assist you in securing Master Data Framework, we provide this Security Guide.
The Security Guide provides an overview of the security-relevant information that applies to Master Data Framework.
The security guide comprises the following main sections:
· Before You Start
This section contains information about why security is necessary, how to use this document, and references to other Security Guides that build the foundation for this Security Guide.
· Technical System Landscape
This section provides an overview of the technical components and communication paths that are used by Master Data Framework.
· User Administration and Authentication
This section provides an overview of the following user administration and authentication aspects:
¡ Recommended tools to use for user management.
¡ User types that are required by Master Data Framework
¡ Standard users that are delivered with Master Data Framework
¡ Overview of the user synchronization strategy, if several components or products are integrated
¡ Overview of integration options in Single Sign-On environments
· Authorizations
This section provides an overview of the authorization concept that applies to the Master Data Framework.
· Network and Communication Security
This section provides an overview of the communication paths used by Master Data Framework and the security mechanisms that apply. It also includes our recommendations for the network topology to restrict access at the network level.