Security options for Event Stream Processor are
configured locally through the cluster.
Authentication modes
and Secure Sockets Layer (SSL) connections are configured in cluster
configuration through ESP Cockpit. See
Cluster
Configuration for more information.
Event Stream Processor supports Kerberos,
RSA, SAP BI, Pre-Configured User,
native OS, SAP HANA, and LDAP security providers. All projects
running in a cluster are subject to the security rules defined for that
cluster. To easily maintain consistent security configurations among all
nodes in a cluster, ensure that all managers running in the same cluster
share a security folder.
Note
For BI authentication, post-install steps are required. See the
Post-Installation section of the
SAP Event Stream Processor: Installation Guide.