Show TOC

Centralized SecurityLocate this document in the navigation structure

Security options for Event Stream Processor are configured locally through the cluster.

Authentication modes and Secure Sockets Layer (SSL) connections are configured in cluster configuration through ESP Cockpit. See Cluster Configuration for more information. Event Stream Processor supports Kerberos, RSA, SAP BI, Pre-Configured User, native OS, SAP HANA, and LDAP security providers. All projects running in a cluster are subject to the security rules defined for that cluster. To easily maintain consistent security configurations among all nodes in a cluster, ensure that all managers running in the same cluster share a security folder.
Note

For BI authentication, post-install steps are required. See the Post-Installation section of the SAP Event Stream Processor: Installation Guide.