Show TOC Start of Content Area

Background documentation SAP NetWeaver Development Infrastructure Security Guide   Locate the document in its SAP Library structure

This graphic is explained in the accompanying text

This guide does not replace the administration or operation guides that are available for productive operations.

Target Audience

·        Technology consultants

·        System administrators

This document is not included as part of the Installation Guides, Configuration Guides, Technical Operation Manuals, or Upgrade Guides. Such guides are only relevant for a certain phase of the software life cycle, whereas the Security Guides provide information that is relevant for all life cycle phases.

Why Is Security Necessary?

With the increasing use of distributed systems and the Internet for managing business data, the demands on security are also on the rise. When using a distributed system, you need to be sure that your data and processes support your business needs without allowing unauthorized access to critical information. User errors, negligence, or attempted manipulation on your system should not result in loss of information or processing time. These demands on security apply likewise to the SAP NetWeaver Development Infrastructure (NWDI). To assist you in securing the NWDI, we provide this Security Guide.

About this Document

The Security Guide provides an overview of the security-relevant information that applies to the NWDI.

The Security Guide comprises the following main sections:

·        Before You Start

This section contains information about why security is necessary, how to use this document, and references to other Security Guides that build the foundation for this Security Guide.

·        Technical System Landscape

This section provides an overview of the technical components and communication paths that are used by the component.

·        User Administration and Authentication

This section provides an overview of the following user administration and authentication aspects:

¡        Recommended tools to use for user management.

¡        User types that are required by the NWDI.

¡        Standard users that are delivered with NWDI.

      Authorizations

This section provides an overview of the authorization concept that applies to the NWDI.

      Network and Communication Security

This section provides an overview of the communication paths used by the NWDI and the security mechanisms that apply.

      Data Storage Security

This section provides an overview of any critical data that is used by the NWDI and the security mechanisms that apply.

End of Content Area