Start of Content Area

Component documentation Security Guide  Locate the document in its SAP Library structure

Caution

This guide does not replace the daily operations handbook that we recommend you create for specific productive operations.

Target Audience

      Technical consultants

      System administrators

This document is not included as part of the Installation Guides, Configuration Guides, Technical Operation Manuals, or Upgrade Guides. Such guides are only relevant for a certain phase of the software life cycle, whereby the Security Guides provide information that is relevant for all time frames.

Why Is Security Necessary?

With the increasing use of distributed systems and the Internet for managing business data, the demands on security are also on the rise. When using a distributed system, you need to be sure that your data and processes support your business needs without allowing unauthorized access to critical information. User errors, negligence, or attempted manipulation on your system should not result in loss of information or processing time. These demands on security apply likewise to the SAP NetWeaver platform. To assist you in securing SAP NetWeaver Process Integration (PI), we provide this security guide.

About This Document

The security guide provides an overview of the security-relevant information that applies to SAP NetWeaver PI. It contains an overall overview of security with SAP NetWeaver as well as links to the individual guides for each of the SAP NetWeaver PI components, standalone engines, connectivity and interoperability technologies, database and operating system platforms and the various scenarios.

Introduction to Security with SAP NetWeaver PI

Topic

See

Technical System Landscape

Technical System Landscape

Network and Transport Layer Security

Network and Communication Security

 

Security Guides for Usage Types used with SAP NetWeaver PI

Usage Type

See

Application Server (AS)

SAP NetWeaver Application Server ABAP Security Guide

SAP NetWeaver Application Server Java Security Guide

Process Integration (PI)

SAP NetWeaver Process Integration Security Guide

Security Guides for Standalone Engines

Engine

See

Search and Classification (TREX)

Search and Classification (TREX) Security Guide

Advanced Adapter Engine

SAP NetWeaver Process Integration Security Guide

Note

The security aspects to consider when using the non-central version of the Advanced Adapter Engine are the same as for the central version. These aspects are described in detail in the SAP NetWeaver PI Security Guide.

Adapter Engine (Java SE)

SAP NetWeaver Process Integration Security Guide

Note

The Adapter Engine (Java SE) is only supported for compatibility reasons. It hosts only a subset of the adapter functionality and does not support standard security features as security logs or integrated user management. You should only use the Adapter Engine (Java SE) if it is a precondition in your environment.

Security Guides for Connectivity and Interoperability Technologies

Technology

See

Connectivity and Communication with the AS ABAP

Security Aspects for Connectivity and Communication with AS ABAP

Connectivity with the AS Java

Security Guide for Connectivity with the AS Java

Web services

Security Guide Web Services

Security Guides for Operating System and Database Platforms

OS Platform

See

UNIX/LINUX

SAP System Security Under UNIX/LINUX

Windows

SAP System Security Under Windows

DB Platform

See

Oracle

Oracle Under UNIX

Oracle Under Windows

Microsoft SQL Server

Microsoft SQL Server Under Windows

IBM DB2 for Linux, UNIX and Windows

IBM DB2 for Linux, UNIX, and Windows

MySQL Max DB

MySQL MaxDB Security Guide

IBM DB2 for i5/OS

SAP Security Guide for IBM DB2 for i5/OS

IBM DB2 for z/OS

SAP Security Guide for IBM DB2 for z/OS

Security Aspects for System Management

Topic / Product

See

AS ABAP

Security Aspects for AS ABAP System Management

AS Java

Security Aspects for AS Java System Management

Archiving

Security Guide for ADK-Based Data Archiving

Security Guide for XML-Based Data Archiving

Security Guides for SAP NetWeaver PI Scenarios

The security aspects and recommendations for the SAP NetWeaver PI scenarios primarily use the information provided with the above security guides. To determine which of these guides apply in particular for each scenario, see Security Guides for the SAP NetWeaver PI Scenarios.

Meeting Your Own Security Requirements: Security Policy

Your security requirements are not limited to SAP NetWeaver PI, but apply to your entire system landscape. Therefore, we recommend establishing a security policy that reflects the security issues that apply at a company-wide level. Your security policy should cover aspects such as:

      User authentication

      Authorizations

      Data integrity

      Privacy

      Auditing and Logging

Once you have established your security policy, use this guide to implement and enforce security for SAP NetWeaver PI.

 

 

 

End of Content Area