PUBLIC SAP Business ByDesign, SAP Cloud for Customer, and SAP Cloud for Travel and Expense Security Guide
|
|
|
- Dennis Stevens
- 9 years ago
- Views:
Transcription
1 SAP Cloud Handbook Document Version: PUBLIC SAP Business ByDesign, SAP Cloud for Customer, and SAP Cloud for Travel and Expense Security Guide
2 Table of Contents 1 Document History Introduction About this Document Why is Security Necessary? Document Structure Technical System Landscape Security Aspects of Data, Data Flow, and Processes Communication Channels Business-To-Business Communication and Application Integration Integration of SAP Cloud for Travel and Expense with Other Components User Administration and Authentication User Management User Types Authentication Mechanisms Logon Using SAML 2.0 Assertion for Front-End Single Sign-On (SSO) Logon Using Client Certificate (X.509) Logon Using User ID and Password Security Policy Authorizations Authorization Assignment Access Restriction Segregation of Duties Mobile Applications General Information Mobile Apps Authorizations Secure System Access and Authentication Password Change and Password Reset Special Considerations Data Storage Password Retention Support Log Files Cache Files Offline Mode SAP AG or an SAP affiliate company. All rights reserved. Table of Contents
3 7.7.5 Local Application Data Storage Front-End Security Microsoft Silverlight HTML Security of Data Storage and Data Centers Asset Protection and Data Integrity Power Backup and Redundancy Restricted Physical Access Communication Security Network Security Security for Additional Applications Other Security-Relevant Information Service Composition Security URL Mashup Integration HTML Mashup Integration Map Mashup Integration Data Mashups Internal and External Audits Security Management and Continual Improvement of Security Security-Relevant Logging and Tracing Data Privacy Security-Relevant Reports Table of Contents 2014 SAP AG or an SAP affiliate company. All rights reserved. 3
4 1 Document History Table 1: Version Date Change Initial version for SAP Business By Design, SAP Cloud for Customer, and SAP Cloud for Travel and Expense November The following chapters have been updated: Business-to-Business Communication and Application Integration Logon Using Client Certificate (X.509) SAP AG or an SAP affiliate company. All rights reserved. Document History
5 2 Introduction Note This guide does not replace the administration or operation guides that are available for productive operations. are referred to collectively as SAP Cloud solutions in this guide. The individual solutions are mentioned only if specific security aspects of a solution are described. 2.1 About this Document The Security Guide provides an overview of the security-relevant information that applies to SAP Business ByDesign, SAP Cloud for Customer, and SAP Cloud for Travel and Expense, which are referred to collectively as SAP Cloud solutions in this guide. The individual solutions are mentioned only if specific security aspects of a solution are described. 2.2 Why is Security Necessary? With the increasing use of distributed systems and the Internet for managing business data, demands on security are also on the rise. When using a distributed system, you must ensure that your business processes do not permit unauthorized access to critical information. User errors, negligence, or attempted manipulation of your system should not result in loss of information or processing time. These security requirements apply equally to SAP Cloud solutions. To assist you in ensuring the security of your SAP Cloud solution, we provide this Security Guide. 2.3 Document Structure The Security Guide contains the following sections: Technical System Landscape This section describes the technical components and communication paths that are used in the solutions. User Administration and Authentication This section describes the user administration tools, and the system access and authentication concept that applies to the solutions. Authorizations This section describes the authorization concept of the solutions. Introduction 2014 SAP AG or an SAP affiliate company. All rights reserved. 5
6 Mobile Applications This section describes mobile applications. Front-End Security This section describes the security mechanisms that apply to the front end. Security of Data Storage and Data Centers This section describes critical data that is used by the solutions, and the security mechanisms that apply. Security for Additional Applications This section contains security information about additional software components that are associated with the solutions. Other Security-Relevant Information This section contains information about service composition security, and internal and external audits. Security-Relevant Logging and Tracing This section describes trace and log files that contain security-relevant information, allowing you to reproduce activities if a security breach occurs SAP AG or an SAP affiliate company. All rights reserved. Introduction
7 3 Technical System Landscape SAP Cloud solutions are Software as a Service (SaaS) offerings that run in the SAP private cloud. The solutions provide optional integration with a full Enterprise Resource Planning (ERP) suite, including the associated server landscape and system maintenance. Since SAP Cloud solutions deal with business data from your core business processes, SAP adheres to the highest security and quality requirements, as follows: The business data is stored securely in SAP data centers. Customers share physical hardware, but their data is separated into tenants. Users who require access to the business data must authenticate themselves, and their identity must be verified by user and access management. Customer data always belongs to the customer. You can access your SAP Cloud solution in the following ways: Desktop computer: browser-based Internet access from your network Portable computers Mobile devices Industry best practices and state-of-the-art open cryptographic standards secure and protect communications between customer devices and the system landscapes of your SAP Cloud solution in the SAP data center. The following diagram summarizes the technical system landscape for standard access: To access SAP Cloud solutions, you must enter a unique, customer-specific URL. Communication is carried out via the Reverse Proxy (RP) component in the SAP data center. The Reverse Proxy is the SAP Web Dispatcher, which is developed and maintained by SAP Cloud Support. The communication channels that require mutual authentication are secured by using standard Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols. For more information about connectivity, see the Technical Connectivity Guide for SAP Cloud Applications, which you can find on SAP Service Marketplace at Release & Upgrade Info Installation & Upgrade Guides Cloud Solutions from SAP <SAP Cloud Solution> <Release>. Technical System Landscape 2014 SAP AG or an SAP affiliate company. All rights reserved. 7
8 The server certificate used by the reverse proxy must be trusted by the SAP Cloud system. You can download these certificates at The communication channels for monitoring and maintaining instances of your SAP Cloud solution instances in the SAP data center network are also encrypted and authenticated. For more information, see SAP Help Portal at Security Information. Ensure that you also read the following relevant subsections: Using Firewall Systems for Access Control Application-Level Gateways Provided by SAP Web Dispatcher Using Multiple Network Zones You can upload attachment files to your SAP Cloud solution in several application scenarios, for example in billing or in data migration. Regularly updated antivirus software checks the uploaded files for viruses and other types of malicious software. Recommendation In addition to this antivirus software, we recommend that our customers also use antivirus software. Uploaded files are blocked based on their filename extensions, which can be manipulated. In Business Configuration, you can define which file types can be uploaded to your solution. You should note that filename extensions can be changed to disguise the actual file format of the file SAP AG or an SAP affiliate company. All rights reserved. Technical System Landscape
9 4 Security Aspects of Data, Data Flow, and Processes 4.1 Communication Channels The table below shows the communication channels used by SAP Cloud solutions, the protocol used for the connection, and the type of data transferred. Communication Path Protocol Used Technology Used Type of Data Transferred Data Requiring Special Protection Web browser acting as front-end client to access the hosted SAP Cloud solution system HTTPS REST services Application data User IDs, passwords SAP Cloud for Travel and Expense to post financial data to customer ERP system File-based transfer of master data from customer ERP system to SAP Cloud for Travel and Expense HTTPS System-to-system connection List of personal travel expenses (for financial reimbursement, taxation, and G/L posting) Master data (employees, cost centers, internal orders, projects, currency exchange rates, sales orders) Expense report details Basic employee data, cost centers Apple ipad application, Apple iphone, BlackBerry player, Android, (SAP Business ByDesign, SAP Cloud for Customer, and SAP Cloud for Travel and Expense), Windows Phone (SAP Business ByDesign) HTTPS REST services Application data User IDs, passwords, application data SMTP SMTP server Application data Confidential data Business-to-business communication and application integration HTTPS Web services Application data Application data Security Aspects of Data, Data Flow, and Processes 2014 SAP AG or an SAP affiliate company. All rights reserved. 9
10 Note SAP Cloud solutions use port 443 for HTTPS connectivity. Caution We strongly recommend that you use secure protocols such as Secure Socket Layer (SSL) or Secure Network Communication (SNC). 4.2 Business-To-Business Communication and Application Integration Business-to-Business (B2B) communication and application integration refers to the exchange of businessrelated data across administrative domains. These domains need not necessarily belong to different entities, such as companies; they can also represent different geographic subsidiaries of the same company. Communication arrangements enable you to configure the electronic data exchange between your solution and a communication partner. A communication partner can be a business partner in a B2B communication scenario or an external communication system that is used for application integration, for example, external time recording or master data systems. Your SAP Cloud solution provides communication scenarios for inbound and outbound communication that you can use to create communication arrangements. Inbound communication defines how business documents are received from a communication partner, whereas outbound communication defines how business documents are sent to a communication partner. Before you can use electronic data exchange for a particular business process, you must configure and activate a communication arrangement for the corresponding communication scenario. You can do so during your solution configuration or, after configuration is complete, in the Communication Arrangements work center view in the Application and User Management work center. You can find the list of trusted certification authorities for server certificates in the Application and User Management work center under Common Tasks Edit Certificate Trust List. Security configuration for electronic data exchange is conducted at the communication arrangements level, where you can configure the authentication method and communication security. Like end user authentication, B2B communication and application integration can be authenticated by two mechanisms: user ID plus password, and the X.509 client certificate. For inbound communication, you can upload the communication partner s client certificate in the configuration user interface, and map it to the communication user. Caution You can download an X.509 key pair from your SAP Cloud solutions. These key pairs are only intended for communication with the SAP Cloud solution and must not be used for other communication. This is because the corresponding certificate can be blocked in the solution and you can make the key pair invalid for logging on to the client but you cannot invalidate its other uses SAP AG or an SAP affiliate company. All rights reserved. Security Aspects of Data, Data Flow, and Processes
11 For outbound communication, you can upload a PKCS#12 container file, consisting of a private key and the corresponding client certificate that must be trusted and mapped by the communication partner. Administrators can monitor the validity of client certificates in the Application and User Management work center under Common Tasks Edit Certificate Trust List. Certificates have a validity period and expire at a defined point in time. Before expiration, they must be renewed; if the client certificate s Subject or Issuer has changed, then the upload and mapping process must be repeated. Communication arrangements are the customer s responsibility, since their configuration reflects the specific details of their business partner. As a result, expiring certificates cannot be replaced automatically by SAP; this action must be performed by the customer. A good security concept also includes mandatory periodic password changes. These changes must be performed synchronously by both parties involved. If an expired client certificate is renewed with the same attributes, the certificate information can be exchanged asynchronously. Recommendation We recommend authentication using Single-Sign on with SAMLfor browser-based access and user names plus passwords for access from mobile devices. Please ensure that the passwords used are strong enough Integration of SAP Cloud for Travel and Expense with Other Components Data flow and processes are handled as follows in a system landscape where SAP Cloud for Travel and Expense is integrated with other components: For IDoc-XML and Web service replication, data is encrypted using HTTPS protocol. File-based master data upload can be encrypted, except currency exchange rates. XLS file-based posting is not encrypted Security Mechanisms for the Exchange of Master Data and FI Expense Data Using Messages The transfer of master data from the customer ERP landscape to SAP Cloud for Travel and Expense as well as the posting of expense reports is handled using IDoc XML messages or web services. The communication channels are encrypted using the HTTPS protocol. Proper authorizations are required to execute the master data transfer steps on both sides Security Mechanisms for the Exchange of Master Data and FI Expense Data Using XLS/XML Files The transfer of master data from your ERP landscape to SAP Cloud for Travel and Expense can also be handled using.xml files. If you replicate from an SAP ERP system the files can be encrypted at download time and Security Aspects of Data, Data Flow, and Processes 2014 SAP AG or an SAP affiliate company. All rights reserved. 11
12 decrypted by SAP Cloud for Travel and Expense at upload time. Administrators manually control this process and need to provide passphrases for encryption. Ensure that you follow SAP guidelines for secure passwords. Recommendation We recommend that you use the file-based communication only if you cannot use IDoc messages or web services. Proper authorizations are required to execute the master data transfer steps on both sides. SAP Cloud for Travel and Expense also allows the transfer of accounting data using.xls files to non-sap financial target systems, which typically accept only non encrypted data. These files are not encrypted at download time. Therefore, we strongly recommend that you ensure that.xls files for financial accounting are stored on encrypted file systems and handled with specific care with respect to security, that is, very restricted set of involved personnel, careful handling and deletion of transferred data files. For more information, see the SAP Cloud for Travel Integration Guide on SAP Service Marketplace at service.sap.com/instguides Installation & Upgrade Guides On-Demand Solutions from SAP SAP Cloud for Travel and Expense November Security Risk in the Communication with SAP ERP The customer s SAP ERP system acts as a governing instance for SAP Cloud for Travel and Expense. Any manipulation of data during the manual upload process (file-based replication) to SAP Cloud for Travel and Expense is very likely to be discovered because the original data resides in SAP ERP, and will result in data inconsistencies. Example FI expense posting errors will occur when you try to book on a non-existing cost center in SAP ERP. You can also use regular reporting means to discover unauthorized transactions. Personnel-related data is often critical. However, SAP Cloud for Travel and Expense only requires and stores very basic personal data, such as name, address, and user ID. The following information is not transferred to SAP Cloud for Travel and Expense: Date and place of birth Salary Bank account data Passwords Recommendation As a system administrator, you must ensure that all transfer files are deleted securely after uploading the data to SAP Cloud for Travel and Expense SAP AG or an SAP affiliate company. All rights reserved. Security Aspects of Data, Data Flow, and Processes
13 Online Booking and Itinerary Management Tools SAP Cloud for Travel and Expense uses a set of Web services provided by the online booking tool to enable automatic replication of booking data as well as approval workflow integration for itineraries. The user and password for the technical user that is used for Web service authentication is maintained in the communication arrangement and securely stored, that is in Secure Storage of the communication arrangement. The Web service is based on SOAP over HTTPS (data exchange is encrypted via SSL/TLS). For the navigation from SAP Cloud for Travel and Expense to the online booking tool, a POST request over HTTPS is used. SAP Cloud for Travel and Expense uses a set of Web services provided by the itinerary management tool to enable automatic replication of itinerary data. As a prerequisite for the integration with Traxo, you must enable the client registration for OAuth web services by entering client ID and client secret as provided by Traxo in the Fine Tuning settings of SAP Cloud for Travel and Expense. For more information, see SAP Cloud for Travel Integration Guide Traxo. Integrating SAP Cloud for Travel with Every user has to allow the system to replicate data on their behalf. When the user logs on to SAP Cloud for Travel and Expense, the system automatically replicates the itinerary data from the itinerary management tool to SAP Cloud for Travel and Expense. For the navigation from SAP Cloud for Travel and Expense to the itinerary management tool, a POST request over HTTPS / Oauth is used Credit Card Issuers SAP Cloud for Travel and Expense uses a credit card Web service provided by Paymetric to enable the automatic and secure processing of expense-related credit card data, thereby ensuring that credit card data is handled in accordance with PCI security standards. When SAP Cloud for Travel and Expense receives credit card transaction data from a credit card issuer, it does so through the Paymetric tokenization and file import Web service. This ensures cardholder numbers are intercepted and replaced with a token ID. The Web service allows you to import credit card transactional data that is encrypted and stored in a centralized database maintained by Paymetric. The Web service then returns a token that is used in place of the sensitive data. The token is saved in your SAP Cloud for Travel and Expense database and can be used throughout your system. The Web service is based on the standard Simple Object Access Protocol (SOAP v 1.1) protocol. The Web service uses client certificates to identify the source of the Web service call. Paymetric provides you with instructions for generating a certificate signing request (CSR) that also generates a private key. You send the CSR to Paymetric. Paymetric generates a certificate using the CSR and returns the signed client certificate (.csr file) to you. You save the signed client certificate and the private key to a secure location on a machine to which your client application has access. These files are then referenced in the SOAP header of your Web service calls. Security Aspects of Data, Data Flow, and Processes 2014 SAP AG or an SAP affiliate company. All rights reserved. 13
14 Central Receipt Scanning and Electronic Invoices SAP Cloud for Travel and Expense provides Web services for use by the third-party central receipt scanning service to enable automatic upload of receipt images to employee-related expense reports. In addition, it provides a Web service, Electronic Invoice Notification, for use by third-party service providers who want to send electronic invoices for travel expenses to SAP Cloud for Travel and Expense. The Web service is based on SOAP over HTTPS. Certificates for third-parties are used for Web service authentication, and are maintained and securely stored in the relevant communication arrangement. It is recommended to use certificates for authentication. It is also possible to use a password. The inbound Web service connection is authenticated with a client certificate to identify the source of the Web service call. Both the central receipt scanning service and the electronic invoice service have their own separate client certificates, and it is the responsibility of the third-party to provide the certificate to the system administrator of SAP Cloud for Travel and Expense for upload. The client certificate is saved to a secure location on the machine which the SAP Cloud for Travel and Expense solution accesses. These files are then referenced in the SOAP header of your Web service calls. It is also the responsibility of the third-party to renew the certificate in time, send the SAP Cloud for Travel and Expense system administrator the renewed certificate, and choose a certificate authority trusted by SAP. If no certificate is provided by the third-party, you can download it from the Communication Arrangements view in the Application and User Management work center Receipts In SAP Cloud for Travel and Expense, travelers can upload receipts to be attached to the expense report. The following formats are supported:.bmp.gif.jpg/.jpeg.pdf (not supported on smartphone devices).png.tif/.tiff (not recommended and not supported on smartphone devices) Note The size for the above file types cannot exceed 6 MB Electronic Invoices In SAP Cloud for Travel and Expense, third-party travel service providers can send electronic invoices to be assigned to travelers and to expense reports SAP AG or an SAP affiliate company. All rights reserved. Security Aspects of Data, Data Flow, and Processes
15 The following MIME types are supported for attachments:.gif.image/.png.jpeg.pdf.png.tiff (not recommended and not supported on smartphone devices) Note The size for the above file types cannot exceed 2,5 MB Smart Receipt Recognition SAP Cloud for Travel and Expense enables the automated optical character recognition of receipt images sent to SAP Cloud for Travel and Expense by as attachments. Receipt images are analyzed to extract text relating to expense type, date, amount, and currency. The data exchange between SAP Cloud for Travel and Expense and OpenText is based on SOAP over HTTPS (data exchange is encrypted via SSL/TLS). The following MIME types are supported for smart receipt recognition:.gif.jpg/.jpeg.pdf.png.tif/.tiff 4.3 SAP Cloud solutions enable you to encrypt outgoing s and check the signature of incoming s by using the Secure/Multipurpose Internet Mail Extensions (S/MIME) standard. You can use this function for communication between your system and your employees, in scenarios provided by SAP (for example, self-service or approval scenarios). You can specify which scenarios you want to use in Business Configuration. Caution We strongly recommend that you only send encrypted mails and accept only signed s. The system uses the same certificate for signature check and encryption, which means that the same private key is used for signing and decrypting an to or from an employee. The following MIME types are supported for communication with the system: Security Aspects of Data, Data Flow, and Processes 2014 SAP AG or an SAP affiliate company. All rights reserved. 15
16 .gif.jpg/.jpeg.pdf.tif/.tiff.png Caution When you use S/MIME, ensure that the data is encrypted. Please note that header data, for example, the subject line, is not encrypted. The sensitivity setting for password s is set by default to private. The following diagram provides an overview of how encryption and signature is set up: Figure 1: Security with S/MIME SAP AG or an SAP affiliate company. All rights reserved. Security Aspects of Data, Data Flow, and Processes
17 5 User Administration and Authentication 5.1 User Management User management for SAP Business ByDesign and SAP Cloud for Travel and Expense is located in the Application and User Management work center. User management for SAP Cloud for Customer is located in the Administrator work center. The following table provides an overview of all activities related to user administration that you can perform as an administrator: Table 2: View Subview Activity Documentation in the Help Center Application and User Management (SAP Business ByDesign and SAP Cloud for Travel and Expense) Business Users Lock and unlock users Change user password Edit the validity of a user Business Users Quick Guide Administrator (SAP Cloud for Customer) Assign security policies to users Assign access rights to users for work centers and work center views Restrict read and write access for users to specific data Assign business roles to users Support and Technical Users View all support and technical users available in the system Business Roles Define access rights in business roles Business Roles Quick Guide Application and User Management (SAP Business ByDesign and SAP Cloud for Travel and Expense) Administrator (SAP Cloud for Customer) Communication Arrangements Communication Certificates Create technical users for electronic data exchange Manage certificates that you use for electronic data exchange Business Roles Quick Guide Personalize my Settings User Administration and Authentication 2014 SAP AG or an SAP affiliate company. All rights reserved. 17
18 View Subview Activity Documentation in the Help Center Common Tasks (SAP Business ByDesign and SAP Cloud for Travel and Expense) Business Configuration (SAP Cloud for Customer) Edit Security Policies Configure Single Sign On Specify security policies for user passwords Download service provider metadata, upload IdP metadata, and activate SSO Security Policies Quick Guide Configure your Solution for Single Sign-On Configure S/MIME Configure and activate e- mail communication with S/MIME Security Configuration: Load Certificates and Activate Signing and Encryption for s Edit Certificate Trust List Edit trust list of certificates used for communication arrangements Communication Arrangements Quick Guide Note The list of trusted certification authorities is available on the Web dispatcher. Certificates with which users log on must be issued by one of these certification authorities. For more information about how to perform these activities, see the documentation of the corresponding work center view. 5.2 User Types SAP Cloud solutions provide the following user types: User Type Business User Description A user type for normal interactive users resulting from hiring an employee or creating a service agent. Business users always have to change their initial password during the first logon. The properties of the passwords are determined by the assigned security policy SAP AG or an SAP affiliate company. All rights reserved. User Administration and Authentication
19 User Type Description Note Service agents are used for external users, for example, partners or partner contacts. Apply specific security policies and use specific roles to keep internal and external employees separated. We also recommend that you lock external users as soon as they are no longer needed. Technical User Support User A user type for non-interactive usage, either predefined by SAP for technical operations or resulting from the creation of communication arrangements. Technical users either do not have passwords or have password but do not have to change them. A user type for interactive support users used by SAP Cloud Services to access the system as part of incident processing. It is often necessary to specify different security policies for different users. For example, your policy may mandate that individual users who perform tasks interactively change their passwords on a regular basis. You can only specify security policies for the Business User user type. 5.3 Authentication Mechanisms Every user type must authenticate itself to SAP Cloud solutions for regular browser-based front-end access, as well as for electronic data exchange, such as Business-to-Business communication. SAP Cloud solutions do not support anonymous access. When a new user is created in your SAP Cloud solution, for example, during the hiring process of a new employee, a user ID is created. To log on your SAP Cloud solution, the following authentication mechanisms are supported: Logon using SAML 2.0 assertion for front-end Single Sign-On (SSO) Logon using client certificate (X.509) as logon certificate Logon using user ID and password User Administration and Authentication 2014 SAP AG or an SAP affiliate company. All rights reserved. 19
20 5.3.1 Logon Using SAML 2.0 Assertion for Front-End Single Sign-On (SSO) Your solution supports SSO based on Security Assertion Markup Language 2.0 (SAML 2.0). To use this function, your system landscape requires the following components: An SAML 2.0 enabled identity provider (IdP) At least one local service provider, for example, your solution or a Web-based 3rd-party product A browser client The use of an SAML 2.0. enabled identity provider is mandatory. If you have no identity provider, it is recommended that you use SAP Identity Provider. When a user connects to the service provider by using the corresponding URL, the browser redirects the authentication request to the IdP. If the user is not yet logged on, he or she is prompted to logon to the IdP. After that the browser redirects the connection back to the original URL and the user is automatically logged on to the service provider. This process flow is always the same for all server providers. The mutual trust between service provider and IdP is established by the exchange of certificates and additional metadata. For more information, see the Front-End Single Sign-On document in the Help Center and the SAP Identity Provider documentation on SAP Help Portal at Management <release> Application Help. SAP NetWeaver Identity Logon Using Client Certificate (X.509) Users can also log on with a client certificate to complete authentication. To do so, users can choose between the following options: If users already possess a suitable client certificate from a trusted Certification Authority, then they can map the client certificate to their user ID. If no suitable client certificate is available, then users can request a client certificate from within the SAP SAP Cloud solution. In response, an SAP Certification Authority will provide the requested certificate. This request can be repeated on any other device you use to access SAP Cloud solutions. You cannot use the same certificate to log on with multiple users. We strongly recommend that you never store the X.509 client certificate in an unprotected keystore. The download also contains the corresponding private key. Therefore, the downloaded file should be protected with a sufficiently strong passphrase of the user s choice. The following table contains the trusted certification authorities for client certificates: Table 3: Trusted Certification Authorities Country Organization Organizational Unit DE Deutsche Telekom AG T-TeleSec Trust Center Common Name Common Name E- Mail Deutsche Telekom Root CA SAP AG or an SAP affiliate company. All rights reserved. User Administration and Authentication
21 Country Organization Organizational Unit Common Name Common Name E- Mail DE SAP Trust Community SAP Passport CA DE TC TrustCenter GmbH TC TrustCenter Class 2 CA DE TC TrustCenter GmbH TC TrustCenter Universal CA TC TrustCenter Class 2 CA II TC TrustCenter Universal CA I DE TC TrustCenter for Security in Data Networks GmbH TC TrustCenter Class 1 CA [email protected] IE Baltimore CyberTrust Baltimore Cyber Trust Root US Entrust.net incorp. by ref. (limits liab.), (c) 1999 Entrust.net Limited US Entrust.net Client_CA_Info/ CPS incorp. by ref. limits liab., (c) 1999 Entrust.net Limited US Equifax Equifax Secure Certificate Authority Entrust.net Secure Server Certification Authority Entrust.net Client Certification Authority US GTE Corporation GTE CyberTrust Solutions, Inc. GTE CyberTrust Global Root US GoDaddy.com, Inc. Go Daddy Secure Certification Authority US The Go Daddy Group, Inc. Go Daddy Class 2 Certification Authority US VeriSign, Inc. Class 1 Public Primary Certification Authority US VeriSign, Inc. Class 1 Public Primary Certification Authority User Administration and Authentication 2014 SAP AG or an SAP affiliate company. All rights reserved. 21
22 Country Organization Organizational Unit Common Name Common Name E- Mail - G2, (c) 1998 VeriSign, Inc. - For authorized use only, Veri Sign Trust Network US VeriSign, Inc. Class 2 Public Primary Certification Authority US VeriSign, Inc. Class 1 Public Primary Certification Authority US VeriSign, Inc. Class 1 Public Primary Certification Authority - G2, (c) 1998 VeriSign, Inc. - For authorized use only, Veri Sign Trust Network US VeriSign, Inc. Class 2 Public Primary Certification Authority US VeriSign, Inc. Class 2 Public Primary Certification Authority - G2, (c) 1998 VeriSign, Inc. - For authorized use only, Veri Sign Trust Network US VeriSign, Inc. Class 3 Public Primary Certification Authority US VeriSign, Inc. Class 3 Public Primary Certification Authority - G2, (c) 1998 VeriSign, Inc. - For authorized use only, Veri SAP AG or an SAP affiliate company. All rights reserved. User Administration and Authentication
23 Country Organization Organizational Unit Common Name Common Name E- Mail Sign Trust Network US VeriSign, Inc. Class 4 Public Primary Certification Authority - G2, (c) 1998 VeriSign, Inc. - For authorized use only, Veri Sign Trust Network US VeriSign, Inc. VeriSign Trust Network, (c) 1999 VeriSign, Inc. - For authorized use only US VeriSign, Inc. VeriSign Trust Network, (c) 1999 VeriSign, Inc. - For authorized use only US VeriSign, Inc. VeriSign Trust Network, (c) 1999 VeriSign, Inc. - For authorized use only US VeriSign, Inc. VeriSign Trust Network, (c) 1999 VeriSign, Inc. - For authorized use only US VeriSign, Inc. VeriSign Trust Network, (c) 2006 VeriSign, Inc. - For authorized use only VeriSign Class 1 Public Primary Certification Authority VeriSign Class 2 Public Primary Certification Authority - G3 VeriSign Class 3 Public Primary Certification Authority - G3 VeriSign Class 4 Public Primary Certification Authority - G3 VeriSign Class 3 Public Primary Certification Authority - G5 Thawte Premium Server CA Thawte Server CA ZA Thawte Consulting cc Certification Services Division [email protected] ZA Thawte Consulting cc Certification Services Division [email protected] User Administration and Authentication 2014 SAP AG or an SAP affiliate company. All rights reserved. 23
24 For more information about trust configuration, see SAP Help Portal at SAP NetWeaver Platform <release> Application Help Function-Oriented View <language> Security User Authentication and Single Sign-On Integration in Single Sign-On (SSO) Environments Single Sign-On for Web- Based Access Using X.509 Client Certificates Using X.509 Client Certificates on the AS ABAP Configuring the System to Use the SAP Trust Center Service Logon Using User ID and Password Users log on to SAP Cloud solutions with their assigned user ID and password. By default, a strong security policy for passwords is pre-configured in your solution, based on SAP s product security standard. You as an administrator can set an initial password and edit and create security policies according to the security requirements of your company. For more information, see Security Policy [page 24]. If a user has forgotten the password, he or she can request a new one by using the password self-service on the logon screen. A dialog box is displayed where the user has to enter the workplace address. Provided this workplace address has already been entered for corresponding employee or service agent in your solution, an containing a security code is sent to this address. The system then displays a dialog box where the user can enter this security code. Note that the security code is only valid in this dialog box. If the security code has been entered correctly, the system generates a new temporary password with which the user can log on to the system. The system immediately displays another dialog box requiring the user to change this temporary password. 5.4 Security Policy You as an administrator can increase the security level, if desired, by editing and enhancing the security policy, for example, by changing the complexity and validity for all passwords, in accordance with your company s security requirements. You can also define the length of time after which mobile users must reenter the app password to log on to the system from a mobile device and the maximum number of times in succession a user can enter an incorrect password before mobile app data is deleted from the mobile device as well as other properties regarding the complexity of the password. For more information about the app password, see Secure System Access and Authentication SAP AG or an SAP affiliate company. All rights reserved. User Administration and Authentication
25 6 Authorizations 6.1 Authorization Assignment You can assign authorizations to each employee who has a user ID in your solution. Employees are assigned to org units within organizational management. The assigned org unit determines the functions that the employee can use. Based on these functions, work centers and work center views are proposed for the users. Some business processes require that a work center view can only be assigned together with one or more other work center views. If you as an administrator assign such a work center view to a user, then your solution automatically assigns these additional views to the user. In SAP Customer OnDemand, you can enable partner contacts to access your SAP system by creating a user ID separate from employees in your solution. Partner contacts are service agents, being used to give external employees system access. Partner contacts should be assigned with their own business roles to maintain limited access to your SAP system. Caution Creating user IDs for your business partners will allow outside access to your system. 6.2 Access Restriction You can define whether a particular user has read or write access to data in a work center view. Your SAP Cloud solution provides the user with access to all of the business documents and Business Task Management items in that work center view. You can restrict access to specific data on the basis of the access context assigned to the work center view in which the data appears. Caution It is important to be aware of the following dependencies when you assign work centers and views directly to users: Each work center view contains specific activities that can be carried out by a user with the necessary access rights for the view. When you assign a view or work center directly to a user, rather than assigning these through a business role, by default the user will have unrestricted read and write access to all the functions associated with the work center view. Additionally, in some cases the same activities can be carried out in multiple views. When you grant access rights, you should be aware that if there is a conflict, unrestricted access rights override any restrictions Authorizations 2014 SAP AG or an SAP affiliate company. All rights reserved. 25
26 you have defined. For example, view A and view B both contain activity C. For view A, a user has unrestricted read and write access but for view B, the same user has read-only access. Because unrestricted access rights override restricted access rights, the user will actually have both read and write access to both views. Recommendation We recommend that you handle access rights by assigning business roles to users rather than by assigning work centers views directly to users. The advantages of assigning access rights through business roles are considerable: It eliminates the risk of a user accidently having authorizations to read or edit data to which he or she should not have unrestricted access. There is much less maintenance effort involved when you have to edit access rights, for example, after an upgrade. You only have to edit the access rights associated with the business role and not the individual user s access rights. 6.3 Segregation of Duties If the user has been assigned to multiple work centers, your SAP Cloud solution checks whether the assigned views conflict with the segregation of duties. Segregation of duties is designed to minimize the risk of errors and fraud, and to protect company assets, such as data or inventories. The appropriate assignment of access rights distributes the responsibility for business processes and procedures among several users. For example, suppose that your company requires that two employees be responsible for the payment process. This requirement ensures that the responsibility for managing company finances is shared by two employees. A segregation of duties conflict occurs when a user has access to a set of work center views that could enable him or her to make an error or commit fraud, thereby damaging company assets. If the application detects a conflict, it indicates that conflict in the user interface and proposes possible solutions. Based on this information, you can alert business process owners to existing conflicts, so that they can implement process controls to mitigate them SAP AG or an SAP affiliate company. All rights reserved. Authorizations
27 7 Mobile Applications 7.1 General Information The following table provides information about the mobile devices on which you can run SAP Cloud solutions. SAP Cloud Solution Device/Operating System Offline Support iphone/ipad Blackberry Android Windows Phone x SAP Business ByDesign SAP Cloud for Customer SAP Cloud for Travel and Expense x x x x x x x x x x x x x x x * * SAP Cloud for Travel and Expense supports offline mode for Android, iphone, and BlackBerry, but not for ipad With the SAP Cloud mobile solutions, you can access many of the functions that have been tailored to business on-the-run. Changes made on mobile apps are automatically updated in the system over the Internet, online, and in real time. Mobile apps connect to the SAP Cloud solution in the same way as personal computers do. 7.2 Mobile Apps You can download the mobile apps for SAP Cloud solutions from the respective stores as follows: Download the app for your SAP Cloud solution for the Apple iphone or ipad from the itunes Store. A notification will be displayed on-device when a new version of the app is available for download. Download the app for your SAP Cloud solution for BlackBerry Curve and Bold smartphones running software versions 4.5 to 7.x from BlackBerry App World. If necessary, the app can also be manually downloaded to a computer from the SAP Cloud solution system. If the app is manually installed on a BlackBerry smartphone, users will not be prompted to upgrade when a new version becomes available for download. Install the app for your SAP Cloud solution for Android smartphones from the Google Play Store. A notification will be displayed on-device when a new version of the app is available for download. Install the SAP Business ByDesign app for the Windows Phone smartphone from the Windows Phone Marketplace. A notification will be displayed on-device when a new version of the app is available for download. Install the SAP Mobile Execution app for Windows Mobile from SAP Business ByDesign. For more information, see the device manufacturer's documentation. App help is available on-device. Mobile Applications 2014 SAP AG or an SAP affiliate company. All rights reserved. 27
28 Caution If the app is manually installed on a BlackBerry smartphone, users will not be prompted to upgrade when a new version becomes available for download. 7.3 Authorizations When you use SAP Cloud mobile solutions, you use the same URL address and logon credentials as for desktop applications. In the Application and User Management work center, ensure that for each mobile work center view to be accessed on a mobile device, the user of the mobile device is assigned the related desktop work center view. For more information, see the Business Users Quick Guide in the Help Center from any work center. 7.4 Secure System Access and Authentication Mobile apps connect to the back-end system using HTTPS and the same user and password authentication used for connection from a personal computer. To allow users to use their mobile devices in offline mode, you must enable the use of an app password and define additional security settings for mobile app passwords. 7.5 Password Change and Password Reset On application level, you can either change or reset your app password. To change your app password, you must first enter your current app password. If you forgot your app password, you must reset it. Please note that in this case, your data (logon credentials and not synchronized expenses) is deleted. On server level, you can reset your password by entering your address. Please note that your data is not deleted. 7.6 Special Considerations Unlike stationary personal computers, mobile devices are at greater risk of being lost or stolen. Therefore, we recommend that you use the security features provided by your mobile device platform. For example: Use an additional, sufficiently long, PIN (personal identification number) to lock the device. Enable remote management software that allows you to lock the device remotely, or wipe data from it SAP AG or an SAP affiliate company. All rights reserved. Mobile Applications
29 For information on how to operate your mobile device, refer to the device manufacturer's documentation. 7.7 Data Storage The mobile apps for SAP Cloud solutions store three types of data on the mobile device, as outlined below Password Retention When logging on to the SAP Cloud solution from a mobile app, the user is required to provide the user ID and system password. The mobile app does not store this data by default, but the user can change this setting by defining an app password. In this case, the user ID and system password are encrypted and stored on the mobile device, using the secure storage features provided by the operating system of that device. The app password itself, however, is not stored on the mobile device, but is used to retrieve the stored user ID and system password when connecting to the SAP Cloud solution from it. As an administrator, you can specify the length of time after which the mobile user must reenter the app password to log on to the system. For more information, see Security Policy Support Log Files To obtain support for a technical error within the mobile app, you may be requested to activate the app s errorlogging functionality. When error logging is active and the technical error is reproduced, files containing technical data are created. These files enable SAP Cloud Support representatives to resolve the error. Delete the log files once they are no longer required Cache Files To improve the mobile app s performance, metadata is stored on your mobile device. The cached information contains technical data that describes the user interface. The cache files can be deleted. For device-specific instructions on how to set the password expiration, enable logging, or delete logs and cache files, refer to the mobile app s documentation. It is sometimes possible to upload pictures and other files from the mobile device to the SAP Cloud solution, for example, pictures captured on a mobile phone s camera. Such files are not managed through the SAP mobile app. When files are uploaded to the solution, they are not deleted from the mobile device. To protect any sensitive or confidential data that such files may contain, we recommend that you take extra precautions appropriate for the specific mobile device in use. For more information, see the device manufacturer s documentation. For device-specific instructions on how to set the password expiration, enable logging, or delete logs and cache files, refer to the mobile app s documentation. Mobile Applications 2014 SAP AG or an SAP affiliate company. All rights reserved. 29
30 You can upload pictures and other files from the mobile device to the SAP Cloud solution, for example, pictures captured on a mobile phone s camera. Such files are not managed through the SAP mobile app. When files are uploaded to the solution, they are not deleted from the mobile device. To protect any sensitive or confidential data that such files may contain, we recommend that you take extra precautions appropriate for the specific mobile device in use. For information on how such files are secured and stored on your mobile device, refer to the device manufacturer s documentation Offline Mode Data is stored on the device and encrypted. Once the device is online, data sent to the back-end system, synchronized, and deleted from the mobile device Local Application Data Storage SAP Cloud for Customer supports local application data storage. To enable this, you first have to log on to the SAP Cloud for Customer system and enter user name, online password, and system URL. During the setup, the user has to enter an offline password that is different from the online password. The local application data has been encrypted with a key derived from the offline password. Authentication is required to switch between online and offline mode SAP AG or an SAP affiliate company. All rights reserved. Mobile Applications
31 8 Front-End Security The SAP Cloud solutions front ends consist of Web application user interfaces based on Microsoft Silverlight or HTML5 technology. 8.1 Microsoft Silverlight Microsoft Silverlight is a development platform for Web applications. You can run Microsoft Silverlight applications in your Web browser and benefit directly from the browser s security mechanisms. Examples of browser security mechanisms are secure cookie handling and same-origin policy. The same-origin policy ensures that confidential data is exchanged only with the domain of origin and that it is not stored on the client after the current session ends. Microsoft Silverlight applications from different domains of origin run independently of one another. They do not share resources, such as business data. The applications have very limited access to the client s resources, such as the local file system. The user interface of your SAP Cloud solution benefits from the following front-end security mechanisms and concepts: Microsoft Silverlight application sandbox and resource isolation Secure socket layer (SSL) transport layer encryption using HTTPS Access to business data only after authentication and with sufficient authorizations using identity management and Role-Based Access Control (RBAM) Cross-site-scripting countermeasures Microsoft s secure default configuration in the framework Secure Web Application Development Guide For more information, see the security information for Microsoft Silverlight. 8.2 HTML5 HTML is a markup language for the Web. HTML allows you to format text, add graphics, create links, input forms, frames and tables, and save it all in a text file that any browser can read and display. HTML5 is the latest version. It offers enhanced multimedia capabilities. Note HTML5 has been released for SAP Cloud for Customer only. In addition to the features that are also supported by Microsoft Silverlight, HTML5 supports the following features: X-Frame-options response header to avoid clickjacking attacks Front-End Security 2014 SAP AG or an SAP affiliate company. All rights reserved. 31
32 Cross-site request forgery (CSRF) protection Cross-site scripting (XSS) output encoding during SAP UI5 rendering UI and domain protection against URL mashups and content mashups in iframes For more information, see the security information for HTML SAP AG or an SAP affiliate company. All rights reserved. Front-End Security
33 9 Security of Data Storage and Data Centers The data centers that support SAP Cloud solutions incorporate multiple safeguards for physical data security and integrity. They also provide high availability of your business data, using redundant networks and power systems. 9.1 Asset Protection and Data Integrity SAP follows operating best practices for data centers by deploying computation and storage parts of the solution over separated fire-safe areas to support disaster recovery in the event of a fire. For data backup and recovery purposes, a redundant hardware storage system performs regular backups. To provide enhanced data integrity, your SAP Cloud solution uses an advanced database management solution to store customer data and securely isolate each customer s business information in its own database instance. 9.2 Power Backup and Redundancy SAP data centers maintain multiple connections to several power companies, making a complete power outage highly unlikely. Even if the local power grid were to fail, the data centers supporting your SAP Cloud solution have an uninterruptible power supply for short-term outages, and a diesel generator backup power supply for longerterm outages. Therefore, power interruptions or outages are unlikely to affect customer data or solution access. 9.3 Restricted Physical Access SAP data centers, located in the United States of America and Germany, are logically separated and staffed around the clock, 365 days a year. A biometrics security system permits access only to authorized personnel, and the data centers are partitioned such that authorized personnel can access only their designated areas. Moreover, no direct network connection exists between individual SAP data centers; each SAP data center is fully autonomous. 9.4 Communication Security SAP relies on encryption technology that uses HTTPS to prevent unauthorized parties from intercepting network traffic. The encryption is based on the Transport Layer Security (TLS) protocol. The required encryption software is a standard component of up-to-date client operating systems and Web browsers. Security of Data Storage and Data Centers 2014 SAP AG or an SAP affiliate company. All rights reserved. 33
34 9.5 Network Security The network for your SAP Cloud solution employs a number of security technologies. The multilayered, partitioned, proprietary network architecture permits only authorized access to the data centers that support your SAP Cloud solution, with features that include: A Web dispatcher farm that hides the network topology from the outside world Multiple Internet connections to minimize the impact of distributed denial-of-service (DDoS) attacks An advanced intrusion detection system that continuously monitors solution traffic for possible attacks Multiple firewalls that divide the network into protected segments and shield the internal network from unauthorized Internet traffic Third-party audits performed throughout the year to support early detection of any newly introduced security issues SAP AG or an SAP affiliate company. All rights reserved. Security of Data Storage and Data Centers
35 10 Security for Additional Applications SAP offers a set of additional software components that you can install, on desktop computers, for printing and additional functionality. Confirm the Signature All additional applications of SAP Cloud solutions that are delivered for download are digitally signed. To confirm the signature, proceed as follows: 1. Right-click on the file you have downloaded, then choose Properties. 2. In the dialog box, choose the Digital Signatures tab. 3. Confirm that the indicated Name of signer is SAP AG. When you execute the installation of a file, a popup appears, indicating the Verified publisher. In this case, SAP AG is indicated as well. Saving Logon Data SAP front-end components never share an existing authentication session on SAP Cloud solutions, for example, within a Web browser or with another front-end component. Dedicated authentication is always required to build a confidential communication channel, secured via the Secure Sockets Layer (SSL) protocol, to your SAP Cloud solution. If you log on to the system from a desktop computer with a user ID and password, you are asked whether you want to store the password locally for subsequent authentication purposes. The password is encrypted, and not stored as plain text. It is stored using the available protection mechanisms of the operating system, and can be reused only by the operating system user who is currently logged on. If you do elect to use this function, then you should activate it on your device only, and never on public computers. Security for Additional Applications 2014 SAP AG or an SAP affiliate company. All rights reserved. 35
36 11 Other Security-Relevant Information 11.1 Service Composition Security This section describes security considerations that apply to the built-in mashups integration and Web services composition capabilities of SAP Cloud Solutions. Mashups and service composition entail cross-domain communication between various Internet domains. Content from different domains especially active content, such as JavaScript is always domain-separated in the Web browser. A same origin security policy common in Web browsers, prohibiting access to content across domain separations, is activated, if necessary URL Mashup Integration Both partners and administrators can create URL mashups to perform the following tasks: Open a Web page. Open a resource, for example, a Microsoft Office or Adobe PDF document, an Adobe Flash or multimedia video file, and so on. Open a custom URL of a front-end application, for example, Microsoft Outlook, Apple itunes, and so on. You can open these items from an SAP Cloud solution screen by configuring the URL with dynamic parameters that are derived from the screen out-port interface of your SAP Cloud solution. Caution Some URLs may pass your business data to an external application provided by a third-party organization, for example, account data passed to a search engine when performing a reverse lookup in an online address book. Therefore, before you use the URL mashup, we recommend that you confirm that it conforms with your company s security and data privacy policies. Some Web browser settings, for example, popup blockers, may prevent the new browser window from appearing in the URL mashup. We therefore recommend that you review your browser settings to determine whether popups are allowed HTML Mashup Integration Both partners and administrators can create HTML mashups to embed an HTML-based Web page or a resource that can be rendered in a Web browser for example, a Microsoft Office or Adobe PDF document, or an Adobe SAP AG or an SAP affiliate company. All rights reserved. Other Security-Relevant Information
37 Flash or multimedia video file into an SAP Cloud solution screen by configuring the URL with dynamic parameters that are derived from the SAP Cloud solution screen out-port interface. Caution Certain URLs may pass your business data to an external application provided by a third-party organization, for example, account or contact data passed to a social media Web site when displaying the related profile. Therefore, before you use the map mashup, we recommend that you confirm that it conforms with your company s security and data privacy policies. Bing Maps Web service communication takes place directly between the user s Web browser and the service provider via the Secure Sockets Layer (SSL), with the dedicated API key applied for each SAP Cloud solution. Bear in mind that the Bing Map Web service provider may monitor the Bing Maps Web service API usage in accordance with the terms of licensing. Therefore, before you use the map mashup, we recommend that you review the API usage and licensing details with the Bing Maps Web service provider Map Mashup Integration SAP Cloud solutions use Microsoft Bing Maps as a built-in map service provider. Both administrators and end users can configure the map mashup usage on an SAP Cloud solution screen to display the visual location or route information on a map. Before Bing Maps mashups can be used, you as an administrator must activate them by entering the Application Programming Interface (API) key for Bing Maps usage in the Mashup Authoring work center view of the Application and User Management work center. For more information about the Bing Maps Web service partner, and to apply for an API key, visit the SAP Cloud solutions communities. Caution Bear in mind that the map mashup may convey business data of yours to the Bing Maps Web service provider. For example, ship-to and bill-to addresses are transferred to the Bing Maps Web service provider when displaying the related visual location on the map. Therefore, before you use the map mashup, we recommend that you confirm that it conforms with your company s security and data privacy policies. Bing Maps Web service communication takes place directly between the user s Web browser and the service provider via the Secure Sockets Layer (SSL), with the dedicated API key applied for each SAP Cloud solution. Bear in mind that the Bing Map Web service provider may monitor the Bing Maps Web service API usage in accordance with the terms of licensing. Therefore, before you use the map mashup, we recommend that you review the API usage and licensing details with the Bing Maps Web service provider Data Mashups Both partners and administrators can create data mashups for composing Web services (provided by third-party Web service providers) with business data derived from the SAP Cloud solutions. You can use the integrated authoring tool, the Data Mashup Builder, to transform or merge external Web services with internal business data, using industry-standard Web service protocols, for example, RSS/Atom, REST or SOAP Web services. Other Security-Relevant Information 2014 SAP AG or an SAP affiliate company. All rights reserved. 37
38 Create Web services in your SAP Cloud solution before creating the Web service composition in the Data Mashup Builder. API keys can be specified for the Web service security by means of industry-standard or Web service specific authentication methods, for example, basic authentication, REST body credentials, or SOAP service parameter credentials. The API keys entered by partners and administrators are stored in an isolated secure storage of the your SAP Cloud solution back end, which is never exposed to end users. Caution Certain Web services may transfer business data of yours to an external Web service provider from a thirdparty organization. For example, account or address data is transferred to a data quality Web service provider when data quality cleansing operations in Cloud applications are performed. Therefore, before you use the mashup, we recommend that you confirm that the Web service conforms to your company s security and data privacy policies. Web service communication in data mashups does not take place directly between the user s Web browser and the Web service provider. Rather, as a result of the cross-domain access policy restriction, it is tunneled using the SAP Cloud solution system back-end Web service proxy. Only the Web service endpoints that have been confirmed with acknowledgement by partners and administrators can be accessed by the SAP Cloud solution system back-end Web service proxy by all end users of a customer. Therefore, before you confirm that a Web service is added to your SAP Cloud solution, we recommend that you ensure that it conforms to your company s and country s security policies Internal and External Audits SAP is committed to third-party validations, standards, and certifications of the policies and procedures we use to maintain our customers security, privacy and data integrity. SAP maintains several certifications and accreditations to ensure that we provide the highest standards of service and reliability to our customers. SAP will continue efforts to obtain the strictest of industry certifications in order to verify its commitment to provide secure and reliable services. For more information, see the security and standard accreditations on the Business Center for Cloud Solutions from SAP, at: f056f2d71ed2&language=en The Audit work center helps external and internal auditors conduct an audit for a company. It provides you with read access to all information that is relevant for an audit, such as financial reports, master data, documents and document flow, as well as user and access rights. The system provides this information through a selection of reusable views from other areas. Unlike other work centers, the Audit work center permits read access only. You cannot perform any changes there. All planning, follow-up activities, reporting of audit results, and findings must be completed outside your SAP Cloud solution. The Audit work center provides the following information: General Ledger Fixed Assets Cost and Revenue SAP AG or an SAP affiliate company. All rights reserved. Other Security-Relevant Information
39 Inventory Valuation Receivables Payables Liquidity Management User and Access Management For more information, see the documentation of the Audit work center Security Management and Continual Improvement of Security Security Management at SAP Cloud Solutions aims towards the continual improvement of the information security framework. SAP conducts several external audits to make sure that these aims are reached. Certificate/Report Interval Conducted by ISAE-3402/SSAE-16 (Business By Design) Twice a year External accounting company ISO (SAP Cloud Operations) Once a year Accredited auditing company ISO (SAP Data Center Operations) External pentest Internal pentest Code Scan ABAP (SAP Cloud for Customer) Non-ABAP (SAP Cloud for Customer) BS25999 (SAP Data Center Operations) Once a year Twice a year (SAP Business ByDesign) Every major release (SAP Cloud for Customer) Twice a year (SAP Business ByDesign) Once a year (SAP Cloud for Customer) Every major release (SAP Business ByDesign) ABAP: Daily (SAP Cloud for Customer) Non-ABAP: Each release (SAP Cloud for Customer) Once a year Accredited auditing company Third-party security company SAP C.E.R.T. External code scanning company Accredited auditing company Other Security-Relevant Information 2014 SAP AG or an SAP affiliate company. All rights reserved. 39
40 12 Security-Relevant Logging and Tracing 12.1 Data Privacy Data processing systems store master data or transactional data used to perform business processes and to document them. In many cases, this is personal data relating to employees or other private persons. In many countries, the storage, processing, disclosure, and deletion of such personal data from data processing systems must be in accordance with statutory data protection laws. One requirement in many countries is that such personal data can only be stored if a clear business reason exists for the retention of this data. Most data protection laws mandate that data is deleted after the business reason has expired. Alternatively, data can be anonymized rather than removed completely. In addition, legislation in many countries stipulates that organizations must disclose the personal data stored on an individual, if the individual expressly requests it. The Data Privacy Management work center allows those responsible for data protection matters within an organization to respond to and fulfill requests for the following in relation to the personal data of employees and customers: Disclose personal data relating to employees and private persons Remove employee personal data once the retention period for all relevant data has expired Monitor and manage automatic data removal processes using an application log Display log data detailing each access made to the Disclose Employee Data and Remove Employee Data overview screens 12.2 Security-Relevant Reports The Application and User Management work center offers a set of reports that provide insight into the system s behavior. Depending on your authorizations, not all of those reports may be accessible. The following reports are provided: Access Rights Change Log This report displays a list of all users in the system and their assigned access rights. It also lists when and how the access rights were changed, and by whom. This information is relevant for compliance reasons, enabling you to monitor the system to prevent fraud, or to trace who made system changes, if fraud has been committed. All Current Access Rights This report displays a list of all users in the system, and the access rights currently assigned to them. This information is relevant for compliance reasons, enabling you to monitor the system to prevent fraud. All Current Users This report displays a list of all users in the system. This information is relevant for compliance reasons, enabling you to monitor the system to prevent fraud SAP AG or an SAP affiliate company. All rights reserved. Security-Relevant Logging and Tracing
41 User Activation and Deactivation Log This report displays a list of all users in the system, and when they were activated or deactivated. This information is also relevant for compliance reasons, enabling you to monitor the system to prevent fraud. Also in the User and Access Management work center, the IT Compliance view displays a list of IT control processes and allows you to monitor service provider access to your solution. IT control processes are IT-related changes made in your system, such as software updates or processes involving incident analysis. Security-Relevant Logging and Tracing 2014 SAP AG or an SAP affiliate company. All rights reserved. 41
42 SAP AG or an SAP affiliate company. All rights reserved. No part of this publication may be reproduced or transmitted in any form or for any purpose without the express permission of SAP AG. The information contained herein may be changed without prior notice. Some software products marketed by SAP AG and its distributors contain proprietary software components of other software vendors. National product specifications may vary. These materials are provided by SAP AG and its affiliated companies ("SAP Group") for informational purposes only, without representation or warranty of any kind, and SAP Group shall not be liable for errors or omissions with respect to the materials. The only warranties for SAP Group products and services are those that are set forth in the express warranty statements accompanying such products and services, if any. Nothing herein should be construed as constituting an additional warranty. SAP and other SAP products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of SAP AG in Germany and other countries. Please see index.epx for additional trademark information and notices.
Agenda. How to configure
[email protected] Agenda Strongly Recommend: Knowledge of ArcGIS Server and Portal for ArcGIS Security in the context of ArcGIS Server/Portal for ArcGIS Access Authentication Authorization: securing web services
Implementation Guide SAP NetWeaver Identity Management Identity Provider
Implementation Guide SAP NetWeaver Identity Management Identity Provider Target Audience Technology Consultants System Administrators PUBLIC Document version: 1.10 2011-07-18 Document History CAUTION Before
Architecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference
Architecture and Data Flow Overview BlackBerry Enterprise Service 10 721-08877-123 Version: Quick Reference Published: 2013-11-28 SWD-20131128130321045 Contents Key components of BlackBerry Enterprise
Administration Guide. BlackBerry Enterprise Service 12. Version 12.0
Administration Guide BlackBerry Enterprise Service 12 Version 12.0 Published: 2015-01-16 SWD-20150116150104141 Contents Introduction... 9 About this guide...10 What is BES12?...11 Key features of BES12...
Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0
Security Guide BlackBerry Enterprise Service 12 for ios, Android, and Windows Phone Version 12.0 Published: 2015-02-06 SWD-20150206130210406 Contents About this guide... 6 What is BES12?... 7 Key features
The increasing popularity of mobile devices is rapidly changing how and where we
Mobile Security BACKGROUND The increasing popularity of mobile devices is rapidly changing how and where we consume business related content. Mobile workforce expectations are forcing organizations to
SHARPCLOUD SECURITY STATEMENT
SHARPCLOUD SECURITY STATEMENT Summary Provides details of the SharpCloud Security Architecture Authors: Russell Johnson and Andrew Sinclair v1.8 (December 2014) Contents Overview... 2 1. The SharpCloud
Flexible Identity Federation
Flexible Identity Federation Quick start guide version 1.0.1 Publication history Date Description Revision 2015.09.23 initial release 1.0.0 2015.12.11 minor updates 1.0.1 Copyright Orange Business Services
Security Overview Enterprise-Class Secure Mobile File Sharing
Security Overview Enterprise-Class Secure Mobile File Sharing Accellion, Inc. 1 Overview 3 End to End Security 4 File Sharing Security Features 5 Storage 7 Encryption 8 Audit Trail 9 Accellion Public Cloud
Gateway Apps - Security Summary SECURITY SUMMARY
Gateway Apps - Security Summary SECURITY SUMMARY 27/02/2015 Document Status Title Harmony Security summary Author(s) Yabing Li Version V1.0 Status draft Change Record Date Author Version Change reference
Ensuring Enterprise Data Security with Secure Mobile File Sharing.
A c c e l l i o n S e c u r i t y O v e r v i e w Ensuring Enterprise Data Security with Secure Mobile File Sharing. Accellion, Inc. Tel +1 650 485-4300 1804 Embarcadero Road Fax +1 650 485-4308 Suite
Policy Based Encryption E. Administrator Guide
Policy Based Encryption E Administrator Guide Policy Based Encryption E Administrator Guide Documentation version: 1.2 Legal Notice Legal Notice Copyright 2012 Symantec Corporation. All rights reserved.
Policy Based Encryption E. Administrator Guide
Policy Based Encryption E Administrator Guide Policy Based Encryption E Administrator Guide Documentation version: 1.2 Legal Notice Legal Notice Copyright 2012 Symantec Corporation. All rights reserved.
Sophos Mobile Control Installation guide. Product version: 3
Sophos Mobile Control Installation guide Product version: 3 Document date: January 2013 Contents 1 Introduction...3 2 The Sophos Mobile Control server...4 3 Set up Sophos Mobile Control...16 4 External
CBIO Security White Paper
One Canon Plaza Lake Success, NY 11042 www.ciis.canon.com CBIO Security White Paper Introduction to Canon Business Imaging Online Canon Business Imaging Online ( CBIO ) is a cloud platform for Canon s
SAP NetWeaver Fiori. For more information, see "Creating and enabling a trusted provider for Centrify" on page 108-10.
Chapter 108 Configuring SAP NetWeaver Fiori The following is an overview of the steps required to configure the SAP NetWeaver Fiori Web application for single sign-on (SSO) via SAML. SAP NetWeaver Fiori
BlackBerry Enterprise Service 10. Version: 10.2. Configuration Guide
BlackBerry Enterprise Service 10 Version: 10.2 Configuration Guide Published: 2015-02-27 SWD-20150227164548686 Contents 1 Introduction...7 About this guide...8 What is BlackBerry Enterprise Service 10?...9
Configuration Guide BES12. Version 12.2
Configuration Guide BES12 Version 12.2 Published: 2015-07-07 SWD-20150630131852557 Contents About this guide... 8 Getting started... 9 Administrator permissions you need to configure BES12... 9 Obtaining
Mobile Device Management Version 8. Last updated: 17-10-14
Mobile Device Management Version 8 Last updated: 17-10-14 Copyright 2013, 2X Ltd. http://www.2x.com E mail: [email protected] Information in this document is subject to change without notice. Companies names
Mobile Device Management Solution Hexnode MDM
Mobile Device Management Solution Hexnode MDM Frequently Asked Questions www.hexnode.com Frequently Asked Questions How is Hexnode MDM license calculated?...4 Which ports do I need to open for Hexnode
BlackBerry Enterprise Service 10. Universal Device Service Version: 10.2. Administration Guide
BlackBerry Enterprise Service 10 Universal Service Version: 10.2 Administration Guide Published: 2015-02-24 SWD-20150223125016631 Contents 1 Introduction...9 About this guide...10 What is BlackBerry
SAP NetWeaver AS Java
Chapter 75 Configuring SAP NetWeaver AS Java SAP NetWeaver Application Server ("AS") Java (Stack) is one of the two installation options of SAP NetWeaver AS. The other option is the ABAP Stack, which is
BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
SAP Cloud Identity Service Document Version: 1.0 2014-09-01. SAP Cloud Identity Service
Document Version: 1.0 2014-09-01 Content 1....4 1.1 Release s....4 1.2 Product Overview....8 Product Details.... 9 Supported Browser Versions....10 Supported Languages....12 1.3 Getting Started....13 1.4
Sophos Mobile Control SaaS startup guide. Product version: 6
Sophos Mobile Control SaaS startup guide Product version: 6 Document date: January 2016 Contents 1 About this guide...4 2 About Sophos Mobile Control...5 3 What are the key steps?...7 4 Change your password...8
Configuration Guide. BES12 Cloud
Configuration Guide BES12 Cloud Published: 2016-04-08 SWD-20160408113328879 Contents About this guide... 6 Getting started... 7 Configuring BES12 for the first time...7 Administrator permissions you need
WatchDox Administrator's Guide. Application Version 3.7.5
Application Version 3.7.5 Confidentiality This document contains confidential material that is proprietary WatchDox. The information and ideas herein may not be disclosed to any unauthorized individuals
Policy Based Encryption Z. Administrator Guide
Policy Based Encryption Z Administrator Guide Policy Based Encryption Z Administrator Guide Documentation version: 1.2 Legal Notice Legal Notice Copyright 2012 Symantec Corporation. All rights reserved.
Configuration Guide BES12. Version 12.1
Configuration Guide BES12 Version 12.1 Published: 2015-04-22 SWD-20150422113638568 Contents Introduction... 7 About this guide...7 What is BES12?...7 Key features of BES12... 8 Product documentation...
Troubleshooting BlackBerry Enterprise Service 10 version 10.1.1 726-08745-123. Instructor Manual
Troubleshooting BlackBerry Enterprise Service 10 version 10.1.1 726-08745-123 Instructor Manual Published: 2013-07-02 SWD-20130702091645092 Contents Advance preparation...7 Required materials...7 Topics
Salesforce1 Mobile Security Guide
Salesforce1 Mobile Security Guide Version 1, 1 @salesforcedocs Last updated: December 8, 2015 Copyright 2000 2015 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark of salesforce.com,
Tenrox. Single Sign-On (SSO) Setup Guide. January, 2012. 2012 Tenrox. All rights reserved.
Tenrox Single Sign-On (SSO) Setup Guide January, 2012 2012 Tenrox. All rights reserved. About this Guide This guide provides a high-level technical overview of the Tenrox Single Sign-On (SSO) architecture,
Enabling SSL and Client Certificates on the SAP J2EE Engine
Enabling SSL and Client Certificates on the SAP J2EE Engine Angel Dichev RIG, SAP Labs SAP AG 1 Learning Objectives As a result of this session, you will be able to: Understand the different SAP J2EE Engine
ABOUT TOOLS4EVER ABOUT DELOITTE RISK SERVICES
CONTENTS About Tools4ever... 3 About Deloitte Risk Services... 3 HelloID... 4 Microsoft Azure... 5 HelloID Security Architecture... 6 Scenarios... 8 SAML Identity Provider (IDP)... 8 Service Provider SAML
Workday Mobile Security FAQ
Workday Mobile Security FAQ Workday Mobile Security FAQ Contents The Workday Approach 2 Authentication 3 Session 3 Mobile Device Management (MDM) 3 Workday Applications 4 Web 4 Transport Security 5 Privacy
Configuration Guide BES12. Version 12.3
Configuration Guide BES12 Version 12.3 Published: 2016-01-19 SWD-20160119132230232 Contents About this guide... 7 Getting started... 8 Configuring BES12 for the first time...8 Configuration tasks for managing
Copyright 2013, 3CX Ltd. http://www.3cx.com E-mail: [email protected]
Manual Copyright 2013, 3CX Ltd. http://www.3cx.com E-mail: [email protected] Information in this document is subject to change without notice. Companies names and data used in examples herein are fictitious
Ensuring the security of your mobile business intelligence
IBM Software Business Analytics Cognos Business Intelligence Ensuring the security of your mobile business intelligence 2 Ensuring the security of your mobile business intelligence Contents 2 Executive
Google Apps Deployment Guide
CENTRIFY DEPLOYMENT GUIDE Google Apps Deployment Guide Abstract Centrify provides mobile device management and single sign-on services that you can trust and count on as a critical component of your corporate
Dell One Identity Cloud Access Manager 8.0.1 - How to Configure for SSO to SAP NetWeaver using SAML 2.0
Dell One Identity Cloud Access Manager 8.0.1 - How to Configure for SSO to SAP NetWeaver using SAML 2.0 May 2015 About this guide Prerequisites and requirements NetWeaver configuration Legal notices About
SAP NetWeaver Single Sign-On. Product Management SAP NetWeaver Identity Management & Security June 2011
NetWeaver Single Sign-On Product Management NetWeaver Identity Management & Security June 2011 Agenda NetWeaver Single Sign-On: Solution overview Key benefits of single sign-on Solution positioning Identity
FileCloud Security FAQ
is currently used by many large organizations including banks, health care organizations, educational institutions and government agencies. Thousands of organizations rely on File- Cloud for their file
Software and Delivery Requirements
SAP Best Practices for SAP Cloud for Travel and Expense November 2014 English SAP Best Practices for SAP Cloud for Travel and Expense: Software and Delivery Requirements SAP SE Dietmar-Hopp-Allee 16 69190
Product Manual. MDM On Premise Installation Version 8.1. Last Updated: 06/07/15
Product Manual MDM On Premise Installation Version 8.1 Last Updated: 06/07/15 Parallels IP Holdings GmbH Vordergasse 59 8200 Schaffhausen Switzerland Tel: + 41 52 632 0411 Fax: + 41 52 672 2010 www.parallels.com
Configuration Guide. BlackBerry Enterprise Service 12. Version 12.0
Configuration Guide BlackBerry Enterprise Service 12 Version 12.0 Published: 2014-12-19 SWD-20141219132902639 Contents Introduction... 7 About this guide...7 What is BES12?...7 Key features of BES12...
Sophos Mobile Control User guide for Apple ios. Product version: 4
Sophos Mobile Control User guide for Apple ios Product version: 4 Document date: May 2014 Contents 1 About Sophos Mobile Control...3 2 About this guide...4 3 Login to the Self Service Portal...5 4 Set
Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment. Paul Luetje Enterprise Solutions Architect
Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment Paul Luetje Enterprise Solutions Architect Table of Contents Welcome... 3 Purpose of this document...
SAP Certified Technology Professional - Security with SAP NetWeaver 7.0. Title : Version : Demo. The safer, easier way to help you pass any IT exams.
Exam : P_ADM_SEC_70 Title : SAP Certified Technology Professional - Security with SAP NetWeaver 7.0 Version : Demo 1 / 5 1.Which of the following statements regarding SSO and SAP Logon Tickets are true?
Interwise Connect. Working with Reverse Proxy Version 7.x
Working with Reverse Proxy Version 7.x Table of Contents BACKGROUND...3 Single Sign On (SSO)... 3 Interwise Connect... 3 INTERWISE CONNECT WORKING WITH REVERSE PROXY...4 Architecture... 4 Interwise Web
Enabling Federation and Web-Single Sign-On in Heterogeneous Landscapes with the Identity Provider and Security Token Service Supplied by SAP NetWeaver
Enabling Federation and Web-Single Sign-On in Heterogeneous Landscapes with the Identity Provider and Security Token Service Supplied by SAP NetWeaver SAP Product Management, SAP NetWeaver Identity Management
Connected Data. Connected Data requirements for SSO
Chapter 40 Configuring Connected Data The following is an overview of the steps required to configure the Connected Data Web application for single sign-on (SSO) via SAML. Connected Data offers both IdP-initiated
Introduction to the EIS Guide
Introduction to the EIS Guide The AirWatch Enterprise Integration Service (EIS) provides organizations the ability to securely integrate with back-end enterprise systems from either the AirWatch SaaS environment
Hybrid for SharePoint Server 2013. Search Reference Architecture
Hybrid for SharePoint Server 2013 Search Reference Architecture 2014 Microsoft Corporation. All rights reserved. This document is provided as-is. Information and views expressed in this document, including
In this topic we will cover the security functionality provided with SAP Business One.
In this topic we will cover the security functionality provided with SAP Business One. 1 After completing this topic, you will be able to: Describe the security functions provided by the System Landscape
SAML Authentication Quick Start Guide
SAML Authentication Quick Start Guide Powerful Authentication Management for Service Providers and Enterprises Authentication Service Delivery Made EASY Copyright 2013 SafeNet, Inc. All rights reserved.
Processed on SAP Solution Manager Service Center Release EHP 1 for Solution Manager 7.0 Telephone Service Tool 701_2011_1 SP0 Fax
SERVICE REPORT SAP Security Optimization Self-Service SAP System ID SAP Product Release DB System Customer Processed on SAP Solution Manager Service Center Release EHP 1 for Solution Manager 7.0 Telephone
CA Performance Center
CA Performance Center Single Sign-On User Guide 2.4 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is
CA Mobile Device Management 2014 Q1 Getting Started
CA Mobile Device Management 2014 Q1 Getting Started This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is
Security and Your SAP System When Working with Winshuttle Products
Security and Your SAP System When Working with Winshuttle Products 2014 Winshuttle, LLC. All rights reserved. 2/14 www.winshuttle.com Background Companies running SAP systems are accustomed to configuring
White Paper. Anywhere, Any Device File Access with IT in Control. Enterprise File Serving 2.0
White Paper Enterprise File Serving 2.0 Anywhere, Any Device File Access with IT in Control Like it or not, cloud- based file sharing services have opened up a new world of mobile file access and collaborative
SAM Context-Based Authentication Using Juniper SA Integration Guide
SAM Context-Based Authentication Using Juniper SA Integration Guide Revision A Copyright 2012 SafeNet, Inc. All rights reserved. All attempts have been made to make the information in this document complete
CA CloudMinder. Getting Started with SSO 1.5
CA CloudMinder Getting Started with SSO 1.5 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is for your
ACTIVID APPLIANCE AND MICROSOFT AD FS
ACTIVID APPLIANCE AND MICROSOFT AD FS SAML 2.0 Channel Integration Handbook ActivID Appliance 7.2 July 2013 Released Document Version 1.0 hidglobal.com Table of Contents 1.0 Introduction...3 1.1 Scope
Advanced Administration
BlackBerry Enterprise Service 10 BlackBerry Device Service Version: 10.2 Advanced Administration Guide Published: 2014-09-10 SWD-20140909133530796 Contents 1 Introduction...11 About this guide...12 What
RSA Authentication Manager 8.1 Help Desk Administrator s Guide. Revision 1
RSA Authentication Manager 8.1 Help Desk Administrator s Guide Revision 1 Contact Information Go to the RSA corporate website for regional Customer Support telephone and fax numbers: www.emc.com/domains/rsa/index.htm
technical brief browsing to an installation of HP Web Jetadmin. Internal Access HTTP Port Access List User Profiles HTTP Port
technical brief in HP Overview HP is a powerful webbased software utility for installing, configuring, and managing networkconnected devices. Since it can install and configure devices, it must be able
RSA Authentication Manager 8.1 Help Desk Administrator s Guide
RSA Authentication Manager 8.1 Help Desk Administrator s Guide Contact Information Go to the RSA corporate website for regional Customer Support telephone and fax numbers: www.emc.com/domains/rsa/index.htm
PUBLIC Help for Administrators
PUBLIC Help for Administrators Table Of Contents 1 Getting Started as an Administrator.... 7 2 How to Switch from Microsoft Silverlight to HTML5.... 13 3 What's New for Administrators.... 17 4 What s
When enterprise mobility strategies are discussed, security is usually one of the first topics
Acronis 2002-2014 Introduction When enterprise mobility strategies are discussed, security is usually one of the first topics on the table. So it should come as no surprise that Acronis Access Advanced
BlackBerry Business Cloud Services. Administration Guide
BlackBerry Business Cloud Services Administration Guide Published: 2012-07-25 SWD-20120725193410416 Contents 1 About BlackBerry Business Cloud Services... 8 BlackBerry Business Cloud Services feature overview...
Contents Release Notes... ... 3 System Requirements... ... 4 Administering Jive for Office... ... 5
Jive for Office TOC 2 Contents Release Notes...3 System Requirements... 4 Administering Jive for Office... 5 Getting Set Up...5 Installing the Extended API JAR File... 5 Updating Client Binaries...5 Client
CS 356 Lecture 28 Internet Authentication. Spring 2013
CS 356 Lecture 28 Internet Authentication Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists
User Guide. Version R91. English
AuthAnvil User Guide Version R91 English August 25, 2015 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS as updated from
Advanced Configuration Steps
Advanced Configuration Steps After you have downloaded a trial, you can perform the following from the Setup menu in the MaaS360 portal: Configure additional services Configure device enrollment settings
This chapter describes how to use the Junos Pulse Secure Access Service in a SAML single sign-on deployment. It includes the following sections:
CHAPTER 1 SAML Single Sign-On This chapter describes how to use the Junos Pulse Secure Access Service in a SAML single sign-on deployment. It includes the following sections: Junos Pulse Secure Access
Google Identity Services for work
INTRODUCING Google Identity Services for work One account. All of Google Enter your email Next Online safety made easy We all care about keeping our data safe and private. Google Identity brings a new
www.novell.com/documentation Server Installation ZENworks Mobile Management 2.7.x August 2013
www.novell.com/documentation Server Installation ZENworks Mobile Management 2.7.x August 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of this
Supplier Information Security Addendum for GE Restricted Data
Supplier Information Security Addendum for GE Restricted Data This Supplier Information Security Addendum lists the security controls that GE Suppliers are required to adopt when accessing, processing,
PUBLIC Secure Login for SAP Single Sign-On Implementation Guide
SAP Single Sign-On 2.0 SP04 Document Version: 1.0-2014-10-28 PUBLIC Secure Login for SAP Single Sign-On Implementation Guide Table of Contents 1 What Is Secure Login?....8 1.1 System Overview.... 8 1.1.1
Novell Filr 1.0.x Mobile App Quick Start
Novell Filr 1.0.x Mobile App Quick Start February 2014 Novell Quick Start Novell Filr allows you to easily access all your files and folders from your desktop, browser, or a mobile device. In addition,
Master Data Governance Security Guide
Master Data Governance Security Guide PUBLIC Document Version: 01.08 2014 Master Data Governance Security Guide 70 1 Copyright Copyright 2013 SAP AG. All rights reserved. Portions Copyright 2014 Utopia
User Guide. Time Warner Cable Business Class Cloud Solutions Control Panel. Hosted Microsoft Exchange 2007 Hosted Microsoft SharePoint 2007
Chapter Title Time Warner Cable Business Class Cloud Solutions Control Panel User Guide Hosted Microsoft Exchange 2007 Hosted Microsoft SharePoint 2007 Version 1.1 Table of Contents Table of Contents...
Single Sign-On Portal User Reference (Okta Cloud SSO)
Single Sign-On Portal User Reference (Okta Cloud SSO) Contents Okta Single Sign-on Portal... 3 Initial account creation and configuration... 3 First time manual login to the Okta Single Sign-on Portal...
The Panoptix Building Efficiency Solution: Ensuring a Secure Delivery of Building Efficiency
logo The Panoptix Building Efficiency Solution: Ensuring a Secure Delivery of Building Efficiency Understanding the Multiple Levels of Security Built Into the Panoptix Solution Published: October 2011
CA Single Sign-On r12.x (CA SiteMinder) Implementation Proven Professional Exam
CA Single Sign-On r12.x (CA SiteMinder) Implementation Proven Professional Exam (CAT-140) Version 1.4 - PROPRIETARY AND CONFIDENTIAL INFORMATION - These educational materials (hereinafter referred to as
Portal Administration. Administrator Guide
Portal Administration Administrator Guide Portal Administration Guide Documentation version: 1.0 Legal Notice Legal Notice Copyright 2013 Symantec Corporation. All rights reserved. Symantec, the Symantec
Lesson Plans Microsoft s Managing and Maintaining a Microsoft Windows Server 2003 Environment
Lesson Plans Microsoft s Managing and Maintaining a Microsoft Windows Server 2003 Environment (Exam 70-290) Table of Contents Table of Contents... 1 Course Overview... 2 Section 0-1: Introduction... 4
T his feature is add-on service available to Enterprise accounts.
SAML Single Sign-On T his feature is add-on service available to Enterprise accounts. Are you already using an Identity Provider (IdP) to manage logins and access to the various systems your users need
Mobile Iron User Guide
2015 Mobile Iron User Guide Information technology Sparrow Health System 9/1/2015 Contents...0 Introduction...2 Changes to your Mobile Device...2 Self Service Portal...3 Registering your new device...4
A Guide to New Features in Propalms OneGate 4.0
A Guide to New Features in Propalms OneGate 4.0 Propalms Ltd. Published April 2013 Overview This document covers the new features, enhancements and changes introduced in Propalms OneGate 4.0 Server (previously
Content Filtering Client Policy & Reporting Administrator s Guide
Content Filtering Client Policy & Reporting Administrator s Guide Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION
Sophos Mobile Control Installation guide. Product version: 3.5
Sophos Mobile Control Installation guide Product version: 3.5 Document date: July 2013 Contents 1 Introduction...3 2 The Sophos Mobile Control server...4 3 Set up Sophos Mobile Control...10 4 External
FormFire Application and IT Security. White Paper
FormFire Application and IT Security White Paper Contents Overview... 3 FormFire Corporate Security Policy... 3 Organizational Security... 3 Infrastructure and Security Team... 4 Application Development
Sophos Mobile Control User guide for Android
Sophos Mobile Control User guide for Android Product version: 2.5 Document date: July 2012 Contents 1 About Sophos Mobile Control... 3 2 Login to the Self Service Portal... 4 3 Set up Sophos Mobile Control
Directory Integration with Okta. An Architectural Overview. Okta Inc. 301 Brannan Street San Francisco, CA 94107. info@okta.
Directory Integration with Okta An Architectural Overview Okta Inc. 301 Brannan Street San Francisco, CA 94107 [email protected] 1-888-722-7871 Contents 1 User Directories and the Cloud: An Overview 3 Okta
CUSTOMER Android for Work Quick Start Guide
Mobile Secure Cloud Edition Document Version: 1.0 2016-01-25 CUSTOMER Content 1 Introduction to Android for Work.... 3 2 Prerequisites....4 3 Setting up Android for Work (Afaria)....5 4 Setting up Android
Securing end-user mobile devices in the enterprise
IBM Global Technology Services Thought Leadership White Paper January 2012 Securing end-user mobile devices in the enterprise Develop an enforceable mobile security policy and practices for safer corporate
Egnyte Cloud File Server. White Paper
Egnyte Cloud File Server White Paper Revised July, 2013 Egnyte Cloud File Server Introduction Egnyte Cloud File Server (CFS) is the software as a service layer that powers online file sharing and storage
