Master Data Governance Security Guide
|
|
|
- Buck Elliott
- 10 years ago
- Views:
Transcription
1 Master Data Governance Security Guide PUBLIC Document Version: Master Data Governance Security Guide 70 1
2 Copyright Copyright 2013 SAP AG. All rights reserved. Portions Copyright 2014 Utopia Global, Inc. All rights reserved. SAP Library document classification: PUBLIC No part of this publication may be reproduced or transmitted in any form or for any purpose without the epress permission of SAP AG and/or Utopia Global, Inc.. The information contained herein may be changed without prior notice. Some software products marketed by SAP AG and its distributors contain proprietary software components of other software vendors. National product specifications may vary. These materials are provided by SAP AG and its affiliated companies ( SAP Group ) for informational purposes only, without representation or warranty of any kind, and SAP Group shall not be liable for errors or omissions with respect to the materials. The only warranties for SAP Group products and services are those that are set forth in the epress warranty statements accompanying such products and services, if any. Nothing herein should be construed as constituting an additional warranty. SAP and other SAP products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of SAP AG in Germany and other countries. Utopia Global, Inc products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of Utopia GLobal, Inc. in the United States of America Please see for additional trademark information and notices. Master Data Governance Security Guide 70 2
3 Icons in Body Tet Icon Meaning Caution Eample Note Recommendation Synta Additional icons are used in SAP Library documentation to help you identify different types of information at a glance. For more information, see Help on Help General Information Classes and Information Classes for Business Information Warehouse on the first page of any version of SAP Library. Typographic Conventions Type Style Eample tet Eample tet EXAMPLE TEXT Eample tet Eample tet <Eample tet> EXAMPLE TEXT Description Words or characters quoted from the screen. These include field names, screen titles, pushbuttons labels, menu names, menu paths, and menu options. Cross-references to other documentation. Emphasized words or phrases in body tet, graphic titles, and table titles. Technical names of system objects. These include report names, program names, transaction codes, table names, and key concepts of a programming language when they are surrounded by body tet, for eample, SELECT and INCLUDE. Output on the screen. This includes file and directory names and their paths, messages, names of variables and parameters, source tet, and names of installation, upgrade and database tools. Eact user entry. These are words or characters that you enter in the system eactly as they appear in the documentation. Variable user entry. Angle brackets indicate that you replace these words and characters with appropriate entries to make entries in the system. Keys on the keyboard, for eample, F2 or ENTER. Master Data Governance Security Guide 70 3
4 Master Data Governance Security Guide The following guide covers the information that you require to operate Master Data Governance securely. To make the information more accessible, it is divided into a general part, containing information relevant for all components, and a separate part for information specific for individual components. 1 Introduction This guide does not replace the administration or operation guides that are available for productive operations. Target Audience Technology consultants Security consultants System administrators This document is not included as part of the Installation Guides, Configuration Guides, Technical Operation Manuals, or Upgrade Guides. Such guides are only relevant for a certain phase of the software life cycle, whereas the Security Guide provides information that is relevant for all life cycle phases. Why Is Security Necessary? With the increasing use of distributed systems and the Internet for managing business data, the demands on security are also on the rise. When using a distributed system, you need to be sure that your data and processes support your business needs without allowing unauthorized access to critical information. User errors, negligence, or attempted manipulation of your system should not result in loss of information or processing time. These demands on security apply likewise to Master Data Governance. To assist you in securing Master Data Governance, we provide this Security Guide. Since Master Data Governance is based on and uses SAP NetWeaver technology, it is essential that you consult the Security Guide for SAP NetWeaver. See SAP Service Marketplace at SAP NetWeaver. For all Security Guides published by SAP, see SAP Service Marketplace at Overview of the Main Sections The Security Guide comprises the following main sections: Before You Start [Page 5] This section contains information about why security is necessary, how to use this document, and references to other Security Guides that build the foundation for this Security Guide. Technical System Landscape [Page 6] Master Data Governance Security Guide 70 4
5 This section provides an overview of the technical components and communication paths that are used by Master Data Governance. User Management and Authentication [Page 6] This section provides an overview of the following user administration and authentication aspects: o o o o o Recommended tools to use for user management User types that are required by Master Data Governance Standard users that are delivered with Master Data Governance Overview of the user synchronization strategy Overview of how integration into Single Sign-On environments is possible Authorizations [Page 10] This section provides an overview of the authorization concept that applies to Master Data Governance. Network and Communication Security [Page 10] This section provides an overview of the communication paths used by Master Data Governance and the security mechanisms that apply. It also includes our recommendations for the network topology to restrict access at the network level. Data Storage Security [Page 13] This section provides an overview of any critical data that is used by Master Data Governance and the security mechanisms that apply. Enterprise Services Security [Page 13] This section provides an overview of the security aspects that apply to the enterprise services delivered with Master Data Governance. Security-Relevant Logs and Tracing [Page 14] This section provides an overview of the trace and log files that contain securityrelevant information, for eample, so you can reproduce activities if a security breach does occur. Appendi [Page 25] This section provides references to further information. 2 Before You Start This table contains the most important SAP notes concerning the safety of Master Data Governance. Title SAP Note Comment Code injection vulnerability in UAC_ASSIGNMENT_CONTROL_TEST MDG and XBRL Master Data Governance Security Guide 70 5
6 SAP Library Data can be displayed without authorization MDG (Financial Master Data Governance, CA-MDG-APP- FIN) More Information For more information about specific topics, see the sources in the table below. Content Security Security Guides Related Notes Quick Link on SAP Service Marketplace or SDN Allowed platforms Network security SAP Solution Manager SAP NetWeaver Technical System Landscape For information about the technical system landscape, see the sources listed in the table below. Subject Guide/Tool Quick Link to SAP Service Marketplace Technical description of Master Data Governance and the underlying technical components, such as SAP NetWeaver Master Guide SAP Business Suite Applications SAP Master Data Governance High availability Design of technical landscape Security High Availability for SAP Solutions See available documents See available documents User Management and Authentication Master Data Governance Security Guide 70 6
7 Master Data Governance uses the user management and authentication mechanisms of the SAP NetWeaver platform, and in particular, SAP NetWeaver Application Server. Therefore, the security recommendations and guidelines for user management and authentication that are described in the security guide for SAP NetWeaver Application Server for ABAP Security Guide [Eternal] also apply to Master Data Governance. In addition to these guidelines, we also supply information on user management and authentication that is especially applicable to Master Data Governance in the following sections: User Administration [Page 7] This section details the user management tools, the required user types, and the standard users that are supplied with Master Data Governance. User Data Synchronization [Page 9] The components of Master Data Governance can use user data together with other components. This section describes how the user data is synchronized with these other sources. Integration into Single Sign-On Environments [Page 9] This section describes how Master Data Governance supports single sign-onmechanisms. 4.1 User Administration Master Data Governance user management uses the mechanisms provided by SAP NetWeaver Application Server for ABAP, such as tools, user types, and the password concept. For an overview of how these mechanisms apply for Master Data Governance, see the sections below. In addition, we provide a list of the standard users required for operating components of Master Data Governance. User Administration Tools The following table shows the user administration tools for Master Data Governance. Tool User maintenance for ABAP-based systems (transaction SU01) Role maintenance with the profile generator for ABAPbased systems (PFCG) Central User Administration (CUA) for the maintenance of multiple ABAP-based systems User Management Engine for SAP NetWeaver AS Java (UME) Description For more information on the authorization objects provided by the components of Master Data Governance, see the component specific section. For more information on the roles provided by Master Data Governance, see the component specific section. For more information, see User and Role Administration of Application Server ABAP [Eternal] For more information, see Central User Administration [Eternal]. Administration console for maintenance of users, roles, and authorizations in Java-based systems and in the Enterprise Portal. The UME also provides persistence options, such as ABAP Engine. For more information, see User Management Master Data Governance Security Guide 70 7
8 Engine [Eternal]. For more information on the tools that SAP provides for user administration with SAP NetWeaver, see SAP Service Marketplace at SAP NetWeaver 7.0 Security Guides (Complete) Release User Administration and Authentication. User Types It is often necessary to specify different security policies for different types of users. For eample, your policy may specify that individual users who perform tasks interactively have to change their passwords on a regular basis, but not those users under which background processing jobs run. User types required for Master Data Governance include, for eample: Individual users o Dialog users Dialog users are used for SAP GUI for Windows. o Internet users for Web applications Same policies apply as for dialog users, but used for Internet connections. Technical users: o o o Service users are dialog users who are available for a large set of anonymous users (for eample, for anonymous system access via an ITS service). Communication users are used for dialog-free communication between systems. Background users can be used for processing in the background. For more information about user types, see User Types [Eternal] in the Security Guide for SAP NetWeaver AS ABAP. Standard Users The following table shows the standard users that are necessary for operating Master Data Governance. System User ID Type Password Additional Information SAP Web Application Server (sapsid)adm SAP system administrator Mandatory SAP NetWeaver installation guide SAP Web Application Server SAP Service (sapsid)adm SAP system service administrator Mandatory SAP NetWeaver installation guide SAP Web Application SAP Standard ABAP Users (SAP*, DDIC, EARLYWATCH, See SAP NetWeaver SAP NetWeaver security guide Master Data Governance Security Guide 70 8
9 Server SAPCPIC) security guide SAP Web Application Server SAP Standard SAP Web Application Server Java Users See SAP NetWeaver security guide SAP NetWeaver security guide SAP ECC SAP Users Dialog users Mandatory The number of users depends on the area of operation and the business data to be processed. We recommend that you change the passwords and IDs of users that were created automatically during the installation. 4.2 User Data Synchronization By synchronizing user data, you can reduce effort and epense in the user management of your system landscape. Since Master Data Governance is based on SAP NetWeaver, you can use all of the mechanisms for user synchronization in SAP NetWeaver here. For more information, see the SAP NetWeaver Security Guide on SAP Service Marketplace at service.sap.com/securityguide SAP NetWeaver. You can use user data distributed across systems by replicating the data, for eample in a central directory such as LDAP. 4.3 Integration into Single Sign-On Environments Master Data Governance supports the single sign-on (SSO) mechanisms provided by SAP NetWeaver Application Server for ABAP technology. Therefore, the security recommendations and guidelines for user management and authentication that are described in the SAP NetWeaver Security Guide [Eternal] also apply to Master Data Governance. Master Data Governance supports the following mechanisms: Secure Network Communication (SNC) SNC is available for user authentication and provides for an SSO environment when using the SAP GUI for Windows or Remote Function Calls. SAP Logon Tickets Master Data Governance supports the use of logon tickets for SSO when using a Web browser as the front-end client. In this case, users can be issued a logon ticket after they have authenticated themselves with the initial SAP system. The ticket can then be submitted to other systems (SAP or eternal systems) as an authentication token. The user does not need to enter a user ID or password for authentication, but can access the system directly Master Data Governance Security Guide 70 9
10 once it has checked the logon ticket. For more information, see SAP Logon Tickets in the Security Guide for SAP NetWeaver Application Server. Client Certificates As an alternative to user authentication using a user ID and passwords, users using a Web browser as a front-end client can also provide X.509 client certificates to use for authentication. In this case, user authentication is performed on the Web server using the Secure Sockets Layer Protocol (SSL Protocol). No passwords have to be transferred. User authorizations are valid in accordance with the authorization concept in the SAP system. For more information see Client Certificates in the Security Guide for SAP NetWeaver Application Server. For more information about available authentication mechanisms, see SAP Library for SAP NetWeaver under User Authentication and Single Sign-On [Eternal]. 5 Authorizations Master Data Governance uses the authorization concept of SAP NetWeaver Application Server ABAP. Therefore, the security recommendations and guidelines for authorizations that are described in the Security Guide for SAP NetWeaver Application Server ABAP also apply to Master Data Governance. You can use authorizations to restrict the access of users to the system, and thereby protect transactions and programs from unauthorized access. The SAP NetWeaver Application Server authorization concept is based on assigning authorizations to users based on roles. For role maintenance in SAP NetWeaver Application Server ABAP, use the profile generator (transaction PFCG), and in SAP NetWeaver Application Server for Java, the user management console of the User Management Engine (UME). You can define user-specific menus using roles. For more information about creating roles, see Role Administration [Eternal]. Standard Roles and Standard Authorization Objects SAP delivers standard roles covering the most frequent business transactions. You can use these roles as a template for your own roles. For a list of the standard roles and authorization objects used by components of Master Data Governance, see the section of this document relevant to each component. Before using the roles listed, you may want to check whether the standard roles delivered by SAP meet your requirements. Authorizations for Customizing Settings You can use Customizing roles to control access to the configuration of Master Data Governance in the SAP Customizing Implementation Guide (IMG). 6 Network and Communication Security Master Data Governance Security Guide 70 10
11 Your network infrastructure is etremely important in protecting your system. Your network needs to support the communication necessary for your business and your needs without allowing unauthorized access. A well-defined network topology can eliminate many security threats based on software flaws (at both the operating system and application level) or network attacks such as eavesdropping. If users cannot log on to your application or database servers at the operating system or database layer, then there is no way for intruders to compromise the devices and gain access to the backend system s database or files. Additionally, if users are not able to connect to the server LAN (local area network), they cannot eploit known bugs and security holes in network services on the server machines. The network topology for Master Data Governance is based on the topology used by the SAP NetWeaver platform. Therefore, the security guidelines and recommendations described in the SAP NetWeaver Security Guide also apply to Master Data Governance. Details that relate directly to SAP ERP Central Component are described in the following sections: Communication Channel Security [Page 11] This section contains a description of the communication channels and protocols that are used by the components of Master Data Governance. Network Security [Page 12] This section contains information on the network topology recommended for the components of Master Data Governance. It shows the appropriate network segments for the various client and server components and where to use firewalls for access protection. It also contains a list of the ports required for operating the subcomponents of Master Data Governance. Communication Destinations [Page 12] This section describes the data needed for the various communication channels, for eample, which users are used for which communications. For more information, see the following section in the SAP NetWeaver Security Guide: Security Guides for Connectivity and Interoperability Technologies [Eternal] 6.1 Communication Channel Security Communication channels transfer a wide variety of different business data that needs to be protected from unauthorized access. SAP makes general recommendations and provides technology for the protection of your system landscape based on SAP NetWeaver. The table below shows the communication channels used by Master Data Governance, the protocol used for the connection, and the type of data transferred. Communication Path Protocol Used Type of Data Transferred Data Requiring Special Protection Application server to application server RFC, HTTP(S) Integration data Business data Application server to application of a third party administrator HTTP(S) Application data For eample, passwords, business data DIAG and RFC connections can be protected using Secure Network Communications (SNC). HTTP connections are protected using the Secure Sockets Layer protocol (SSL protocol). Master Data Governance Security Guide 70 11
12 We strongly recommend that you use secure protocols (SSL, SNC). For more information, see Transport Layer Security [Eternal] und Web Services Security [Eternal] in the SAP NetWeaver Security Guide. 6.2 Network Security Since Master Data Governance is based on SAP NetWeaver technology, for information about network security, see the following sections of the SAP NetWeaver Security Guide at SAP ERP Release/Language SAP NetWeaver Library Administrator's Guide NetWeaver Security Guide Network and Communication Security Network Services : Using Firewall Systems for Access Control [Eternal] Using Multiple Network Zones [Eternal] If you provide services in the Internet, you should protect your network infrastructure with a firewall at least. You can further increase the security of your system or group of systems by placing the groups in different network segments, each of which you then protect from unauthorized access by a firewall. You should bear in mind that unauthorized access is also possible internally if a malicious user has managed to gain control of one of your systems. Ports Master Data Governance is eecuted in SAP NetWeaver and uses the ports of AS ABAP or AS Java. For more information see the corresponding security guides for SAP NetWeaver in the topics for AS ABAP Ports [Eternal] and AS Java Ports [Eternal]. For information about other components, such as SAPinst, SAProuter, or SAP Web Dispatcher, see the document TCP/IP Ports Used by SAP Applications in SAP Developer Network at under Infrastructure Security Network and Communications Security. 6.3 Communication Destinations The use of users and authorizations in an irresponsible manner can pose security risks. You should therefore follow the security rules below when communicating between systems: Employ the user types system and communication. Grant a user only the minimum authorizations. Choose a secure password and do not divulge it to anyone else. Only store user-specific logon data for users of type system and communication. Wherever possible, use trusted system functions instead of user-specific logon data. U 6.4 se of Virus Scanners Master Data Governance Security Guide 70 12
13 If you upload files from application servers into Master Data Governance and you want to use an virus scanner, a virus scanner must then be active on each application server. For more information, see SAP Note (solution A). Work through the Customizing activities in the Implementation Guide under the Virus Scan Interface node. When doing this, use the virus scan profile /MDG_BS_FILE_UPLOAD/MDG_VSCAN, which is delivered for Master Data Governance. When you upload files from the front-end into Master Data Governance, the system uses the configuration you defined for virus scan profile /SIHTTP/HTTP_UPLOAD. For more information, see SAP Note Data Storage Security Using Logical Paths and File Names to Protect Access to the File System Master Data Governance saves data in files in the file system. Therefore, it is important to eplicitly provide access to the corresponding files in the file system without allowing access to other directories or files (also known as directory traversal). This is achieved by specifying logical paths and file names in the system that map to the physical paths and file names. This mapping is validated at runtime and if access is requested to a directory that does not match a stored mapping, then an error occurs. In the application-specific part of this guide, there is a list for each component of the logical file names and paths, where it is specified for which programs these file names and paths apply. Activating the Validation of Logical Paths and File Names The logical paths and file names are entered in the system for the corresponding programs. For downward compatibility, the validation at runtime is deactivated by default. To activate the validation at runtime, maintain the physical path using the transactions FILE (clientindependent) and SF01 (client-dependent). To determine which paths are used by your system, you can activate the appropriate settings in the Security Audit Log. More Information Logical File Names [Eternal] Logical File Names [Eternal] Protecting Access to the File System [Eternal] Security Audit Logs [Eternal] For information about data storage security, see the SAP NetWeaver Security Guide at SAP NetWeaver Release/Language SAP NetWeaver Library Administrator s Guide NetWeaver Security Guide Security Guides for the Operating System and Database Platforms 8 Enterprise Services Security Master Data Governance Security Guide 70 13
14 The following sections in the NetWeaver Security Guide are relevant for Master Data Governance: Web Services Security Guide [Eternal] Recommended WS Security Scenarios [Eternal] 9 Security-Relevant Logs and Tracing The trace and log files of Master Data Governance use the standard mechanisms of SAP NetWeaver. For more information, see the following sections in the SAP NetWeaver Security Guide at Auditing and Logging [Eternal] Tracing and Logging [Eternal] (AS Java) 10 Segregation of Duties Segregation of duties can be achieved by assigning roles to users and in addition by a strict separation of the user groups for the workflow. Activities Assigning Roles to Users You can assign roles to a user using the following transactions: User Maintenance SU01 Use this transaction to assign one or more roles to one user. Role Maintenance PFCG Use this transaction to assign one or more users to one role. Separating User Groups for the Workflow Depending on the component of Master Data Governance you intend to configure, use the following Customizing activities to separate the user groups: MDG-M, MDG-F Run the Customizing activity under Master Data Governance General Settings Process Modeling Workflow Rule-Based Workflow Configure Rule-Based Workflow. MDG-S Run the Customizing activity under Master Data Governance Master Data Governance for Supplier Workflow Assign Processor to Change Request Step Number in BRFplus for Supplier. MDG-C Master Data Governance Security Guide 70 14
15 Depending on the change request step, run the following Customizing activities under: o Master Data Governance General Settings Process Modeling Workflow Other MDG Workflows Assign Processor to Change Request Step Number (Simple Workflow) o Master Data Governance Master Data Governance for Supplier Workflow Assign Processor to Change Request Step Number in BRFplus for Supplier For further information, see Configuring Master Data Governance for Customer [Eternal]. For information about the corresponding roles, see the documents listed below: Authorization Objects Used by Master Data Governance [Page 15] Supplier Master Data Governance (CA-MDG-APP-SUP) [Page 17] Customer Master Data Governance (CA-MDG-APP-CUS) [Page 19] Material Master Data Governance (CA-MDG-APP-MM) [Page 21] Financial Master Data Governance (CA-MDG-APP-FIN) [Page 22] Custom Objects (CA-MDG-COB) [Page 24] 11 Authorization Objects Used by Master Data Governance Authorization Objects The following authorization objects are used by all components of Master Data Governance. To obtain more detailed information about specific authorization objects proceed as follows: 1. Choose SAP Menu Tools ABAP Workbench Development Other Tools Authorization Objects Objects (Transaction SU21). 2. Select the authorization object using (Find) and then choose (Display). 3. On the Display authorization object dialog bo choose Display Object Documentation. Authorization Object MDG_MDF_TR MDG_IDM USMD_CREQ Description Master Data: Transport Key Mapping Change Request Master Data Governance Security Guide 70 15
16 USMD_MDAT USMD_MDATH USMD_UI2 DRF_RECEIVE DRF_ADM CA_POWL BCV_SPANEL BCV_USAGE MDG_DEF MDG_DIF Master Data Hierarchies UI Configuration Authorization for outbound messages for receiver systems Create Outbound Messages Authorization for iviews for personal object worklists Eecute Side Panel Usage of Business Contet Viewer Data Eport Data Import For information about component specific authorization objects, see the corresponding sections: Master Data Governance for Business Partner (CA-MDG-APP-BP) [Page 16] Master Data Governance for Supplier (CA-MDG-APP-SUP) [Page 17] Master Data Governance for Customer (CA-MDG-APP-CUS) [Page 19] Master Data Governance for Material (CA-MDG-APP-MM) [Page 21] Master Data Governance for Financial (CA-MDG-APP-FIN) [Page 22] Master Data Governance for Custom Objects (CA-MDG-COB) [Page 24] Standard Role Role SAP_MDG_ADMIN Name Master Data Governance Administrator This role contains authorizations needed for administrative tasks and for setting up a base configuration in all components of Master Data Governance. Some authorizations enable critical activities. If multiple users in your organization are entrusted with the administration and configuration of Master Data Governance, we recommend that you split the role into several roles, each with its own set of authorizations. The role does not contain the authorizations for the respective master data transactions Master Data Governance for Business Partner (CA-MDG-APP-BP) Master Data Governance Security Guide 70 16
17 Authorization Objects Master Data Governance for Business Partner mainly uses the authorization objects of the business objects Business Partner, the authorization objects of the Application Framework for Master Data Governance, and the authorization objects of the Data Replication Framework. Authorization Object B_BUPA_GRP Description Business Partner: Authorization Groups This authorization object is optional. You need to assign this authorization object only if master data records are to be specifically protected. B_BUPA_RLT B_BUPR_BZT DC_OBJECT Business Partner: BP Roles Business Partner Relationships: Relationship Categories Data Cleansing Authorization objects used by all components of Master Data Governance are listed in the document Authorization Objects Used by Master Data Governance [Page 15]. Standard Roles Role SAP_MDGBP_MENU_04 [Eternal] SAP_MDGBP_DISP_04 [Eternal] SAP_MDGBP_REQ_04 [Eternal] SAP_MDGBP_SPEC_04 [Eternal] SAP_MDGBP_STEW_04 [Eternal] Name Master Data Governance for Business Partner: Menu Master Data Governance for Business Partner: Display Master Data Governance for Business Partner: Requestor Master Data Governance for Business Partner: Specialist Master Data Governance for Business Partner: Data Steward If you want to restrict the authorizations for users or roles to specific values, go to Create Authorizations for Data Model and define which entity types and attributes are authorization relevant Master Data Governance for Supplier (CA- MDG-APP-SUP) Master Data Governance Security Guide 70 17
18 Authorization Objects Master Data Governance for Supplier does not have dedicated authorization objects, but instead uses the authorization objects of the business objects Business Partner and Vendor, the authorization objects of the Application Framework for Master Data Governance, and the authorization objects of the Data Replication Framework. Authorization Object B_BUPA_GRP Description Business Partner: Authorization Groups This authorization object is optional. You need to assign this authorization object only if master data records are to be specifically protected. B_BUPA_RLT B_BUPR_BZT DC_OBJECT F_LFA1_APP F_LFA1_BEK Business Partner: BP Roles Business Partner Relationships: Relationship Categories Data Cleansing Vendor: Application Authorization Vendor: Account Authorization This authorization object is optional. You need to assign this authorization object only if master data records are to be specifically protected. F_LFA1_BUK F_LFA1_GEN F_LFA1_GRP M_LFM1_EKO Vendor: Authorization for Company Codes Vendor: Central Data Vendor: Account Group Authorization Purchasing organization in supplier master data Authorization objects used by all components of Master Data Governance are listed in the document Authorization Objects Used by Master Data Governance [Page 15]. Standard Roles Role Name Master Data Governance Security Guide 70 18
19 SAP_MDGS_MENU_04 SAP_MDGS_DISP_04 SAP_MDGS_REQ_04 SAP_MDGS_SPEC_04 SAP_MDGS_STEW_04 SAP_MDGS_LVC_MENU_03 SAP_MDGS_LVC_REQ_03 Master Data Governance for Supplier: Menu [Eternal] Master Data Governance for Supplier: Display [Eternal] Master Data Governance for Supplier: Requester [Eternal] Master Data Governance for Supplier: Specialist [Eternal] Master Data Governance for Supplier: Data Steward [Eternal] Master Data Governance for Supplier (Lean Request UI): Menu [Eternal] Master Data Governance for Supplier (Lean Request UI): Requester [Eternal] If you want to restrict the authorizations for users or roles to specific values, go to Create Authorizations for Data Model and define which entity types and attributes are authorization relevant Master Data Governance for Customer (CA- MDG-APP-CUS) Authorization Objects Master Data Governance for Customer does not have dedicated authorization objects, but instead uses the authorization objects of the business objects Business Partner and Customer, the authorization objects of the Application Framework for Master Data Governance, and the authorization objects of the Data Replication Framework. Depending on whether you use the Master Data Governance for Customer on a hub system [Eternal] or on a client system [Eternal] a different set of authorization objects is required. Authorization Object Description Hub System Client System B_BUPA_GRP Business Partner: Authorization Groups This authorization object is optional. You need to assign this authorization object only if master data records are to be specifically protected. B_BUPA_RLT Business Partner: BP Roles B_BUPR_BZT Business Partner Relationships: Master Data Governance Security Guide 70 19
20 Relationship Categories DC_OBJECT Data Cleansing F_KNA1_APP Customer: Application Authorization F_KNA1_BED Customer: Account Authorization This authorization object is optional. You do not need to assign this authorization object if no master records are to be specifically protected. F_KNA1_BUK Customer: Authorization for Company Codes F_KNA1_GEN Customer: Central Data F_KNA1_GRP Customer: Account Group Authorization MDGC_LCOPY Copy Customer Master Data from MDG Hub V_KNA1_BRG Customer: Account Authorization for Sales Areas V_KNA1_VKO Customer: Authorization for Sales Organizations Authorization objects used by all components of Master Data Governance are listed in the document Authorization Objects Used by Master Data Governance [Page 15]. Standard Roles Role SAP_MDGC_MENU_04 SAP_MDGC_DISP_04 SAP_MDGC_REQ_04 SAP_MDGC_SPEC_04 SAP_MDGC_STEW_04 Name Master Data Governance for Customer: Menu [Eternal] Master Data Governance for Customer: Display [Eternal] Master Data Governance for Customer: Requester [Eternal] Master Data Governance for Customer: Specialist [Eternal] Master Data Governance for Customer: Data Steward [Eternal] Master Data Governance Security Guide 70 20
21 If you want to restrict the authorizations for users or roles to specific values, go to Create Authorizations for Data Model and define which entity types and attributes are authorization relevant Master Data Governance for Material (CA- MDG-APP-MM) Authorization Objects Master Data Governance for Material does not have dedicated authorization objects, but instead uses, for eample, the authorization objects of the Material Master and the Application Framework for Master Data Governance. Authorization Object M_MATE_MAT M_MATE_MAR M_MATE_WGR M_MATE_STA M_MATE_MTA M_MATE_WRK M_MATE_MAN M_MATE_NEU M_MATE_BUK M_MATE_VKO M_MATE_LGN C_KLAH_BKL C_KLAH_BSE C_TCLA_BKA C_DRAD_OBJ C_DRAW_DOK C_DRAW_TCD C_DRAW_TCS Description Material Master: Material Material Master: Material Type Material Master: Material Group Material Master: Maintenance Status Material Master: Change Material Type Material Master: Plant Material Master: Central Data Material Master: Create Material Master: Company Codes Material Master: Sales Organization/Distribution Channel Material Master: Warehouse Numbers Authorization for Classification Authorization for Selection Authorization for Class Types Create/Change/Display/Delete Object Link Authorization for document access Authorization for document activities Status-Dependent Authorizations for Documents Master Data Governance Security Guide 70 21
22 C_DRAW_BGR C_DRAW_STA DRF_RECEIV DRF_ADM PLM_SPUSR Authorization for authorization groups Authorization for document status Authorization for outbound messages for receiver systems Create Outbound Messages Superuser by Object Type You need this authorization object for the object type PLM_MAT only if the search object connector of SAP NetWeaver Enterprise Search is created for the following Enterprise Search software components: PLMWUI Software components that include PLMWUI For more information about SAP NetWeaver Enterprise Search, see SAP NetWeaver Enterprise Search [Eternal]. Authorization objects used by all components of Master Data Governance are listed in the document Authorization Objects Used by Master Data Governance [Page 15]. Standard Roles Role SAP_MDGM_MENU_04 [Eternal] SAP_MDGM_DISP_04 [Eternal] SAP_MDGM_REQ_04 [Eternal] SAP_MDGM_SPEC_04 [Eternal] SAP_MDGM_STEW_04 [Eternal] Name Master Data Governance for Material: Menu Master Data Governance for Material: Display Master Data Governance for Material: Requester Master Data Governance for Material: Specialist Master Data Governance for Material: Data Steward If you want to restrict the authorizations for users or roles to specific values, go to Create Authorizations for Data Model and define which entity types and attributes are authorization relevant Master Data Governance for Financials (CA- MDG-APP-FIN) Master Data Governance Security Guide 70 22
23 Authorization Objects Authorization Object USMD_DIST Description Distribution This authorization object is used if you have not activated business function MDG_FOUNDATION. (Switch: FIN_MDM_CORE_SFWS_EHP5) USMD_EDTN Edition Authorization objects used by all components of Master Data Governance are listed in the document Authorization Objects Used by Master Data Governance [Page 15]. Standard Roles Role SAP_MDGF_ACC_DISP_04 [Eternal] SAP_MDGF_ACC_REQ_04 [Eternal] SAP_MDGF_ACC_SPEC_04 [Eternal] SAP_MDGF_ACC_STEW_04 [Eternal] SAP_MDGF_CO_DISP_04 [Eternal] SAP_MDGF_CO_REQ_04 [Eternal] SAP_MDGF_CO_SPEC_04 [Eternal] SAP_MDGF_CO_STEW_04 [Eternal] SAP_MDGF_CTR_DISP_04 [Eternal] SAP_MDGF_CTR_REQ_04 [Eternal] SAP_MDGF_CTR_SPEC_04 [Eternal] SAP_MDGF_CTR_STEW_04 Description Master Data Governance for Financials: Accounting Display Master Data Governance for Financials: Accounting Requester Master Data Governance for Financials: Accounting Specialist Master Data Governance for Financials: Accounting Data Steward Master Data Governance for Financials: Consolidation Display Master Data Governance for Financials: Consolidation Requester Master Data Governance for Financials: Consolidation Specialist Master Data Governance for Financials: Consolidation Data Steward Master Data Governance for Financials: Controlling Display Master Data Governance for Financials: Controlling Requester Master Data Governance for Financials: Controlling Specialist Master Data Governance for Financials: Controlling Master Data Governance Security Guide 70 23
24 [Eternal] Data Steward If you want to restrict the authorizations for users or roles to specific values, go to Create Authorizations for Data Model and define which entity types and attributes are authorization relevant Master Data Governance for Custom Objects (CA-MDG-COB) Authorization Objects You can use the following authorization objects for Master Data Governance for Custom Objects. Authorization Object USMD_DIST USMD_DM USMD_EDTN Description Replication Data Model Edition Type Authorization objects used by all components of Master Data Governance are listed in the document Authorization Objects Used by Master Data Governance [Page 15]. Standard Role Role SAP_MDGX_MENU_04 [Eternal] SAP_MDGX_FND_SAMPLE_SF_04 [Eternal] Name Master data governance for self-defined objects Master data governance for self-defined objects - Flight Data Model eample If you want to restrict the authorizations for users or roles to specific values, go to Create Authorizations for Data Model and define which entity types and attributes are authorization relevant. 12 Change Settings of Generated MDG Database Tables The SAP system generates database tables for the entities of all defined data models. The settings of these database tables are the following: Buffering and log of data changes is switched on. Display and maintenance is allowed with restrictions. Master Data Governance Security Guide 70 24
25 Activities To change these settings of generated MDG database tables run the transaction MDG_TABLE_ADJUST. The results of the transaction are listed in the transaction SLG1 (Analyse Application Log), using Object FMDM and Subobject ADJUST_TABLE. You have to eecute the transaction in each system manually. After a model activation it might be necessary to eecute the transaction again. More Information For more information see SAP note Appendi For more information about the security of SAP applications see SAP Service Marketplace at You can also access additional security guides via SAP Service Marketplace at For more information about security issues, see SAP Service Marketplace at followed by: Topic Master guides, installation guides, upgrade guides, and Solution Management guides Related notes Platforms Network security SAP Service Marketplace /instguides /ibc /notes /platforms /network /securityguide Technical infrastructure SAP Solution Manager /ti /solutionmanager Master Data Governance Security Guide 70 25
SAP Project Portfolio Monitoring Rapid- Deployment Solution: Software Requirements
SAP Portfolio and Project Management 5.0 July 2013 English SAP Project Portfolio Monitoring Rapid- Deployment Solution: SAP AG Dietmar-Hopp-Allee 16 69190 Walldorf Germany Copyright 2013 SAP AG or an SAP
SAP NetWeaver 04 Security Guide. Security Guide for SAP Mobile Infrastructure
SAP NetWeaver 04 Security Guide Security Guide for SAP Mobile Infrastructure Document Version 1.00 April 29, 2004 SAP AG Neurottstraße 16 69190 Walldorf Germany T +49/18 05/34 34 24 F +49/18 05/34 34 20
SFSF EC to 3 rd party payroll Integration Software and Delivery Requirements
SAP HCI(PI) August 2015 English SFSF EC to 3 rd party payroll Integration Software and Delivery Requirements SAP SE Dietmar-Hopp-Allee 16 69190 Walldorf Germany Document Revisions Date 0 November 2014
SAP Fiori Infrastructure rapid-deployment solution: Software and Delivery Requirements
Fiori October 2014 English Version 1.0 Fiori Infrastructure rapid-deployment solution: Software and Delivery Requirements AG Dietmar-Hopp-Allee 16 69190 Walldorf Germany Document Revisions Date 0 26 th
SAP MII for Manufacturing rapid-deployment solution: Software Requirements
MII 15.0 October 2015 English SAP MII for Manufacturing rapid-deployment solution: SAP SE Dietmar-Hopp-Allee 16 69190 Walldorf Germany Copyright 2015 SAP SE or an SAP affiliate company. All rights reserved.
Ariba Procure-to-Pay Integration rapiddeployment
September 2015 English Ariba Procure-to-Pay Integration rapiddeployment solution: Software and Delivery Requirements SAP SE Dietmar-Hopp-Allee 16 69190 Walldorf Germany Document Revisions Date 0 May 11,
SAP Payroll Processing control center rapiddeployment
Software and Delivery Requirements Document Version: 1.0 July 2015 SAP Payroll Processing control center rapiddeployment solution Typographic Conventions Type Style Example Description Words or characters
Software Requirements
EHP6 for SAP ERP 6.0 October 2014 English SAP Commercial Project Management rapiddeployment solution SAP AG Dietmar-Hopp-Allee 16 69190 Walldorf Germany Copyright 2014 SAP SE or an SAP affiliate company.
SAP 3D Visual Enterprise Rapid-Deployment Solution
SAP 3D Visual Enterprise 8.0 July 2014 English SAP 3D Visual Enterprise Rapid-Deployment Solution SAP AG Dietmar-Hopp-Allee 16 69190 Walldorf Germany Copyright 2014 SAP AG or an SAP affiliate company.
Setting up Visual Enterprise Integration (WM6)
SAP Mobile Platform 3.0 June 2015 English Setting up Visual Enterprise Integration (WM6) Building Block Configuration Guide SAP SE Dietmar-Hopp-Allee 16 69190 Walldorf Germany Copyright 2015 SAP SE or
Rapid database migration of SAP Business Suite to SAP HANA (V4.10): Software and Delivery Requirements. SAP HANA November 2014 English
November 2014 English Rapid database migration of SAP Business Suite to (V4.10): Software and Delivery Requirements SAP SE Dietmar-Hopp-Allee 16 69190 Walldorf Germany Copyright 2014 SAP SE or an SAP affiliate
SAP Cloud for Customer integration with SAP ERP: Software and Delivery Requirements
SAP Cloud for 1502 March 2015 English SAP Cloud for integration with SAP ERP: Software and Delivery Requirements SAP SE Dietmar-Hopp-Allee 16 69190 Walldorf Germany Document Revisions 0 1 2 Date Copyright
FI Localization for Ukraine. Asset Accounting (FI-AA) SAP Library 05.09.2013. CUSTOMER Document Version: 6774 September 2013
FI Localization for Ukraine Asset Accounting (FI-AA) CUSTOMER Document Version: 6774 September 2013 Asset Accounting (FI-AA) 1 Copyright Copyright 2013 SAP AG. All rights reserved. SAP Library document
Software and Delivery Requirements
SuccessFactors Recruiting April 2015 English SuccessFactors Recruiting rapiddeployment solution: Software and Delivery Requirements SAP SE Dietmar-Hopp-Allee 16 69190 Walldorf Germany Copyright 2015 SAP
Configuration (X87) SAP Mobile Secure: SAP Afaria 7 SP5 September 2014 English. Building Block Configuration Guide
SAP Mobile Secure: SAP Afaria 7 SP5 September 2014 English Afaria Network Configuration (X87) Building Block Configuration Guide SAP SE Dietmar-Hopp-Allee 16 69190 Walldorf Germany Copyright 2014 SAP SE
SAP Business Intelligence Adoption V6.41: Software and Delivery Requirements. SAP Business Intelligence Adoption February 2015 English
Business Intelligence Adoption February 2015 English Business Intelligence Adoption V6.41: Software and Delivery Requirements AG Dietmar-Hopp-Allee 16 69190 Walldorf Germany Document Revisions Date 0 11/11/14
SAP HANA Big Data Intelligence rapiddeployment
SAP HANA 1.0 November 2015 English SAP HANA Big Data Intelligence rapiddeployment solution: Software and Delivery Requirements SAP SE Dietmar-Hopp-Allee 16 69190 Walldorf Germany Document Revisions 0 1
2015-09-24. SAP Operational Process Intelligence Security Guide
2015-09-24 SAP Operational Process Intelligence Security Guide Content 1 Introduction.... 3 2 Before You Start....5 3 Architectural Overview.... 7 4 Authorizations and Roles.... 8 4.1 Assigning Roles to
Software and Delivery Requirements
SAP HANA Big Data Intelligence rapiddeployment solution November 2014 English SAP HANA Big Data Intelligence rapiddeployment solution: Software and Delivery Requirements SAP SE Dietmar-Hopp-Allee 16 69190
Getting Started with the License Administration Workbench 2.0 (LAW 2.0)
Getting Started SAP Global License Auditing Document Version: 1.2 2015-03-13 Getting Started with the License Administration Workbench 2.0 (LAW 2.0) Table of Contents 1 Getting Started with the License
R49 Using SAP Payment Engine for payment transactions. Process Diagram
R49 Using SAP Payment Engine for payment transactions Process Diagram Purpose, Benefits, and Key Process Steps Purpose The purpose of this scenario is to show you how to check the result of payment orders
Software and Delivery Requirements
SAP Best Practices for SAP Cloud for Travel and Expense November 2014 English SAP Best Practices for SAP Cloud for Travel and Expense: Software and Delivery Requirements SAP SE Dietmar-Hopp-Allee 16 69190
How-To Guide SAP NetWeaver Document Version: 1.0-2013-12-22. How To Guide - Configure SSL in ABAP System
How-To Guide SAP NetWeaver Document Version: 1.0-2013-12-22 Document History Document Version Description 1.0 First official release of this guide Document History 2013 SAP AG or an SAP affiliate company.
SAP Secure Operations Map. SAP Active Global Support Security Services May 2015
SAP Secure Operations Map SAP Active Global Support Security Services May 2015 SAP Secure Operations Map Security Compliance Security Governance Audit Cloud Security Emergency Concept Secure Operation
SAP Sales and Operations Planning
Document Version: 1.0 2014-05-21 Additional Documentation Typographic Conventions Type Style Example Description Words or characters quoted from the screen. These include field names, screen titles, pushbuttons
SAP Certified Technology Professional - Security with SAP NetWeaver 7.0. Title : Version : Demo. The safer, easier way to help you pass any IT exams.
Exam : P_ADM_SEC_70 Title : SAP Certified Technology Professional - Security with SAP NetWeaver 7.0 Version : Demo 1 / 5 1.Which of the following statements regarding SSO and SAP Logon Tickets are true?
How to Configure an Example SAP Cloud Applications Studio (PDI) Solution for SAP Cloud for Customer
How-To Guide Document Version: 1411 2014.12.15 How to Configure an Example SAP Cloud Applications Studio (PDI) Solution for SAP Cloud for Customer How to configure an example SAP Cloud Applications Studio
Using SAP Logon Tickets for Single Sign on to Microsoft based web applications
Collaboration Technology Support Center - Microsoft - Collaboration Brief March 2005 Using SAP Logon Tickets for Single Sign on to Microsoft based web applications André Fischer, Project Manager CTSC,
SAP SECURITY AND AUTHORIZATIONS - RISK MANAGEMENT AND COMPLIANCE WITH LEGAL REGULATIONS IN THE SAP ENVIRONMENT
SAP SECURITY AND AUTHORIZATIONS - RISK MANAGEMENT AND COMPLIANCE WITH LEGAL REGULATIONS IN THE SAP ENVIRONMENT Foreword by Prof. Wolfgang Lassmann... 15 Foreword by Dr. Sachar Paulus... 17 1 Introduction...
rapid data load for SAP hybris Marketing: Software and Delivery Requirements
rapid data load for hybris Marketing April 2015 English rapid data load for hybris Marketing: Software and Delivery Requirements SE Dietmar-Hopp-Allee 16 69190 Walldorf Germany Document Revisions 0 1 2
SAP Business One, version for SAP HANA Platform Support Matrix
Platform Support Matrix Document Version: 1.09 2015-12-03 Platform Support Matrix Release 8.82 and higher Typographic Conventions Type Style Example Description Words or characters quoted from the screen.
SAP MDG, central governance, financial data. Nov. 2015
SAP MDG, central governance, financial data Nov. 2015 Agenda Financial Master Data in the Business Situation and Challenges The Solution: SAP Master Data Governance for Financials Process Content Architecture
Software and Delivery Requirements
EHP3 for SCM 7.0 March 2015 English Demand and Supply Network Planning rapiddeployment solution: Software and Delivery Requirements SE Dietmar-Hopp-Allee 16 69190 Walldorf Germany Document Revisions Date
SAP Business Intelligence Adoption V7.41:Software and Delivery Requirements. SAP Business Intelligence Adoption August 2015 English
Business Intelligence Adoption August 2015 English Business Intelligence Adoption V7.41:Software and Delivery Requirements SE Dietmar-Hopp-Allee 16 69190 Walldorf Germany Document Revisions Date 0 6/26/2015
SAP Fiori Sales Rep & SAP CRM Rapid- Deployment Solution
EHP3 for SAP CRM 7.0 May 2014 English SAP Fiori Sales Rep & SAP CRM Rapid- Deployment Solution Configuration Delta Guide for the CRM rapiddeployment solution V6.703 and the SAP Fiori Apps rapid-deployment
SAP Business One Hardware Requirements Guide
Hardware Requirements Guide Document Version: 1.04 2014-08-25 Release 8.8 and higher Typographic Conventions Type Style Example Description Words or characters quoted from the screen. These include field
SAP ERP E-Commerce and SAP CRM Web Channel Enablement versions available on the market
SAP ERP E-Commerce and SAP CRM Web Channel Enablement versions available on the market TABLE OF CONTENTS NAMING... 3 VERSIONS... 3 NETWEAVER TECHNICAL DIFFERENCES... 4 MAINTENANCE PERIODS... 5 UPGRADE
How To Configure MDM to Work with Oracle ASM-Based Products
SAP NetWeaver How-To Guide How To Configure MDM to Work with Oracle ASM-Based Products Applicable Releases: MDM 7.1 SP10 and later Version 1.0 June 2013 Copyright 2013 SAP AG. All rights reserved. No part
SAP Standard for Remote Supportability
SAP Standard for E2E Solution Operations Document Version: 1.0 2014-12-12 SAP Solution Manager 7.1 Typographic Conventions Type Style Example Description Words or characters quoted from the screen. These
How-To Guide SAP Cloud for Customer Document Version: 1.0-2014-03-20. How to Configure SAP HCI basic authentication for SAP Cloud for Customer
How-To Guide SAP Cloud for Customer Document Version: 1.0-2014-03-20 How to Configure SAP HCI basic authentication for SAP Cloud for Customer Document History Document Version Description 1.0 First official
Additional Guide to Implementing the SAP CRM Service Management rapiddeployment
EHP3 for SAP CRM 7.0 April 2014 English Document Version 1.0 Additional Guide to Implementing the SAP CRM Service Management rapiddeployment solution / SAP Best Practices for Service Management in CRM
Data Integration using Integration Gateway. SAP Mobile Platform 3.0 SP02
Data Integration using Integration Gateway SAP Mobile Platform 3.0 SP02 DOCUMENT ID: DC02000-01-0302-01 LAST REVISED: February 2014 Copyright 2014 by SAP AG or an SAP affiliate company. All rights reserved.
Landscape Design and Integration. SAP Mobile Platform 3.0 SP02
Landscape Design and Integration SAP Mobile Platform 3.0 SP02 DOCUMENT ID: DC01916-01-0302-01 LAST REVISED: February 2014 Copyright 2014 by SAP AG or an SAP affiliate company. All rights reserved. No part
Quick Guide to the SAP Customer Relationship Management Rapid- Deployment Solution (based on EhP1) Demo/Evaluation Appliance
SAP CRM 7.01 November 2012 English Quick Guide to the SAP Customer Relationship Management Rapid- Deployment Solution (based on EhP1) Demo/Evaluation Appliance SAP AG Dietmar-Hopp-Allee 16 69190 Walldorf
Developing Applications for Integration between PI and SAP ERP in Different Network Domains or Landscapes
Developing Applications for Integration between PI and SAP ERP in Different Network Domains or Landscapes Applies to: SAP NetWeaver Process Integration 7.1+ SAP NetWeaver 7.02 (ABAP) Summary This document
Protect Your Connected Business Systems by Identifying and Analyzing Threats
SAP Brief SAP Technology SAP Enterprise Threat Detection Objectives Protect Your Connected Business Systems by Identifying and Analyzing Threats Prevent security breaches Prevent security breaches Are
So far in the first three chapters of this book we have studied an overview of SAP
4 CHAPTER SAP ERP Integration Overview with Other Systems So far in the first three chapters of this book we have studied an overview of SAP business suite applications and the NetWeaver Application Server
SAP NetWeaver Identity Management Identity Services Configuration Guide
SAP NetWeaver Identity Management Identity Services Configuration Guide Version 7.2 Rev 7 2014 SAP AG or an SAP affiliate company. All rights reserved. No part of this publication may be reproduced or
Business-Driven, Compliant Identity Management
SAP Solution in Detail SAP NetWeaver SAP Identity Management Business-Driven, Compliant Identity Management Table of Contents 3 Quick Facts 4 Business Challenges: Managing Costs, Process Change, and Compliance
Landscape Deployment Recommendations for. SAP Fiori Front-End Server
Landscape Deployment Recommendations for SAP Fiori Front-End New Rollout Channel The rollout channel for publishing landscape deployment recommendations changed. Please have a look at our announcement.
SEC100 Secure Authentication and Data Transfer with SAP Single Sign-On. Public
SEC100 Secure Authentication and Data Transfer with SAP Single Sign-On Public Speakers Las Vegas, Oct 19-23 Christian Cohrs, Area Product Owner Barcelona, Nov 10-12 Regine Schimmer, Product Management
Quick Guide to Implementing the SAP Extended Financial Planning rapiddeployment
SAP NetWeaver SAP Business Planning and Consolidation SAP EPM add-in for Microsoft Excel Web Services Enhancements 3.0 for Microsoft.NET April 2014 English Only Quick Guide to Implementing the SAP Extended
Integration of SAP central user administration with Microsoft Active Directory
Collaboration Technology Support Center Microsoft - Collaboration Brief June 2005 Integration of SAP central user administration with Microsoft Active Directory Chris Kohlsdorf, Senior System Architect
How-To Guide SAP Cloud for Customer Document Version: 2.0-2015-10-06. How to Perform Initial Load of data from SAP ERP to SAP Cloud for Customer
How-To Guide SAP Cloud for Customer Document Version: 2.0-2015-10-06 How to Perform Initial Load of data from SAP ERP to SAP Cloud for Customer Document History Document Version Description 1.0 First official
Open Items Analytics Dashboard System Configuration
Author: Vijayakumar Udayakumar [email protected] Target Audience Developers Consultants For validation Document version 0.95 03/05/2013 Open Items Analytics Dashboard Scenario Overview Contents
Security and Your SAP System When Working with Winshuttle Products
Security and Your SAP System When Working with Winshuttle Products 2014 Winshuttle, LLC. All rights reserved. 2/14 www.winshuttle.com Background Companies running SAP systems are accustomed to configuring
How to Configure and Trouble Shoot Email Notification for Process Control 2.5
SAP SOLUTIONS FOR GOVERNANCE, RISK, AND COMPLIANCE How-To Guide How to Configure and Trouble Shoot Email Notification for Process Control 2.5 SAP GRC Regional Implementation Group Applicable Releases:
How to Configure Integration between SAP Cloud for Customer and SAP hybris Marketing
o How-To Guide Document Version: 2.0 2015-09-14 How to Configure Integration between SAP Cloud for Customer and SAP hybris Marketing How to Configure Integration between SAP hybris Marketing and SAP Cloud
Cybersecurity and Secure Authentication with SAP Single Sign-On
Solution in Detail SAP NetWeaver SAP Single Sign-On Cybersecurity and Secure Authentication with SAP Single Sign-On Table of Contents 3 Quick Facts 4 Remember One Password Only 6 Log In Once to Handle
RCS UI Field Security (UI Masking) Tobias Keller, Product Owner Custom Development, SAP SE December 2014
RCS UI Field Security (UI Masking) Tobias Keller, Product Owner Custom Development, SAP SE December 2014 Data Security The insider threat 2014 SAP SE. All rights reserved. Customer 2 Data Security SAP
Integration of SAP Netweaver User Management with LDAP
Integration of SAP Netweaver User Management with LDAP Applies to: SAP Netweaver 7.0/7.1 Microsoft Active Directory 2003 Summary The document describes the detailed steps of configuring the integration
How to Schedule Report Execution and Mailing
How To Guide SAP Business One Document Version: 1.0 2012-09-02 Applicable Releases: SAP Business One 8.81 PL10 and higher, SAP Business One 8.82 Typographic Conventions Type Style Example Description Words
SAP How-To Guide: Develop a Custom Master Data Object in SAP MDG (Master Data Governance)
SAP How-To Guide: Develop a Custom Master Data Object in SAP MDG (Master Data Governance) Applies to: SAP Master Data Governance running on SAP ERP 6 EhP 6 Master Data Governance. The Guide can also be
ITM204 Post-Copy Automation for SAP NetWeaver Business Warehouse System Landscapes. October 2013
ITM204 Post-Copy Automation for SAP NetWeaver Business Warehouse System Landscapes October 2013 Disclaimer This presentation outlines our general product direction and should not be relied on in making
How To Make Your Software More Secure
SAP Security Concepts and Implementation Source Code Scan Tools Used at SAP Detecting and Eliminating Security Flaws Early On Table of Contents 4 SAP Makes Code Scan Tools for ABAP Programming Language
Unlock the Value of Your Microsoft and SAP Software Investments
SAP Technical Brief SAP Gateway Objectives Unlock the Value of Your Microsoft and SAP Software Investments Bridging the integration gap between SAP and Microsoft environments Bridging the integration gap
Security and Risk Management
Mario Linkies and Horst Karin SAP Security and Risk Management Bonn Boston Contents at a Glance PART I Basic Principles of Risk Management and IT Security... 31 1 Risk and Control Management... 33 2 Enterprise
SAP HANA SPS 09 - What s New? HANA IM Services: SDI and SDQ
SAP HANA SPS 09 - What s New? HANA IM Services: SDI and SDQ (Delta from SPS 08 to SPS 09) SAP HANA Product Management November, 2014 2014 SAP SE or an SAP affiliate company. All rights reserved. 1 Agenda
SAP BusinessObjects Business Intelligence Suite Document Version: 4.1 Support Package 3-2014-05-07. Patch 3.x Update Guide
SAP BusinessObjects Business Intelligence Suite Document Version: 4.1 Support Package 3-2014-05-07 Table of Contents 1 Document History....3 2 Introduction....4 2.1 About this Document....4 2.1.1 Constraints....4
SEPA in SAP CRM. Application Innovation, CRM & Service Industries. Customer
SEPA in SAP CRM Application Innovation, CRM & Service Industries Customer Agenda Overview SEPA in SAP CRM Additional Information 2013 SAP AG. All rights reserved. Customer 2 Agenda Overview SEPA in SAP
Remote Connectivity Infrastructure
Remote Connectivity Infrastructure SAP Active Global Support & Maintenance Go-to-Market November 2014 Public Remote Connectivity Infrastructure Table of Contents Introduction General Architecture SAProuter
SAP SECURITY CLEARING THE CONFUSION AND TAKING A HOLISTIC APPROACH
SAP SECURITY CLEARING THE CONFUSION AND TAKING A HOLISTIC APPROACH WWW.MANTRANCONSULTING.COM 25 Mar 2011, ISACA Singapore SOD SAS70 Project Controls Infrastructure security Configurable controls Change
SAP Document Center. May 2016. Public
SAP Document Center May 2016 Public The Big Picture for a Digital Platform Applications Applications IoT IoT Platform (Micro-) Services Extensions Icon Digital Boardroom Analytical Applications S/4HANA
SAP Mobile Documents. December, 2015
SAP Mobile Documents December, 2015 Disclaimer This presentation outlines our general product direction and should not be relied on in making a purchase decision. This presentation is not subject to your
Installation Guide: Agentry Device Clients SAP Mobile Platform 2.3
Installation Guide: Agentry Device Clients SAP Mobile Platform 2.3 Windows DOCUMENT ID: DC01954-01-0230-01 LAST REVISED: February 2013 Copyright 2013 by SAP AG or an SAP affiliate company. All rights reserved.
ATTACKS TO SAP WEB APPLICATIONS
ATTACKS TO SAP WEB APPLICATIONS by Mariano Nuñez Di Croce [email protected] BlackHat DC 2011 Briefings Abstract "SAP platforms are only accessible internally". While that was true in many organizations
How to Implement the X.509 Certificate Based Single Sign-On Solution with SAP Netweaver Single Sign-On
How to Implement the X.509 Certificate Based Single Sign-On Solution with SAP Netweaver Single Sign-On How to implement the X.509 certificate based Single Sign-On solution from SAP Page 2 of 34 How to
Cut Costs and Improve Agility by Simplifying and Automating Common System Administration Tasks
SAP Brief Objectives Cut Costs and Improve Agility by Simplifying and Automating Common System Administration Tasks Simplify management of SAP software landscapes Simplify management of SAP software landscapes
SAP NetWeaver Application Server Add-On for Code Vulnerability Analysis
SAP NetWeaver Application Server Add-On for Code Vulnerability Analysis Disclaimer This presentation outlines our general product direction and should not be relied on in making a purchase decision. This
SAP HANA SPS 09 - What s New? Development Tools
SAP HANA SPS 09 - What s New? Development Tools (Delta from SPS 08 to SPS 09) SAP HANA Product Management November, 2014 2014 SAP SE or an SAP affiliate company. All rights reserved. 1 Overview What s
Dell One Identity Cloud Access Manager 8.0.1 - How to Configure for SSO to SAP NetWeaver using SAML 2.0
Dell One Identity Cloud Access Manager 8.0.1 - How to Configure for SSO to SAP NetWeaver using SAML 2.0 May 2015 About this guide Prerequisites and requirements NetWeaver configuration Legal notices About
Configuring Java IDoc Adapter (IDoc_AAE) in Process Integration. : SAP Labs India Pvt.Ltd
Configuring Java IDoc Adapter (IDoc_AAE) in Process Integration Author Company : Syed Umar : SAP Labs India Pvt.Ltd TABLE OF CONTENTS INTRODUCTION... 3 Preparation... 3 CONFIGURATION REQUIRED FOR SENDER
Update on the SAP GUI Family. Q3/2014 Public
Update on the SAP GUI Family Q3/2014 Public Disclaimer This presentation outlines our general product direction and should not be relied on in making a purchase decision. This presentation is not subject
PUBLIC Secure Login for SAP Single Sign-On Implementation Guide
SAP Single Sign-On 2.0 SP04 Document Version: 1.0-2014-10-28 PUBLIC Secure Login for SAP Single Sign-On Implementation Guide Table of Contents 1 What Is Secure Login?....8 1.1 System Overview.... 8 1.1.1
Security Guide SAP GUI for Windows
Security Guide SAP GUI for Windows SAP GUI for Windows Release 7.30 SAP Technical Information June 2012 2 Contents 1. SAP GUI SECURITY MODULE... 4 1.1 SAP GUI SECURITY SETTINGS... 4 2.2 WHICH ACTIONS TRIGGERED
CUSTOMER Presentation of SAP Predictive Analytics
SAP Predictive Analytics 2.0 2015-02-09 CUSTOMER Presentation of SAP Predictive Analytics Content 1 SAP Predictive Analytics Overview....3 2 Deployment Configurations....4 3 SAP Predictive Analytics Desktop
Enabling Single Signon with IBM Cognos ReportNet and SAP Enterprise Portal
Guideline Enabling Single Signon with IBM Cognos ReportNet and SAP Enterprise Portal Product(s): IBM Cognos ReportNet Area of Interest: Security 2 Copyright Copyright 2008 Cognos ULC (formerly Cognos Incorporated).
How to Create Web Dynpro-Based iviews. Based on SAP NetWeaver 04 Stack 09. Jochen Guertler
How to Create Web Dynpro-Based iviews Based on SAP NetWeaver 04 Stack 09 Jochen Guertler Copyright Copyright 2004 SAP AG. All rights reserved. No part of this publication may be reproduced or transmitted
Gateway Apps - Security Summary SECURITY SUMMARY
Gateway Apps - Security Summary SECURITY SUMMARY 27/02/2015 Document Status Title Harmony Security summary Author(s) Yabing Li Version V1.0 Status draft Change Record Date Author Version Change reference
HP Operations Orchestration Software
HP Operations Orchestration Software Software Version: 9.00 HP Project and Portfolio Management Integration Guide Document Release Date: June 2010 Software Release Date: June 2010 Legal Notices Warranty
