Your complete guide to safeguarding your SAP HANA 2.0 platform awaits! Get step-by-step instructions for configuring and maintaining each security element, from the new SAP HANA cockpit to privileges and roles. Learn how to secure database objects and provision and maintain user accounts. Then, dive into managing authentications, certificates, audits, and traces.
- The comprehensive guide to SAP HANA 2.0 security, from authentication to auditing
- Develop a complete security model using practical examples and case studies
- Identify critical settings necessary to pass an SAP HANA security audit
In this book, you'll learn about:
Understand the SAP HANA privilege types—system, object, package, analytic, and application—and see what it takes to assign them using SQL, SAP HANA cockpit, and SAP HANA Web-Based Development Workbench.
- User Accounts and Roles
Create and manage user accounts with SAP HANA cockpit, LDAP integration, SQL, and more. Then learn to create and assign database and repository roles using these same tools.
Activate rules-based monitors to record SAP HANA security-related activities, enable auditing in your system, and use security tracing to keep an eye on your roles and privileges.
- SAP HANA cockpit
- Catalog objects
- User accounts
- Certificate management
- Lifecycle management
- Security tracing
No posts found