SAP security configuration and deployment the IT administrator's guide to best practices
Throughout the world, high-profile large organizations (aerospace and defense, automotive, banking, chemicals, financial service providers, healthcare, high tech, insurance, oil and gas, pharmaceuticals, retail, telecommunications, and utilities) and governments are using SAP software to process the...
Otros Autores: | , |
---|---|
Formato: | Libro electrónico |
Idioma: | Inglés |
Publicado: |
Burlington, MA :
Syngress Pub
c2009.
|
Edición: | 1st edition |
Materias: | |
Ver en Biblioteca Universitat Ramon Llull: | https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009627713206719 |
Tabla de Contenidos:
- Front Cover; SAP Security Configuration and Deployment; Copyright Page; Technical Editor; Lead Author; Contributing Authors; Contents; Chapter 1: Introduction; Introduction; The SAP NetWeaver Technology Map; Scope; NetWeaver Web Application Server; ABAP Web AS 7.0; J2EE Web AS 7.0; UME Installation Options; Backend: UNIX/Oracle; Governance, Risk, and Compliance (GRC); Summary; Solutions Fast Track; Frequently Asked Questions; Notes; Chapter 2: Concepts and Security Model; Introduction; ABAP; Authenticating Users; Using Secure Network Connection; Using Secure Sockets Layer
- Using User ID and PasswordUsing X.509 Client Certificate; Using SAP Logon Tickets and Single Sign-on; Authorization Concept; User Master Record; Roles and Profiles; Authorization Objects and Field Values; Authorization Checks; Authorization Groups; User Management; Integrating User Management; Using Central User Administration; Using Lightweight Directory Access Protocol Synchronization; User Maintenance; Role Maintenance; Analyzing Authorization; Logging and Monitoring; Using Security Audit Log; Using Audit Info System (AIS); Security Alerts in Computing Center Management System (CCMS)
- Using the User Information SystemSecuring Transport Layer for SAP Web AS ABAP; Using Secure Store and Forward; Using Virus Scan Interface; Enforcing Security Policies; J2EE; J2EE Application Concept; Web Applications; Web Components; Web Container; Remote Objects; Authentication Concept; Authentication Approaches; Authentication Schemes; Authentication Mechanisms; Using User ID and Password; Using X.509 Certificate on SSL; Using Security Session IDs for SSO; Using Logon Tickets for SSO; Using Security Assertion Markup Language (SAML) Assertions for SSO; Using Kerberos Authentication SSO
- Using Header Variables for SSOAuthenticating RMI-P4 Clients; Authorization Concept; User Stores; UME User Store Provider; DBMS User Store Provider; Authorization Checks; Roles or Permissions; J2EE Security Roles; UME Roles (or Permissions); Access Control List; Portal Permissions; Security Zones; UME Actions; Authorization Groups; User Management; Integrating User Management; Using Lightweight Directory Access Protocol Synchronization; Using SAP Web AS ABAP; User Administration; Role Administration; Integrating User and Role Administration; Securing Transport Layer for SAP J2EE Engine
- Enforcing Security PoliciesGRC; SAP GRC Access Control; SAP GRC Process Control; Authorization Concept; Authorization Level; Task; Roles; Objects; SAP GRC Risk Management; Backend: Unix/Oracle; Security for UNIX; Installing Latest Security-Related Patches; Restricting Operating System Access; Protecting Operating System Files; Protecting Operating System Resources; Restricting Physical Server Access; Protecting Network Access; Securing an Oracle Database; Installing the Latest Oracle Security Patches; Protecting Standard Database Users; Protecting Database-Related Files
- Protecting the Oracle Listener