SAP NetWeaver Process Integration Security Guide
This security guide explains the security features included in SAP NetWeaver usage type Process Integration (PI) and recommends how to apply these features to protect data and to maximize the confidentiality of data that passes through a PI landscape.
Search and Classification (TREX) Security Guide
This guide describes the topics relevant to security that affect SAP NetWeaver Search and Classification (TREX). TREX finds information in both structured and unstructured data.
SAP Content Server Security Guide
The SAP Content Server and the SAP Cache Server were designed for managing large quantities of documents efficiently in diverse locations. These documents usually contain confidential information of considerable value to the company. To protect the documents sufficiently enough, the various security measures are explained in this guide.
RFC/ICF Security Guide
This guide provides you with fundamental information and advice for the secure use of RFC and ICF when communicating between SAP systems and other SAP systems or external systems.
Security Guide ALE (ALE Applications)
Application Link Enabling (ALE) business processes are integrated processes across distributed systems. ALE uses IDocs (intermediate documents) or BAPIs (Business Application Programming Interface) as data transfer format between the systems.
Security Guide for Connectivity with the J2EE Engine
The J2EE Connector Architecture (JCA) enables connectivity to back-end systems such as Enterprise Information Systems (EIS), using resource adapters. The adapters are modules that are deployed on a J2EE compatible application server and provide unified access to the resource system for any application components that are also installed on the server.
Web Services Security
Security is one of the main prerequisites when using Web services in an enterprise. Security measures generally concern both the protection of individual servers through authentication, authorization, and encryption as well as the sealing off of an internal infrastructure using firewalls.
Security Guide Communication Interfaces
This section provides information on the security aspects of the Structure linkIntegrated Communication Interface (ICI), specifically the relevant security settings required for the Business Communication Broker (BCB) which is part of the ICI.
SAP System Security Under UNIX/LINUX
In the following topics, we cover the aspects pertaining to security under the UNIX or LINUX operating systems. When appropriate, we include our recommendations and any measures that you need to take.
SAP System Security Under Windows
Windows manages administration tasks and provides access protection over its domain concept. A domain is a group of several computers that share a common user and security database. Within each domain, you define and administer your users and groups.
Security Guide for SAP Mobile Infrastructure - Free eBook Security Guide for SAP Mobile Infrastructure - Download ebook Security Guide for SAP Mobile Infrastructure free
|