Skip to main content

ForeThought - DeMystifying SAP Security

ForeThought - DeMystifying SAP Security

I attended SAP Tech-Ed in Bangalore... I am now Officially SAP Netweaver Security Certified. Let me share my understanding about SAP Security.

In my opinion, Classical SAP Security model with Users and Roles is simple yet a well thought out mechanism for giving access to Data and Functionality inside SAP.

The Areas that need clearer understanding/implementation knowhow are Security model for Portals and Business Intelligence.

One of the Areas which is left to abmiguity is security in the Presentation, Session and Transport Layers. Evidently SAP is moving from SNC to HTTPS protocol for Server to server Communications.

With the new emphasis on WebDynpros(Portals) and Exchange Infrastructure(XI) the Diag and Rfc Protocols are giving way to HTTP. This transformation is not very evident as most SAP implementations are centered around SAP GUI. The Core Single-Sign On Central User Admin(CUA) is still based old model.

A Promise from from SAP to deliver the functionality using Standard MS-Office platform is still fairly limited from a security perpective.


If you are typical IT guy...Dont be surprised to see your fellow SAP Basis person speak your same language of LDAP authentication, Kerberos, SAML and SSL Accelaration.

Infact It was heart warming to see the emphasis on Standards based security implementation approach for designing Internet facing SAP Solutions. This includes emphasis on Application gateways, Load balancers, Intrusion Detection, Identity Management and Change Management.

Future of SAP activites
================
User Provisioning - Manual(within SAP), Automated(SPML based) or Managed through LDAP
Role Assignment - Manual(within SAP -PFCG), Automated(SPML based) or Managed through LDAP
Role Creation - Manual Inside SAP - PFCG
Transport Security - Standards based/handled in Appliances (e.g App. Gateways/ Load Balancers etc)
Operating System/Database Security -- Not in Scope

At the pace at which SAP is delivering the new products and functionility this new approach allow them keep a close tab security.

Comments

Unknown said…
good guidance and the following of the content is so helpful and useful. SAP SECURITY TRAINING
Unknown said…
Well thanks for such wonderful list keep updates see sap community network for consulting management.
Unknown said…
Well, Thanks for your article.
Its impressive to know something about your note on SAP HANA Course. Please do share your articles like this your articles for our awareness. Mostly we do also provide Online Training on SAP HANA Course. for more info Contact-Us at@ Tectist.com.
Unknown said…
It was really a nice article and I was really impressed by reading this article We are also giving all software Course Online Training. The Sap SECURITY Online Training is one of the leading Online Training institute in the world.
Unknown said…
This information which you provided is very much useful for us.It was very interesting and useful for sap online training.We also providing sap online training institute in USA.

Popular posts from this blog

ForeThought -- Global directory service for the Digital world

ForeThought Real world is full of people. We have phone books,yellow pages, maps and postal addresses to get to them. Real world is governed by laws, rules and norms. Digital world is full of devices and devices only(severs, desktops, appliances, gadgets etc..) In the digital world, We have DNS, IP Addresses/SMTP mail address, Routers/gateways. All of these methods are still rudimentery to lookup and locate attributes, features and functions of devices. Most devices serve a useful purpose. some of them are misused to inflict pain and damage in the digital world. Clear knowledge attributes, features and functions of devices can hel in reducing the risk and help us in responding to misuse of these devices. An idea of a Global Directory Service -- for locating Devices worldwide....These devices are attributed to People, Resources and Services.... This type of service can help in Asset tracking, Monitoring, Communications, Incident response, forensics and Da...

Information Infrastructure for Human Advancement - Vedic thought

Human Advancement is a far-cry when we are living in a world where human existence is threatened by man-made vulnerabilities. Human existence is threatened by Global warming - Natural disasters Health Crisis - Drinking water, Biodiversity/Genetically Modified Food, Virus Outbreaks Materials Crisis - Availability of Petroleum/Rare-earth for EV's (Lithium/Dyspersium) Security Crisis - Cyber Security/Data Breaches Global Political/Economic environment – Sanctions/Tariffs Purpose and Motivation Purpose of this conversation is to discuss the application of emerging technologies in information infrastructure for improving resilience of the human race and aspire for human advancement. This requires understanding key concepts of AI/Deep learning/Machine Learning, Nueromorphic computing and Pervasive computing in the context of  human interactions. There is need for a Multi-disciplinary approach involving Non-STEM and STEM(Science, Technology, Engineering and Math)...

Living a dream...five years of moving from services to lasting products.

RCV innovations has transformed from a training and consulting outfit to product based services organization.  The last five years had a see-saw effect on our existence as a viable business. We cannot forget the contributions of our mentors, early patrons and partners- Niranjan, Brad, Rakesh,Dorothy, Avik, Supriya, Sridhar, Bhaskar, Jaipal, Kishan, Joseph, Goutam, Mishra and many others. I am deeply moved by the faith some of our new customers have placed on us by adopting VAMANiT appliances for their business needs. Our team is grateful for the opportunity to serve you to the best of our ability. I am humbled by the commitment and excitement the team has shown in executing our new Nested Data center strategy. The pace at which we have trained ourselves in cutting-edge VMware vSAN and NSX technologies is noteworthy.  We are applying our VMware knowledge to Strategic and Mission critical applications by integrating energy efficient purpose built VAMANiT Nested Data ...