SAP HANA Security Guide

Cover of SAP HANA Security Guide

SAP HANA Security Guide

written by Jonathan Haun
How do you protect and defend your SAP HANA database and application development platform? This comprehensive guide details your options, including privileges, encryption, and more. Learn how to secure database objects, provision and maintain user accounts, and develop and assign roles. Then take an in-depth look at authentication and certificate management before seeing how to enable auditing and security tracing. Protect your SAP HANA system!
  • The comprehensive guide to SAP HANA security, from authentication to auditing
  • Learn to develop a complete security model using practical examples and case studies
  • Identify the critical settings necessary to pass an SAP HANA security audit

In this book, you’ll learn about:

  1. Privileges and Roles

    Master the SAP HANA privilege types—system, object, package, analytic, and application—and learn to create and assign database and repository roles using SAP HANA Studio and SQLScript.

  2. Authentication and Encryption

    Learn to use Kerberos, SAML, and native authentication with step-by-step instructions and secure internal and external communication using encryption and SSL certificates.

  3. Monitoring

    Activate rules-based monitors to record SAP HANA security-related activities, enable auditing in your system, and use security tracing to keep an eye on your roles and privileges.

Highlights include:

  • SAP HANA Studio
  • Privileges
  • Roles
  • Database objects
  • User accounts
  • Authentication
  • Lifecycle management
  • Auditing
  • Security tracing
  • Certificate management
  • Encryption

SAP HANA Security Guide

Very Helpfull

User Rating: Be the first one !

Do you want to become SAP Expert?

Get SAP Expert Articles and free SAP eBooks, Videos, Other Useful Resources
Join Now
Written by SAP Expert TEAM.
close-link