SAP HANA 2.0 Security Guide
eBook - ePub

SAP HANA 2.0 Security Guide

  1. 608 pages
  2. English
  3. ePUB (mobile friendly)
  4. Available on iOS & Android
eBook - ePub

SAP HANA 2.0 Security Guide

Book details
Book preview
Table of contents
Citations

Frequently asked questions

Simply head over to the account section in settings and click on “Cancel Subscription” - it’s as simple as that. After you cancel, your membership will stay active for the remainder of the time you’ve paid for. Learn more here.
At the moment all of our mobile-responsive ePub books are available to download via the app. Most of our PDFs are also available to download and we're working on making the final remaining ones downloadable now. Learn more here.
Both plans give you full access to the library and all of Perlego’s features. The only differences are the price and subscription period: With the annual plan you’ll save around 30% compared to 12 months on the monthly plan.
We are an online textbook subscription service, where you can get access to an entire online library for less than the price of a single book per month. With over 1 million books across 1000+ topics, we’ve got you covered! Learn more here.
Look out for the read-aloud symbol on your next book to see if you can listen to it. The read-aloud tool reads text aloud for you, highlighting the text as it is being read. You can pause it, speed it up and slow it down. Learn more here.
Yes, you can access SAP HANA 2.0 Security Guide by Jonathan Haun in PDF and/or ePUB format, as well as other popular books in Computer Science & Computer Science General. We have over one million books available in our catalogue for you to explore.

Information

Publisher
SAP PRESS
Year
2020
ISBN
9781493218974
Edition
2

1 Managing Security with the SAP HANA Cockpit

In this chapter, we’ll introduce you to the SAP HANA cockpit and many of the workflows necessary for managing security settings and security models.
Since its inception, most of the SAP HANA security model has been developed and maintained using SAP HANA Studio, a client tool installed on an SAP HANA developer or administrator workstation. However, in November 2016, SAP announced and released SAP HANA 2.0, including a new administration tool called the SAP HANA cockpit.
The SAP HANA cockpit provides monitoring, configuration, performance optimization, security, platform lifecycle management, and other administration capabilities. Unlike SAP HANA Studio, the SAP HANA cockpit does not provide application or content development tools. These tools have been migrated to SAP Web IDE for SAP HANA, another independent, web-based development tool in the SAP HANA 2.0 portfolio.
The SAP HANA cockpit is a standalone, web-based HTML5 application server, not a desktop-based client tool. It operates in SAP HANA extended application services, advanced model (SAP HANA XSA) and also requires an SAP HANA 2.0, express edition, database or an SAP HANA 2.0 tenant database to operate. The architecture of the SAP HANA cockpit is designed to centralize and simplify the management and administration of SAP HANA throughout an IT landscape. Given its importance in the realm of SAP HANA security, the goal of this chapter is to introduce you to the various security workflows and security options that you can manage in the SAP HANA cockpit. However, this chapter is not intended as a comprehensive guide to using the SAP HANA cockpit.
Other Web-Based Administration Tools
As of SAP HANA 2.0 SPS 04, some aspect of the security model can still be managed with the SAP HANA Web-Based Development Workbench. This tool is hosted in the legacy SAP HANA extended application services, classic model (SAP HANA XS) engine (XS engine).
References to the SAP HANA cockpit will be prominent throughout this book, so you’ll require a basic understanding of it and its security-related interfaces. In this chapter, we’ll provide an overview of the SAP HANA cockpit, introducing its architecture, basic navigation steps, and specific security management interfaces. We’ll also introduce the SAP HANA database explorer and the SQL console, in which security-related SQL commands are executed, and we’ll outline the key user interfaces you’ll use to administer security-related items, including the graphical interfaces for user and role administration. We’ll also discuss other interfaces used to manage data encryption, authentication, and database security.

1.1 What Is the SAP HANA Cockpit?

In this section, we’ll provide an overview of the architecture of the SAP HANA cockpit, show you how to access it the first time, review the SAP HANA cockpit manager, and walk you through the steps required for registering SAP HANA databases within the SAP HANA cockpit.

1.1.1 SAP HANA Cockpit Architecture

Architecturally, the SAP HANA cockpit is an SAP HANA XSA multi-target application (MTA) that requires an SAP HANA database to operate. SAP provides several deployment options, as shown in Figure 1.1.
As shown in Figure 1.1, you can deploy the SAP HANA cockpit on a supported standalone server using SAP HANA, express edition. The SAP HANA cockpit can also be installed alongside your existing SAP HANA instance or within an existing instance by using separate tenant databases sharing the same instance. In all cases, the software must be deployed to a supported Linux operating system (OS). Be sure you size your hardware properly based on the deployment option you choose.
Both a standalone installation and an installation as a separate instance require the use of SAP HANA, express edition. Fortunately, the installation media for the SAP HANA cockpit includes every required component and deploys the enti...

Table of contents

  1. Dear Reader
  2. Notes on Usage
  3. Table of Contents
  4.   Preface
  5.   Introduction
  6. 1   Managing Security with the SAP HANA Cockpit
  7. 2   Introduction to SAP HANA Privileges
  8. 3   Catalog Objects
  9. 4   User Accounts
  10. 5   Database Roles
  11. 6   Repository Roles
  12. 7   System Privileges
  13. 8   Object Privileges
  14. 9   Package Privileges
  15. 10   Analytic Privileges
  16. 11   Application Privileges
  17. 12   Authentication
  18. 13   Certificate Management and Encryption
  19. 14   Security Lifecycle Management
  20. 15   Auditing
  21. 16   Security Tracing and Troubleshooting
  22. 17   Security Recommendations
  23. 18   SAP HANA XSA Security
  24. The Author
  25. Index
  26. Service Pages
  27. Legal Notes