Security and Authorizations for SAP Business Technology Platform
Martin Koch, Siegfried Zeilinger
- 355 pagine
- English
- ePUB (disponibile sull'app)
- Disponibile su iOS e Android
Security and Authorizations for SAP Business Technology Platform
Martin Koch, Siegfried Zeilinger
Informazioni sul libro
Learn what it takes to protect SAP Business Technology Platform! Walk through the cloud security mechanisms of SAP BTP (formerly SAP Cloud Platform). See how to set up users and permissions for your unique circumstances and configure secure connection to cloud and on-premise systems. Work with SAP BTP's administration tools, including the command line interface and APIs. With information on safeguarding key cloud services, this guide will leave you confident in your cloud system's security! In this book, you'll learn about: a. Authorizations and Authentication
Manage authorizations using roles and user groups and set up the necessary identity providers. Walk through practical examples of authentication using two-factor authentication and Microsoft Azure Active Directory.
b. Secure Connections
From configuration destination to retrieving audit logs, see how to set up the cloud connector and secure your hybrid system landscapes and APIs.
c. Neo and Cloud Foundry
Whether your service instances are running in the Neo or Cloud Foundry environment, you'll learn all the important security configurations. Highlights include: 1) Accounts and spaces
2) Secure communication
3) Identity provider
4) SAP Cloud Identity Services
5) SAP BTP, Neo environment
6) SAP BTP, Cloud Foundry environment
7) Cloud connector
8) Users and roles
9) APIs
10) Command line
Domande frequenti
Informazioni
Indice dei contenuti
- Dear Reader
- Notes on Usage
- Table of Contents
- Preface
- 1 Introduction to SAP Business Technology Platform
- 2 SAP Business Technology Platform Security at a Glance
- 3 Configuring Security and Authorizations in the Neo Environment
- 4 Configuring Security and Authorizations in the Cloud Foundry Environment
- 5 Secure Cloud Connector Configuration
- 6 Administration Tools
- 7 Securing Key Cloud Services
- A The Authors
- Index
- Service Pages
- Legal Notes