SlideShare una empresa de Scribd logo
1 de 9
Descargar para leer sin conexión
SAP HANA Security Guide - Trigger-Based Replication
      SAP In-Memory Appliance (SAP HANA) 1.0



   Target Audience
    Consultants
    Administrators
    SAP Hardware Partner
    Others




Public
Document version 1.0 – 06/27/2011
Copyright
© Copyright 2011 SAP AG. All rights reserved.

No part of this publication may be reproduced or transmitted in any form or for any purpose
without the express permission of SAP AG. The information contained herein may be
changed without prior notice.
Some software products marketed by SAP AG and its distributors contain proprietary
software components of other software vendors.

Microsoft, Windows, Excel, Outlook, and PowerPoint are registered trademarks of Microsoft
Corporation.

IBM, DB2, DB2 Universal Database, System i, System i5, System p, System p5, System x,
System z, System z10, System z9, z10, z9, iSeries, pSeries, xSeries, zSeries, eServer, z/VM,
z/OS, i5/OS, S/390, OS/390, OS/400, AS/400, S/390 Parallel Enterprise Server, PowerVM,
Power Architecture, POWER6+, POWER6, POWER5+, POWER5, POWER, OpenPower,
PowerPC, BatchPipes, BladeCenter, System Storage, GPFS, HACMP, RETAIN, DB2
Connect, RACF, Redbooks, OS/2, Parallel Sysplex, MVS/ESA, AIX, Intelligent Miner,
WebSphere, Netfinity, Tivoli and Informix are trademarks or registered trademarks of IBM
Corporation.

Linux is the registered trademark of Linus Torvalds in the U.S. and other countries.

Adobe, the Adobe logo, Acrobat, PostScript, and Reader are either trademarks or registered
trademarks of Adobe Systems Incorporated in the United States and/or other countries.

Oracle is a registered trademark of Oracle Corporation.

UNIX, X/Open, OSF/1, and Motif are registered trademarks of the Open Group.
Citrix, ICA, Program Neighborhood, MetaFrame, WinFrame, VideoFrame, and MultiWin are
trademarks or registered trademarks of Citrix Systems, Inc.

HTML, XML, XHTML and W3C are trademarks or registered trademarks of W3C®, World
Wide Web Consortium, Massachusetts Institute of Technology.

Java is a registered trademark of Sun Microsystems, Inc.

JavaScript is a registered trademark of Sun Microsystems, Inc., used under license for
technology invented and implemented by Netscape.

SAP, R/3, SAP NetWeaver, Duet, PartnerEdge, ByDesign, SAP Business ByDesign, and
other SAP products and services mentioned herein as well as their respective logos are
trademarks or registered trademarks of SAP AG in Germany and other countries.

Business Objects and the Business Objects logo, BusinessObjects, Crystal Reports, Crystal
Decisions, Web Intelligence, Xcelsius, and other Business Objects products and services
mentioned herein as well as their respective logos are trademarks or registered trademarks of
Business Objects S.A. in the United States and in other countries. Business Objects is an
SAP company.

All other product and service names mentioned are the trademarks of their respective
companies. Data contained in this document serves informational purposes only. National
product specifications may vary.

These materials are subject to change without notice. These materials are provided by SAP
AG and its affiliated companies ("SAP Group") for informational purposes only, without
representation or warranty of any kind, and SAP Group shall not be liable for errors or
omissions with respect to the materials. The only warranties for SAP Group products and
SAP HANA Security Guide – Trigger-Based Replication                                June 2011


services are those that are set forth in the express warranty statements accompanying such
products and services, if any. Nothing herein should be construed as constituting an
additional warranty.


Icons in Body Text

   Icon                      Meaning
                             Caution
                             Example
                             Note
                             Recommendation
                             Syntax


Additional icons are used in SAP Library documentation to help you identify different types of
information at a glance. For more information, see Help on Help   General Information
Classes and Information Classes for Business Information Warehouse on the first page of any
version of SAP Library.



Typographic Conventions

  Type Style                Description
  Example text              Words or characters quoted from the screen. These include field
                            names, screen titles, pushbuttons labels, menu names, menu paths,
                            and menu options.
                            Cross-references to other documentation.
  Example text              Emphasized words or phrases in body text, graphic titles, and table
                            titles.
  EXAMPLE TEXT              Technical names of system objects. These include report names,
                            program names, transaction codes, table names, and key concepts of a
                            programming language when they are surrounded by body text, for
                            example, SELECT and INCLUDE.
  Example text              Output on the screen. This includes file and directory names and their
                            paths, messages, names of variables and parameters, source text, and
                            names of installation, upgrade and database tools.
  Example text              Exact user entry. These are words or characters that you enter in the
                            system exactly as they appear in the documentation.
  <Example text>            Variable user entry. Angle brackets indicate that you replace these
                            words and characters with appropriate entries to make entries in the
                            system.
  EXAMPLE TEXT              Keys on the keyboard, for example, F2 or ENTER.




SAP In-Memory Appliance (SAP HANA)                                                                  2
SAP HANA Security Guide – Trigger-Based Replication                                                                    June 2011




  User Administration and Authentication .............................................................................. 6
  Authorizations .................................................................................................................... 7
  Network and Communication Security................................................................................ 8
     Network Security ............................................................................................................ 8
     Communication Destinations .......................................................................................... 8
  Configuration ..................................................................................................................... 8
     Configuration .................................................................................................................. 8




SAP In-Memory Appliance (SAP HANA)                                                                                                        3
SAP HANA Security Guide – Trigger-Based Replication                               June 2011



      Technical System Landscape
The Trigger-Based Replication system transfers database activity from source system
databases to replicate databases. The source system is typically an SAP ERP or CRM
system, and the replicate database is the SAP HANA In-Memory Database.
The figures below show the two possible technical system landscapes for the Trigger-Based
Data Replication Using SAP LT (Landscape Transformation) Replicator.

Option 1 - Separate SLT system




With this option the SLT component is installed in its own SAP system consequently there are
two network communication channels in use from this system. Firstly there is an RFC
connection to the source system and a second connection to the SAP HANA system.


Option 2 - SLT installation in Source system




With this option the SLT system component is installed in the source system which means
that only one external network communication channel is required to the SAP HANA system.


An overview of the system landscape components is provided below.




SAP In-Memory Appliance (SAP HANA)                                                             4
SAP HANA Security Guide – Trigger-Based Replication                                 June 2011



Source system
The source system tracks database changes via database triggers and copies relevant
changes into the Logging Tables.


SLT component
The SLT system polls the log tables in the source system via an RFC connection on a
scheduled basis. If there is replication data which should be transferred to the SAP HANA
system this is transferred to via the DB connection.

SAP HANA system
The SAP HANA system contains the SAP In-Memory Database; this is used to store the
replicated data. The connections between the SLT component and the SAP HANA system
are provided by the DB connection.


Topic          Guide/Tool     Quick Link to the SAP Service Marketplace
Trigger-       Installation   SAP HANA 1.0 Installation Guide – Trigger Based Replication
based          Guide
Replication



SAP HANA Guides
For more information about SAP HANA landscape, security, installation and administration,
see the resources listed in the table below.

Topic                  Guide/Tool              Quick Link
SAP HANA               SAP HANA Knowledge      https://service.sap.com/hana
Landscape,             Center on SAP Service
Deployment &           Marketplace                SAP HANA 1.0 Master Guide
Installation                                      SAP HANA 1.0 Installation Guide
SAP HANA               SAP HANA Knowledge      http://help.sap.com/hana
Administration &       Center on SAP Help
Security               Portal                     SAP HANA 1.0 Technical Operations Manual
                                                  SAP HANA 1.0 Security Guide




SAP In-Memory Appliance (SAP HANA)                                                              5
SAP HANA Security Guide – Trigger-Based Replication                               June 2011




      User Administration and Authentication
The SAP LT Replicator uses the user management and authentication mechanisms provided
with the SAP NetWeaver platform, in particular the SAP NetWeaver Application Server.
Therefore, the security recommendations and guidelines for user administration and
authentication as described in the SAP NetWeaver Security Guide [SAP Library]
Application Server ABAP Security Guide also apply to the SAP LT Replicator.
This section provides information about user management, administration and authentication
that specifically applies to SAP LT replicator in addition to the standard procedures.
For accessing the source systems by remote function call (RFC), requires a communication
user. As communication user, the access to the source system is exclusively by RFC without
the ability to execute steps in dialog mode directly in a system. For more information about
this user type, see the section User Types in the SAP Web AS ABAP Security Guide.
The following security measures apply with regard to user management for SAP LT
Replicator:
Irrespective of all security measures, the users who have access to the SLT system will have
(indirect) access to the production data in the source system and may be able to see
information stored there. Consequently, we recommend that you limit the number of users in
the SLT system to a minimum to prevent unauthorized access to production data.




SAP In-Memory Appliance (SAP HANA)                                                             6
SAP HANA Security Guide – Trigger-Based Replication                                    June 2011




      Authorizations
The SAP LT Replicator uses the authorization concept provided by the SAP NetWeaver AS
ABAP. Therefore, the recommendations and guidelines for authorizations as described in the
SAP NetWeaver AS Security Guide ABAP and SAP NetWeaver AS Security Guide Java also
apply to the SAP LT Replicator.
The SAP NetWeaver authorization concept is based on assigning authorizations to users
based on roles. For role maintenance, use the profile generator (transaction PFCG) on the AS
ABAP and the User Management Engine’s user administration console on the AS Java.



             For more information about how to create roles, see Role Administration (SAP
             Library)
Specific authorizations apply for each system. Authorizations for source system(s) and SLT
system are available in user profiles to control the actions that a user is authorized to perform.
Amongst many other existing SAP NetWeaver based authorization objects, the following
authorization objects are specifically important for the use of SAP LT replicator:
        S_DMIS
        Description: Authority object for SAP SLO Data migration
        Authorization fields
        Field name                                    Heading
        MBT_PR_ARE                                    MBT PCL: Scenario
        MBT_PR_LEV                                    MBT PCL: Processing Role Level
        ACTVT                                         Activity


        S_DMC_S_R
        Description: MWB: Reading / writing authorization in sender / receiver
        Authorization fields
        Field name                                    Heading
        ACTVT                                         Activity



User Roles
With SAP LT replicator, the composite role SAP_IUUC_USER is available that includes the
following roles:
        SAP_IUUC_REMOTE
        SAP_DMIS_USER
        SAP_SLOP_USER




SAP In-Memory Appliance (SAP HANA)                                                                   7
SAP HANA Security Guide – Trigger-Based Replication                                   June 2011




      Network Security
Access to source systems using SAP LT replicator takes place exclusively through RFC
connections. For more information about security issues in connection with RFC, see the
relevant sections in the SAP Library on SAP Help Portal.



       Communication Destinations
SAP LT replicator does not come with fixed destinations or user names. The following
destinations need to be created:

Source System(s)
Users in RFC destinations need to be of type Communication / CPIC – and require
authorizations specified by one of the following composite roles:
            o   SAP_LT_RFC_USER
            o   SAP_LT_RFC_USER_700
            o   SAP_IUUC_USER or SAP_IUUC_REMOTE



     Configuration
Configuration settings as defined in LT based replication schemas are be stored in SAP LT
replicator control tables on the SLT system.
In source system(s), there is no specific initial configuration data created, however with the
initialization of the data replication, DB triggers and logging tables are created.
For logging tables, it is possible to create a separate table space within the database for
monitoring the size of logging tables.
No specific configuration settings are required on the SAP HANA system.




SAP In-Memory Appliance (SAP HANA)                                                                8

Más contenido relacionado

La actualidad más candente

Practitioner perspective-erp-on-hana-and-fi-analytics 2015
Practitioner perspective-erp-on-hana-and-fi-analytics 2015Practitioner perspective-erp-on-hana-and-fi-analytics 2015
Practitioner perspective-erp-on-hana-and-fi-analytics 2015Benedict Yong (杨腾翔)
 
SAP HANA SPS08 Modeling
SAP HANA SPS08 ModelingSAP HANA SPS08 Modeling
SAP HANA SPS08 ModelingSAP Technology
 
What's New in SAP HANA SPS 11 Operations
What's New in SAP HANA SPS 11 OperationsWhat's New in SAP HANA SPS 11 Operations
What's New in SAP HANA SPS 11 OperationsSAP Technology
 
HANA SPS07 Modeling Enhancements
HANA SPS07 Modeling EnhancementsHANA SPS07 Modeling Enhancements
HANA SPS07 Modeling EnhancementsSAP Technology
 
SAP HANA SPS09 - SAP HANA Workload Management
SAP HANA SPS09 - SAP HANA Workload ManagementSAP HANA SPS09 - SAP HANA Workload Management
SAP HANA SPS09 - SAP HANA Workload ManagementSAP Technology
 
SAP HANA SPS09- Administration Monitoring
SAP HANA SPS09- Administration MonitoringSAP HANA SPS09- Administration Monitoring
SAP HANA SPS09- Administration MonitoringSAP Technology
 
What's New in SAP HANA View Modeling
What's New in SAP HANA View ModelingWhat's New in SAP HANA View Modeling
What's New in SAP HANA View ModelingSAP Technology
 
Sap hana client_installation_update_guide_en
Sap hana client_installation_update_guide_enSap hana client_installation_update_guide_en
Sap hana client_installation_update_guide_enShobha Nand Kumar
 
Ac409c27 5a7c-0010-82c7-eda71af511fa
Ac409c27 5a7c-0010-82c7-eda71af511faAc409c27 5a7c-0010-82c7-eda71af511fa
Ac409c27 5a7c-0010-82c7-eda71af511faNagendra Babu
 
SAP HANA SPS10- Series Data/ TimeSeries
SAP HANA SPS10- Series Data/ TimeSeriesSAP HANA SPS10- Series Data/ TimeSeries
SAP HANA SPS10- Series Data/ TimeSeriesSAP Technology
 
HANA SPS07 Fuzzy Search
HANA SPS07 Fuzzy SearchHANA SPS07 Fuzzy Search
HANA SPS07 Fuzzy SearchSAP Technology
 
HANA SPS07 Fulltext Search
HANA SPS07 Fulltext SearchHANA SPS07 Fulltext Search
HANA SPS07 Fulltext SearchSAP Technology
 
What's new in SAP HANA SPS 11 SQL/SQLScript
What's new in SAP HANA SPS 11 SQL/SQLScriptWhat's new in SAP HANA SPS 11 SQL/SQLScript
What's new in SAP HANA SPS 11 SQL/SQLScriptSAP Technology
 

La actualidad más candente (20)

Practitioner perspective-erp-on-hana-and-fi-analytics 2015
Practitioner perspective-erp-on-hana-and-fi-analytics 2015Practitioner perspective-erp-on-hana-and-fi-analytics 2015
Practitioner perspective-erp-on-hana-and-fi-analytics 2015
 
Easy dms basic process guide
Easy dms basic process guideEasy dms basic process guide
Easy dms basic process guide
 
SAP Integration With Excel - Advanced Guide
SAP Integration With Excel - Advanced GuideSAP Integration With Excel - Advanced Guide
SAP Integration With Excel - Advanced Guide
 
ERP Made Simple (preview)
ERP Made Simple (preview)ERP Made Simple (preview)
ERP Made Simple (preview)
 
SAP HANA SPS08 Modeling
SAP HANA SPS08 ModelingSAP HANA SPS08 Modeling
SAP HANA SPS08 Modeling
 
What's New in SAP HANA SPS 11 Operations
What's New in SAP HANA SPS 11 OperationsWhat's New in SAP HANA SPS 11 Operations
What's New in SAP HANA SPS 11 Operations
 
Ecc ad ldap
Ecc ad ldapEcc ad ldap
Ecc ad ldap
 
HANA SPS07 Modeling Enhancements
HANA SPS07 Modeling EnhancementsHANA SPS07 Modeling Enhancements
HANA SPS07 Modeling Enhancements
 
TZH300_EN_COL96
TZH300_EN_COL96TZH300_EN_COL96
TZH300_EN_COL96
 
SAP HANA SPS09 - SAP HANA Workload Management
SAP HANA SPS09 - SAP HANA Workload ManagementSAP HANA SPS09 - SAP HANA Workload Management
SAP HANA SPS09 - SAP HANA Workload Management
 
SAP HANA SPS09- Administration Monitoring
SAP HANA SPS09- Administration MonitoringSAP HANA SPS09- Administration Monitoring
SAP HANA SPS09- Administration Monitoring
 
What's New in SAP HANA View Modeling
What's New in SAP HANA View ModelingWhat's New in SAP HANA View Modeling
What's New in SAP HANA View Modeling
 
Sap hana client_installation_update_guide_en
Sap hana client_installation_update_guide_enSap hana client_installation_update_guide_en
Sap hana client_installation_update_guide_en
 
Ac409c27 5a7c-0010-82c7-eda71af511fa
Ac409c27 5a7c-0010-82c7-eda71af511faAc409c27 5a7c-0010-82c7-eda71af511fa
Ac409c27 5a7c-0010-82c7-eda71af511fa
 
SAP HANA SPS10- Series Data/ TimeSeries
SAP HANA SPS10- Series Data/ TimeSeriesSAP HANA SPS10- Series Data/ TimeSeries
SAP HANA SPS10- Series Data/ TimeSeries
 
Officexml
OfficexmlOfficexml
Officexml
 
Erp book
Erp bookErp book
Erp book
 
HANA SPS07 Fuzzy Search
HANA SPS07 Fuzzy SearchHANA SPS07 Fuzzy Search
HANA SPS07 Fuzzy Search
 
HANA SPS07 Fulltext Search
HANA SPS07 Fulltext SearchHANA SPS07 Fulltext Search
HANA SPS07 Fulltext Search
 
What's new in SAP HANA SPS 11 SQL/SQLScript
What's new in SAP HANA SPS 11 SQL/SQLScriptWhat's new in SAP HANA SPS 11 SQL/SQLScript
What's new in SAP HANA SPS 11 SQL/SQLScript
 

Destacado

Persuasion &amp; Convincing Skills
Persuasion &amp; Convincing SkillsPersuasion &amp; Convincing Skills
Persuasion &amp; Convincing SkillsAhsan Bham
 
LITE 2016 – Making the Most of Communication Triggers [Deepika Ranjit & Lokma...
LITE 2016 – Making the Most of Communication Triggers [Deepika Ranjit & Lokma...LITE 2016 – Making the Most of Communication Triggers [Deepika Ranjit & Lokma...
LITE 2016 – Making the Most of Communication Triggers [Deepika Ranjit & Lokma...getadministrate
 
Influence, tactics, power and politics
Influence, tactics, power and politicsInfluence, tactics, power and politics
Influence, tactics, power and politicsTamim123
 
Influencing skills
Influencing skillsInfluencing skills
Influencing skillsAlan Barker
 
Introduction to Agile Project Planning and Project Management
Introduction to Agile Project Planning and Project ManagementIntroduction to Agile Project Planning and Project Management
Introduction to Agile Project Planning and Project ManagementMike Cottmeyer
 

Destacado (6)

Persuasion &amp; Convincing Skills
Persuasion &amp; Convincing SkillsPersuasion &amp; Convincing Skills
Persuasion &amp; Convincing Skills
 
Body Language & Self-confidence
Body Language & Self-confidenceBody Language & Self-confidence
Body Language & Self-confidence
 
LITE 2016 – Making the Most of Communication Triggers [Deepika Ranjit & Lokma...
LITE 2016 – Making the Most of Communication Triggers [Deepika Ranjit & Lokma...LITE 2016 – Making the Most of Communication Triggers [Deepika Ranjit & Lokma...
LITE 2016 – Making the Most of Communication Triggers [Deepika Ranjit & Lokma...
 
Influence, tactics, power and politics
Influence, tactics, power and politicsInfluence, tactics, power and politics
Influence, tactics, power and politics
 
Influencing skills
Influencing skillsInfluencing skills
Influencing skills
 
Introduction to Agile Project Planning and Project Management
Introduction to Agile Project Planning and Project ManagementIntroduction to Agile Project Planning and Project Management
Introduction to Agile Project Planning and Project Management
 

Similar a Hana1 slt repli_sec_en

Sap screen personas performance optimization guide v0.96
Sap screen personas performance optimization guide v0.96Sap screen personas performance optimization guide v0.96
Sap screen personas performance optimization guide v0.96Peter Spielvogel
 
142 bb config_guide_en_co
142 bb config_guide_en_co142 bb config_guide_en_co
142 bb config_guide_en_coSachin Kamat
 
Master guide cdmc
Master guide cdmcMaster guide cdmc
Master guide cdmcrvegesna1
 
SAP_SLT_Guide_21122015.pdf
SAP_SLT_Guide_21122015.pdfSAP_SLT_Guide_21122015.pdf
SAP_SLT_Guide_21122015.pdfssuser17886a
 
How to build an agentry based mobile app from scratch connecting to an sap ba...
How to build an agentry based mobile app from scratch connecting to an sap ba...How to build an agentry based mobile app from scratch connecting to an sap ba...
How to build an agentry based mobile app from scratch connecting to an sap ba...Jaime Marchant Benavides
 
End user experience monitoring
End user experience monitoringEnd user experience monitoring
End user experience monitoringSanjay Sahita
 
Testing SAP HANA applications with SAP LoadRunner by HP
Testing SAP HANA applications with SAP LoadRunner by HPTesting SAP HANA applications with SAP LoadRunner by HP
Testing SAP HANA applications with SAP LoadRunner by HPSAP Solution Extensions
 
How to use abap cds for data provisioning in bw
How to use abap cds for data provisioning in bwHow to use abap cds for data provisioning in bw
How to use abap cds for data provisioning in bwLuc Vanrobays
 
Funds management configuration sap ag
Funds management configuration sap agFunds management configuration sap ag
Funds management configuration sap agLluckyy
 
How to build an agentry based mobile app from scratch connecting to an sap ba...
How to build an agentry based mobile app from scratch connecting to an sap ba...How to build an agentry based mobile app from scratch connecting to an sap ba...
How to build an agentry based mobile app from scratch connecting to an sap ba...Ganesh Kumar
 
How to call an enterprise service from jsf
How to call an enterprise service from jsfHow to call an enterprise service from jsf
How to call an enterprise service from jsfSoufiane Boujamaoui
 
F05fba45 0b5f-2c10-a697-f36efa24e899
F05fba45 0b5f-2c10-a697-f36efa24e899F05fba45 0b5f-2c10-a697-f36efa24e899
F05fba45 0b5f-2c10-a697-f36efa24e899Deepa Bisht
 
Lam config-131007234330-phpapp01
Lam config-131007234330-phpapp01Lam config-131007234330-phpapp01
Lam config-131007234330-phpapp01MaheshMamidi3
 
Ppf in sap_ewm_1
Ppf in sap_ewm_1Ppf in sap_ewm_1
Ppf in sap_ewm_1Yuan Lin
 

Similar a Hana1 slt repli_sec_en (20)

Sap screen personas performance optimization guide v0.96
Sap screen personas performance optimization guide v0.96Sap screen personas performance optimization guide v0.96
Sap screen personas performance optimization guide v0.96
 
142 bb config_guide_en_co
142 bb config_guide_en_co142 bb config_guide_en_co
142 bb config_guide_en_co
 
sap pp
sap ppsap pp
sap pp
 
Master guide cdmc
Master guide cdmcMaster guide cdmc
Master guide cdmc
 
Master guide cdmc
Master guide cdmcMaster guide cdmc
Master guide cdmc
 
SAP_SLT_Guide_21122015.pdf
SAP_SLT_Guide_21122015.pdfSAP_SLT_Guide_21122015.pdf
SAP_SLT_Guide_21122015.pdf
 
How to build an agentry based mobile app from scratch connecting to an sap ba...
How to build an agentry based mobile app from scratch connecting to an sap ba...How to build an agentry based mobile app from scratch connecting to an sap ba...
How to build an agentry based mobile app from scratch connecting to an sap ba...
 
End user experience monitoring
End user experience monitoringEnd user experience monitoring
End user experience monitoring
 
Testing SAP HANA applications with SAP LoadRunner by HP
Testing SAP HANA applications with SAP LoadRunner by HPTesting SAP HANA applications with SAP LoadRunner by HP
Testing SAP HANA applications with SAP LoadRunner by HP
 
How to use abap cds for data provisioning in bw
How to use abap cds for data provisioning in bwHow to use abap cds for data provisioning in bw
How to use abap cds for data provisioning in bw
 
Funds management configuration sap ag
Funds management configuration sap agFunds management configuration sap ag
Funds management configuration sap ag
 
How to build an agentry based mobile app from scratch connecting to an sap ba...
How to build an agentry based mobile app from scratch connecting to an sap ba...How to build an agentry based mobile app from scratch connecting to an sap ba...
How to build an agentry based mobile app from scratch connecting to an sap ba...
 
How to call an enterprise service from jsf
How to call an enterprise service from jsfHow to call an enterprise service from jsf
How to call an enterprise service from jsf
 
Badi
BadiBadi
Badi
 
F05fba45 0b5f-2c10-a697-f36efa24e899
F05fba45 0b5f-2c10-a697-f36efa24e899F05fba45 0b5f-2c10-a697-f36efa24e899
F05fba45 0b5f-2c10-a697-f36efa24e899
 
SAP BI 7.0 Info Providers
SAP BI 7.0 Info ProvidersSAP BI 7.0 Info Providers
SAP BI 7.0 Info Providers
 
Lam config-131007234330-phpapp01
Lam config-131007234330-phpapp01Lam config-131007234330-phpapp01
Lam config-131007234330-phpapp01
 
Sap CI EHP 6
Sap CI EHP 6Sap CI EHP 6
Sap CI EHP 6
 
Ppf in sap_ewm_1
Ppf in sap_ewm_1Ppf in sap_ewm_1
Ppf in sap_ewm_1
 
PLM 200.pdf
PLM 200.pdfPLM 200.pdf
PLM 200.pdf
 

Último

microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...PsychoTech Services
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingTeacherCyreneCayanan
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 

Último (20)

microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 

Hana1 slt repli_sec_en

  • 1. SAP HANA Security Guide - Trigger-Based Replication SAP In-Memory Appliance (SAP HANA) 1.0 Target Audience Consultants Administrators SAP Hardware Partner Others Public Document version 1.0 – 06/27/2011
  • 2. Copyright © Copyright 2011 SAP AG. All rights reserved. No part of this publication may be reproduced or transmitted in any form or for any purpose without the express permission of SAP AG. The information contained herein may be changed without prior notice. Some software products marketed by SAP AG and its distributors contain proprietary software components of other software vendors. Microsoft, Windows, Excel, Outlook, and PowerPoint are registered trademarks of Microsoft Corporation. IBM, DB2, DB2 Universal Database, System i, System i5, System p, System p5, System x, System z, System z10, System z9, z10, z9, iSeries, pSeries, xSeries, zSeries, eServer, z/VM, z/OS, i5/OS, S/390, OS/390, OS/400, AS/400, S/390 Parallel Enterprise Server, PowerVM, Power Architecture, POWER6+, POWER6, POWER5+, POWER5, POWER, OpenPower, PowerPC, BatchPipes, BladeCenter, System Storage, GPFS, HACMP, RETAIN, DB2 Connect, RACF, Redbooks, OS/2, Parallel Sysplex, MVS/ESA, AIX, Intelligent Miner, WebSphere, Netfinity, Tivoli and Informix are trademarks or registered trademarks of IBM Corporation. Linux is the registered trademark of Linus Torvalds in the U.S. and other countries. Adobe, the Adobe logo, Acrobat, PostScript, and Reader are either trademarks or registered trademarks of Adobe Systems Incorporated in the United States and/or other countries. Oracle is a registered trademark of Oracle Corporation. UNIX, X/Open, OSF/1, and Motif are registered trademarks of the Open Group. Citrix, ICA, Program Neighborhood, MetaFrame, WinFrame, VideoFrame, and MultiWin are trademarks or registered trademarks of Citrix Systems, Inc. HTML, XML, XHTML and W3C are trademarks or registered trademarks of W3C®, World Wide Web Consortium, Massachusetts Institute of Technology. Java is a registered trademark of Sun Microsystems, Inc. JavaScript is a registered trademark of Sun Microsystems, Inc., used under license for technology invented and implemented by Netscape. SAP, R/3, SAP NetWeaver, Duet, PartnerEdge, ByDesign, SAP Business ByDesign, and other SAP products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of SAP AG in Germany and other countries. Business Objects and the Business Objects logo, BusinessObjects, Crystal Reports, Crystal Decisions, Web Intelligence, Xcelsius, and other Business Objects products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of Business Objects S.A. in the United States and in other countries. Business Objects is an SAP company. All other product and service names mentioned are the trademarks of their respective companies. Data contained in this document serves informational purposes only. National product specifications may vary. These materials are subject to change without notice. These materials are provided by SAP AG and its affiliated companies ("SAP Group") for informational purposes only, without representation or warranty of any kind, and SAP Group shall not be liable for errors or omissions with respect to the materials. The only warranties for SAP Group products and
  • 3. SAP HANA Security Guide – Trigger-Based Replication June 2011 services are those that are set forth in the express warranty statements accompanying such products and services, if any. Nothing herein should be construed as constituting an additional warranty. Icons in Body Text Icon Meaning Caution Example Note Recommendation Syntax Additional icons are used in SAP Library documentation to help you identify different types of information at a glance. For more information, see Help on Help General Information Classes and Information Classes for Business Information Warehouse on the first page of any version of SAP Library. Typographic Conventions Type Style Description Example text Words or characters quoted from the screen. These include field names, screen titles, pushbuttons labels, menu names, menu paths, and menu options. Cross-references to other documentation. Example text Emphasized words or phrases in body text, graphic titles, and table titles. EXAMPLE TEXT Technical names of system objects. These include report names, program names, transaction codes, table names, and key concepts of a programming language when they are surrounded by body text, for example, SELECT and INCLUDE. Example text Output on the screen. This includes file and directory names and their paths, messages, names of variables and parameters, source text, and names of installation, upgrade and database tools. Example text Exact user entry. These are words or characters that you enter in the system exactly as they appear in the documentation. <Example text> Variable user entry. Angle brackets indicate that you replace these words and characters with appropriate entries to make entries in the system. EXAMPLE TEXT Keys on the keyboard, for example, F2 or ENTER. SAP In-Memory Appliance (SAP HANA) 2
  • 4. SAP HANA Security Guide – Trigger-Based Replication June 2011 User Administration and Authentication .............................................................................. 6 Authorizations .................................................................................................................... 7 Network and Communication Security................................................................................ 8 Network Security ............................................................................................................ 8 Communication Destinations .......................................................................................... 8 Configuration ..................................................................................................................... 8 Configuration .................................................................................................................. 8 SAP In-Memory Appliance (SAP HANA) 3
  • 5. SAP HANA Security Guide – Trigger-Based Replication June 2011 Technical System Landscape The Trigger-Based Replication system transfers database activity from source system databases to replicate databases. The source system is typically an SAP ERP or CRM system, and the replicate database is the SAP HANA In-Memory Database. The figures below show the two possible technical system landscapes for the Trigger-Based Data Replication Using SAP LT (Landscape Transformation) Replicator. Option 1 - Separate SLT system With this option the SLT component is installed in its own SAP system consequently there are two network communication channels in use from this system. Firstly there is an RFC connection to the source system and a second connection to the SAP HANA system. Option 2 - SLT installation in Source system With this option the SLT system component is installed in the source system which means that only one external network communication channel is required to the SAP HANA system. An overview of the system landscape components is provided below. SAP In-Memory Appliance (SAP HANA) 4
  • 6. SAP HANA Security Guide – Trigger-Based Replication June 2011 Source system The source system tracks database changes via database triggers and copies relevant changes into the Logging Tables. SLT component The SLT system polls the log tables in the source system via an RFC connection on a scheduled basis. If there is replication data which should be transferred to the SAP HANA system this is transferred to via the DB connection. SAP HANA system The SAP HANA system contains the SAP In-Memory Database; this is used to store the replicated data. The connections between the SLT component and the SAP HANA system are provided by the DB connection. Topic Guide/Tool Quick Link to the SAP Service Marketplace Trigger- Installation SAP HANA 1.0 Installation Guide – Trigger Based Replication based Guide Replication SAP HANA Guides For more information about SAP HANA landscape, security, installation and administration, see the resources listed in the table below. Topic Guide/Tool Quick Link SAP HANA SAP HANA Knowledge https://service.sap.com/hana Landscape, Center on SAP Service Deployment & Marketplace SAP HANA 1.0 Master Guide Installation SAP HANA 1.0 Installation Guide SAP HANA SAP HANA Knowledge http://help.sap.com/hana Administration & Center on SAP Help Security Portal SAP HANA 1.0 Technical Operations Manual SAP HANA 1.0 Security Guide SAP In-Memory Appliance (SAP HANA) 5
  • 7. SAP HANA Security Guide – Trigger-Based Replication June 2011 User Administration and Authentication The SAP LT Replicator uses the user management and authentication mechanisms provided with the SAP NetWeaver platform, in particular the SAP NetWeaver Application Server. Therefore, the security recommendations and guidelines for user administration and authentication as described in the SAP NetWeaver Security Guide [SAP Library] Application Server ABAP Security Guide also apply to the SAP LT Replicator. This section provides information about user management, administration and authentication that specifically applies to SAP LT replicator in addition to the standard procedures. For accessing the source systems by remote function call (RFC), requires a communication user. As communication user, the access to the source system is exclusively by RFC without the ability to execute steps in dialog mode directly in a system. For more information about this user type, see the section User Types in the SAP Web AS ABAP Security Guide. The following security measures apply with regard to user management for SAP LT Replicator: Irrespective of all security measures, the users who have access to the SLT system will have (indirect) access to the production data in the source system and may be able to see information stored there. Consequently, we recommend that you limit the number of users in the SLT system to a minimum to prevent unauthorized access to production data. SAP In-Memory Appliance (SAP HANA) 6
  • 8. SAP HANA Security Guide – Trigger-Based Replication June 2011 Authorizations The SAP LT Replicator uses the authorization concept provided by the SAP NetWeaver AS ABAP. Therefore, the recommendations and guidelines for authorizations as described in the SAP NetWeaver AS Security Guide ABAP and SAP NetWeaver AS Security Guide Java also apply to the SAP LT Replicator. The SAP NetWeaver authorization concept is based on assigning authorizations to users based on roles. For role maintenance, use the profile generator (transaction PFCG) on the AS ABAP and the User Management Engine’s user administration console on the AS Java. For more information about how to create roles, see Role Administration (SAP Library) Specific authorizations apply for each system. Authorizations for source system(s) and SLT system are available in user profiles to control the actions that a user is authorized to perform. Amongst many other existing SAP NetWeaver based authorization objects, the following authorization objects are specifically important for the use of SAP LT replicator: S_DMIS Description: Authority object for SAP SLO Data migration Authorization fields Field name Heading MBT_PR_ARE MBT PCL: Scenario MBT_PR_LEV MBT PCL: Processing Role Level ACTVT Activity S_DMC_S_R Description: MWB: Reading / writing authorization in sender / receiver Authorization fields Field name Heading ACTVT Activity User Roles With SAP LT replicator, the composite role SAP_IUUC_USER is available that includes the following roles: SAP_IUUC_REMOTE SAP_DMIS_USER SAP_SLOP_USER SAP In-Memory Appliance (SAP HANA) 7
  • 9. SAP HANA Security Guide – Trigger-Based Replication June 2011 Network Security Access to source systems using SAP LT replicator takes place exclusively through RFC connections. For more information about security issues in connection with RFC, see the relevant sections in the SAP Library on SAP Help Portal. Communication Destinations SAP LT replicator does not come with fixed destinations or user names. The following destinations need to be created: Source System(s) Users in RFC destinations need to be of type Communication / CPIC – and require authorizations specified by one of the following composite roles: o SAP_LT_RFC_USER o SAP_LT_RFC_USER_700 o SAP_IUUC_USER or SAP_IUUC_REMOTE Configuration Configuration settings as defined in LT based replication schemas are be stored in SAP LT replicator control tables on the SLT system. In source system(s), there is no specific initial configuration data created, however with the initialization of the data replication, DB triggers and logging tables are created. For logging tables, it is possible to create a separate table space within the database for monitoring the size of logging tables. No specific configuration settings are required on the SAP HANA system. SAP In-Memory Appliance (SAP HANA) 8