|Mirror [#1]||Securing SAP S/4HANA.pdf||35,895 KB/Sec|
|Mirror [#2]||Securing SAP S/4HANA.pdf||50,892 KB/Sec|
|Mirror [#3]||Securing SAP S/4HANA.pdf||45,546 KB/Sec|
Explore how to protect and defend your SAP S/4HANA applications, Fiori, Gateway, and the SAP HANA database platform. Learn how to create a consistent cross-system authorization concept and translate the technical specifics for each system into a comprehensive and consistent security model. Explore technical security aspects such as privileges and roles, authentication and encryption, and monitoring for S/4HANA. Compare and contrast SAP S/4HANA applications to the SAP ERP security model and identify what has changed. This book is up to date for SAP HANA 2.0! Dive into SAP S/4HANA authorizations and gain an understanding of the impact on the new front-end and database security setup, and why the different levels need to be consistent. Get best practices for SAP Fiori and Gateway. Find out why it is important to secure SAP HANA from an application layer point of view, as well as a database point of view. Take an in-depth look at how to secure the SAP Application Server, database, operating system, and the network infrastructure.
- Effectively secure SAP S/4HANA, Fiori, and Gateway
- Privileges and roles, authentication, encryption, and monitoring
- Mobile access and SSO considerations
- Cross-system authorization concepts and implementation