SlideShare uma empresa Scribd logo
1 de 9
Baixar para ler offline
SAP HANA Security Guide - Trigger-Based Replication
      SAP In-Memory Appliance (SAP HANA) 1.0



   Target Audience
    Consultants
    Administrators
    SAP Hardware Partner
    Others




Public
Document version 1.0 – 06/27/2011
Copyright
© Copyright 2011 SAP AG. All rights reserved.

No part of this publication may be reproduced or transmitted in any form or for any purpose
without the express permission of SAP AG. The information contained herein may be
changed without prior notice.
Some software products marketed by SAP AG and its distributors contain proprietary
software components of other software vendors.

Microsoft, Windows, Excel, Outlook, and PowerPoint are registered trademarks of Microsoft
Corporation.

IBM, DB2, DB2 Universal Database, System i, System i5, System p, System p5, System x,
System z, System z10, System z9, z10, z9, iSeries, pSeries, xSeries, zSeries, eServer, z/VM,
z/OS, i5/OS, S/390, OS/390, OS/400, AS/400, S/390 Parallel Enterprise Server, PowerVM,
Power Architecture, POWER6+, POWER6, POWER5+, POWER5, POWER, OpenPower,
PowerPC, BatchPipes, BladeCenter, System Storage, GPFS, HACMP, RETAIN, DB2
Connect, RACF, Redbooks, OS/2, Parallel Sysplex, MVS/ESA, AIX, Intelligent Miner,
WebSphere, Netfinity, Tivoli and Informix are trademarks or registered trademarks of IBM
Corporation.

Linux is the registered trademark of Linus Torvalds in the U.S. and other countries.

Adobe, the Adobe logo, Acrobat, PostScript, and Reader are either trademarks or registered
trademarks of Adobe Systems Incorporated in the United States and/or other countries.

Oracle is a registered trademark of Oracle Corporation.

UNIX, X/Open, OSF/1, and Motif are registered trademarks of the Open Group.
Citrix, ICA, Program Neighborhood, MetaFrame, WinFrame, VideoFrame, and MultiWin are
trademarks or registered trademarks of Citrix Systems, Inc.

HTML, XML, XHTML and W3C are trademarks or registered trademarks of W3C®, World
Wide Web Consortium, Massachusetts Institute of Technology.

Java is a registered trademark of Sun Microsystems, Inc.

JavaScript is a registered trademark of Sun Microsystems, Inc., used under license for
technology invented and implemented by Netscape.

SAP, R/3, SAP NetWeaver, Duet, PartnerEdge, ByDesign, SAP Business ByDesign, and
other SAP products and services mentioned herein as well as their respective logos are
trademarks or registered trademarks of SAP AG in Germany and other countries.

Business Objects and the Business Objects logo, BusinessObjects, Crystal Reports, Crystal
Decisions, Web Intelligence, Xcelsius, and other Business Objects products and services
mentioned herein as well as their respective logos are trademarks or registered trademarks of
Business Objects S.A. in the United States and in other countries. Business Objects is an
SAP company.

All other product and service names mentioned are the trademarks of their respective
companies. Data contained in this document serves informational purposes only. National
product specifications may vary.

These materials are subject to change without notice. These materials are provided by SAP
AG and its affiliated companies ("SAP Group") for informational purposes only, without
representation or warranty of any kind, and SAP Group shall not be liable for errors or
omissions with respect to the materials. The only warranties for SAP Group products and
SAP HANA Security Guide – Trigger-Based Replication                                June 2011


services are those that are set forth in the express warranty statements accompanying such
products and services, if any. Nothing herein should be construed as constituting an
additional warranty.


Icons in Body Text

   Icon                      Meaning
                             Caution
                             Example
                             Note
                             Recommendation
                             Syntax


Additional icons are used in SAP Library documentation to help you identify different types of
information at a glance. For more information, see Help on Help   General Information
Classes and Information Classes for Business Information Warehouse on the first page of any
version of SAP Library.



Typographic Conventions

  Type Style                Description
  Example text              Words or characters quoted from the screen. These include field
                            names, screen titles, pushbuttons labels, menu names, menu paths,
                            and menu options.
                            Cross-references to other documentation.
  Example text              Emphasized words or phrases in body text, graphic titles, and table
                            titles.
  EXAMPLE TEXT              Technical names of system objects. These include report names,
                            program names, transaction codes, table names, and key concepts of a
                            programming language when they are surrounded by body text, for
                            example, SELECT and INCLUDE.
  Example text              Output on the screen. This includes file and directory names and their
                            paths, messages, names of variables and parameters, source text, and
                            names of installation, upgrade and database tools.
  Example text              Exact user entry. These are words or characters that you enter in the
                            system exactly as they appear in the documentation.
  <Example text>            Variable user entry. Angle brackets indicate that you replace these
                            words and characters with appropriate entries to make entries in the
                            system.
  EXAMPLE TEXT              Keys on the keyboard, for example, F2 or ENTER.




SAP In-Memory Appliance (SAP HANA)                                                                  2
SAP HANA Security Guide – Trigger-Based Replication                                                                    June 2011




  User Administration and Authentication .............................................................................. 6
  Authorizations .................................................................................................................... 7
  Network and Communication Security................................................................................ 8
     Network Security ............................................................................................................ 8
     Communication Destinations .......................................................................................... 8
  Configuration ..................................................................................................................... 8
     Configuration .................................................................................................................. 8




SAP In-Memory Appliance (SAP HANA)                                                                                                        3
SAP HANA Security Guide – Trigger-Based Replication                               June 2011



      Technical System Landscape
The Trigger-Based Replication system transfers database activity from source system
databases to replicate databases. The source system is typically an SAP ERP or CRM
system, and the replicate database is the SAP HANA In-Memory Database.
The figures below show the two possible technical system landscapes for the Trigger-Based
Data Replication Using SAP LT (Landscape Transformation) Replicator.

Option 1 - Separate SLT system




With this option the SLT component is installed in its own SAP system consequently there are
two network communication channels in use from this system. Firstly there is an RFC
connection to the source system and a second connection to the SAP HANA system.


Option 2 - SLT installation in Source system




With this option the SLT system component is installed in the source system which means
that only one external network communication channel is required to the SAP HANA system.


An overview of the system landscape components is provided below.




SAP In-Memory Appliance (SAP HANA)                                                             4
SAP HANA Security Guide – Trigger-Based Replication                                 June 2011



Source system
The source system tracks database changes via database triggers and copies relevant
changes into the Logging Tables.


SLT component
The SLT system polls the log tables in the source system via an RFC connection on a
scheduled basis. If there is replication data which should be transferred to the SAP HANA
system this is transferred to via the DB connection.

SAP HANA system
The SAP HANA system contains the SAP In-Memory Database; this is used to store the
replicated data. The connections between the SLT component and the SAP HANA system
are provided by the DB connection.


Topic          Guide/Tool     Quick Link to the SAP Service Marketplace
Trigger-       Installation   SAP HANA 1.0 Installation Guide – Trigger Based Replication
based          Guide
Replication



SAP HANA Guides
For more information about SAP HANA landscape, security, installation and administration,
see the resources listed in the table below.

Topic                  Guide/Tool              Quick Link
SAP HANA               SAP HANA Knowledge      https://service.sap.com/hana
Landscape,             Center on SAP Service
Deployment &           Marketplace                SAP HANA 1.0 Master Guide
Installation                                      SAP HANA 1.0 Installation Guide
SAP HANA               SAP HANA Knowledge      http://help.sap.com/hana
Administration &       Center on SAP Help
Security               Portal                     SAP HANA 1.0 Technical Operations Manual
                                                  SAP HANA 1.0 Security Guide




SAP In-Memory Appliance (SAP HANA)                                                              5
SAP HANA Security Guide – Trigger-Based Replication                               June 2011




      User Administration and Authentication
The SAP LT Replicator uses the user management and authentication mechanisms provided
with the SAP NetWeaver platform, in particular the SAP NetWeaver Application Server.
Therefore, the security recommendations and guidelines for user administration and
authentication as described in the SAP NetWeaver Security Guide [SAP Library]
Application Server ABAP Security Guide also apply to the SAP LT Replicator.
This section provides information about user management, administration and authentication
that specifically applies to SAP LT replicator in addition to the standard procedures.
For accessing the source systems by remote function call (RFC), requires a communication
user. As communication user, the access to the source system is exclusively by RFC without
the ability to execute steps in dialog mode directly in a system. For more information about
this user type, see the section User Types in the SAP Web AS ABAP Security Guide.
The following security measures apply with regard to user management for SAP LT
Replicator:
Irrespective of all security measures, the users who have access to the SLT system will have
(indirect) access to the production data in the source system and may be able to see
information stored there. Consequently, we recommend that you limit the number of users in
the SLT system to a minimum to prevent unauthorized access to production data.




SAP In-Memory Appliance (SAP HANA)                                                             6
SAP HANA Security Guide – Trigger-Based Replication                                    June 2011




      Authorizations
The SAP LT Replicator uses the authorization concept provided by the SAP NetWeaver AS
ABAP. Therefore, the recommendations and guidelines for authorizations as described in the
SAP NetWeaver AS Security Guide ABAP and SAP NetWeaver AS Security Guide Java also
apply to the SAP LT Replicator.
The SAP NetWeaver authorization concept is based on assigning authorizations to users
based on roles. For role maintenance, use the profile generator (transaction PFCG) on the AS
ABAP and the User Management Engine’s user administration console on the AS Java.



             For more information about how to create roles, see Role Administration (SAP
             Library)
Specific authorizations apply for each system. Authorizations for source system(s) and SLT
system are available in user profiles to control the actions that a user is authorized to perform.
Amongst many other existing SAP NetWeaver based authorization objects, the following
authorization objects are specifically important for the use of SAP LT replicator:
        S_DMIS
        Description: Authority object for SAP SLO Data migration
        Authorization fields
        Field name                                    Heading
        MBT_PR_ARE                                    MBT PCL: Scenario
        MBT_PR_LEV                                    MBT PCL: Processing Role Level
        ACTVT                                         Activity


        S_DMC_S_R
        Description: MWB: Reading / writing authorization in sender / receiver
        Authorization fields
        Field name                                    Heading
        ACTVT                                         Activity



User Roles
With SAP LT replicator, the composite role SAP_IUUC_USER is available that includes the
following roles:
        SAP_IUUC_REMOTE
        SAP_DMIS_USER
        SAP_SLOP_USER




SAP In-Memory Appliance (SAP HANA)                                                                   7
SAP HANA Security Guide – Trigger-Based Replication                                   June 2011




      Network Security
Access to source systems using SAP LT replicator takes place exclusively through RFC
connections. For more information about security issues in connection with RFC, see the
relevant sections in the SAP Library on SAP Help Portal.



       Communication Destinations
SAP LT replicator does not come with fixed destinations or user names. The following
destinations need to be created:

Source System(s)
Users in RFC destinations need to be of type Communication / CPIC – and require
authorizations specified by one of the following composite roles:
            o   SAP_LT_RFC_USER
            o   SAP_LT_RFC_USER_700
            o   SAP_IUUC_USER or SAP_IUUC_REMOTE



     Configuration
Configuration settings as defined in LT based replication schemas are be stored in SAP LT
replicator control tables on the SLT system.
In source system(s), there is no specific initial configuration data created, however with the
initialization of the data replication, DB triggers and logging tables are created.
For logging tables, it is possible to create a separate table space within the database for
monitoring the size of logging tables.
No specific configuration settings are required on the SAP HANA system.




SAP In-Memory Appliance (SAP HANA)                                                                8

Mais conteúdo relacionado

Mais procurados

Mais procurados (20)

Practitioner perspective-erp-on-hana-and-fi-analytics 2015
Practitioner perspective-erp-on-hana-and-fi-analytics 2015Practitioner perspective-erp-on-hana-and-fi-analytics 2015
Practitioner perspective-erp-on-hana-and-fi-analytics 2015
 
Easy dms basic process guide
Easy dms basic process guideEasy dms basic process guide
Easy dms basic process guide
 
SAP Integration With Excel - Advanced Guide
SAP Integration With Excel - Advanced GuideSAP Integration With Excel - Advanced Guide
SAP Integration With Excel - Advanced Guide
 
ERP Made Simple (preview)
ERP Made Simple (preview)ERP Made Simple (preview)
ERP Made Simple (preview)
 
SAP HANA SPS08 Modeling
SAP HANA SPS08 ModelingSAP HANA SPS08 Modeling
SAP HANA SPS08 Modeling
 
What's New in SAP HANA SPS 11 Operations
What's New in SAP HANA SPS 11 OperationsWhat's New in SAP HANA SPS 11 Operations
What's New in SAP HANA SPS 11 Operations
 
Ecc ad ldap
Ecc ad ldapEcc ad ldap
Ecc ad ldap
 
HANA SPS07 Modeling Enhancements
HANA SPS07 Modeling EnhancementsHANA SPS07 Modeling Enhancements
HANA SPS07 Modeling Enhancements
 
TZH300_EN_COL96
TZH300_EN_COL96TZH300_EN_COL96
TZH300_EN_COL96
 
SAP HANA SPS09 - SAP HANA Workload Management
SAP HANA SPS09 - SAP HANA Workload ManagementSAP HANA SPS09 - SAP HANA Workload Management
SAP HANA SPS09 - SAP HANA Workload Management
 
SAP HANA SPS09- Administration Monitoring
SAP HANA SPS09- Administration MonitoringSAP HANA SPS09- Administration Monitoring
SAP HANA SPS09- Administration Monitoring
 
What's New in SAP HANA View Modeling
What's New in SAP HANA View ModelingWhat's New in SAP HANA View Modeling
What's New in SAP HANA View Modeling
 
Sap hana client_installation_update_guide_en
Sap hana client_installation_update_guide_enSap hana client_installation_update_guide_en
Sap hana client_installation_update_guide_en
 
Ac409c27 5a7c-0010-82c7-eda71af511fa
Ac409c27 5a7c-0010-82c7-eda71af511faAc409c27 5a7c-0010-82c7-eda71af511fa
Ac409c27 5a7c-0010-82c7-eda71af511fa
 
SAP HANA SPS10- Series Data/ TimeSeries
SAP HANA SPS10- Series Data/ TimeSeriesSAP HANA SPS10- Series Data/ TimeSeries
SAP HANA SPS10- Series Data/ TimeSeries
 
Officexml
OfficexmlOfficexml
Officexml
 
Erp book
Erp bookErp book
Erp book
 
HANA SPS07 Fuzzy Search
HANA SPS07 Fuzzy SearchHANA SPS07 Fuzzy Search
HANA SPS07 Fuzzy Search
 
HANA SPS07 Fulltext Search
HANA SPS07 Fulltext SearchHANA SPS07 Fulltext Search
HANA SPS07 Fulltext Search
 
What's new in SAP HANA SPS 11 SQL/SQLScript
What's new in SAP HANA SPS 11 SQL/SQLScriptWhat's new in SAP HANA SPS 11 SQL/SQLScript
What's new in SAP HANA SPS 11 SQL/SQLScript
 

Destaque

Persuasion &amp; Convincing Skills
Persuasion &amp; Convincing SkillsPersuasion &amp; Convincing Skills
Persuasion &amp; Convincing Skills
Ahsan Bham
 
LITE 2016 – Making the Most of Communication Triggers [Deepika Ranjit & Lokma...
LITE 2016 – Making the Most of Communication Triggers [Deepika Ranjit & Lokma...LITE 2016 – Making the Most of Communication Triggers [Deepika Ranjit & Lokma...
LITE 2016 – Making the Most of Communication Triggers [Deepika Ranjit & Lokma...
getadministrate
 
Influence, tactics, power and politics
Influence, tactics, power and politicsInfluence, tactics, power and politics
Influence, tactics, power and politics
Tamim123
 

Destaque (6)

Persuasion &amp; Convincing Skills
Persuasion &amp; Convincing SkillsPersuasion &amp; Convincing Skills
Persuasion &amp; Convincing Skills
 
Body Language & Self-confidence
Body Language & Self-confidenceBody Language & Self-confidence
Body Language & Self-confidence
 
LITE 2016 – Making the Most of Communication Triggers [Deepika Ranjit & Lokma...
LITE 2016 – Making the Most of Communication Triggers [Deepika Ranjit & Lokma...LITE 2016 – Making the Most of Communication Triggers [Deepika Ranjit & Lokma...
LITE 2016 – Making the Most of Communication Triggers [Deepika Ranjit & Lokma...
 
Influence, tactics, power and politics
Influence, tactics, power and politicsInfluence, tactics, power and politics
Influence, tactics, power and politics
 
Influencing skills
Influencing skillsInfluencing skills
Influencing skills
 
Introduction to Agile Project Planning and Project Management
Introduction to Agile Project Planning and Project ManagementIntroduction to Agile Project Planning and Project Management
Introduction to Agile Project Planning and Project Management
 

Semelhante a Hana1 slt repli_sec_en

Master guide cdmc
Master guide cdmcMaster guide cdmc
Master guide cdmc
rvegesna1
 
How to build an agentry based mobile app from scratch connecting to an sap ba...
How to build an agentry based mobile app from scratch connecting to an sap ba...How to build an agentry based mobile app from scratch connecting to an sap ba...
How to build an agentry based mobile app from scratch connecting to an sap ba...
Jaime Marchant Benavides
 
How to build an agentry based mobile app from scratch connecting to an sap ba...
How to build an agentry based mobile app from scratch connecting to an sap ba...How to build an agentry based mobile app from scratch connecting to an sap ba...
How to build an agentry based mobile app from scratch connecting to an sap ba...
Ganesh Kumar
 
How to call an enterprise service from jsf
How to call an enterprise service from jsfHow to call an enterprise service from jsf
How to call an enterprise service from jsf
Soufiane Boujamaoui
 
F05fba45 0b5f-2c10-a697-f36efa24e899
F05fba45 0b5f-2c10-a697-f36efa24e899F05fba45 0b5f-2c10-a697-f36efa24e899
F05fba45 0b5f-2c10-a697-f36efa24e899
Deepa Bisht
 

Semelhante a Hana1 slt repli_sec_en (20)

Sap screen personas performance optimization guide v0.96
Sap screen personas performance optimization guide v0.96Sap screen personas performance optimization guide v0.96
Sap screen personas performance optimization guide v0.96
 
142 bb config_guide_en_co
142 bb config_guide_en_co142 bb config_guide_en_co
142 bb config_guide_en_co
 
sap pp
sap ppsap pp
sap pp
 
Master guide cdmc
Master guide cdmcMaster guide cdmc
Master guide cdmc
 
Master guide cdmc
Master guide cdmcMaster guide cdmc
Master guide cdmc
 
SAP_SLT_Guide_21122015.pdf
SAP_SLT_Guide_21122015.pdfSAP_SLT_Guide_21122015.pdf
SAP_SLT_Guide_21122015.pdf
 
How to build an agentry based mobile app from scratch connecting to an sap ba...
How to build an agentry based mobile app from scratch connecting to an sap ba...How to build an agentry based mobile app from scratch connecting to an sap ba...
How to build an agentry based mobile app from scratch connecting to an sap ba...
 
End user experience monitoring
End user experience monitoringEnd user experience monitoring
End user experience monitoring
 
Testing SAP HANA applications with SAP LoadRunner by HP
Testing SAP HANA applications with SAP LoadRunner by HPTesting SAP HANA applications with SAP LoadRunner by HP
Testing SAP HANA applications with SAP LoadRunner by HP
 
How to use abap cds for data provisioning in bw
How to use abap cds for data provisioning in bwHow to use abap cds for data provisioning in bw
How to use abap cds for data provisioning in bw
 
Funds management configuration sap ag
Funds management configuration sap agFunds management configuration sap ag
Funds management configuration sap ag
 
How to build an agentry based mobile app from scratch connecting to an sap ba...
How to build an agentry based mobile app from scratch connecting to an sap ba...How to build an agentry based mobile app from scratch connecting to an sap ba...
How to build an agentry based mobile app from scratch connecting to an sap ba...
 
How to call an enterprise service from jsf
How to call an enterprise service from jsfHow to call an enterprise service from jsf
How to call an enterprise service from jsf
 
Badi
BadiBadi
Badi
 
F05fba45 0b5f-2c10-a697-f36efa24e899
F05fba45 0b5f-2c10-a697-f36efa24e899F05fba45 0b5f-2c10-a697-f36efa24e899
F05fba45 0b5f-2c10-a697-f36efa24e899
 
SAP BI 7.0 Info Providers
SAP BI 7.0 Info ProvidersSAP BI 7.0 Info Providers
SAP BI 7.0 Info Providers
 
Lam config-131007234330-phpapp01
Lam config-131007234330-phpapp01Lam config-131007234330-phpapp01
Lam config-131007234330-phpapp01
 
Sap CI EHP 6
Sap CI EHP 6Sap CI EHP 6
Sap CI EHP 6
 
Ppf in sap_ewm_1
Ppf in sap_ewm_1Ppf in sap_ewm_1
Ppf in sap_ewm_1
 
PLM 200.pdf
PLM 200.pdfPLM 200.pdf
PLM 200.pdf
 

Último

Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
AnaAcapella
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 

Último (20)

Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 

Hana1 slt repli_sec_en

  • 1. SAP HANA Security Guide - Trigger-Based Replication SAP In-Memory Appliance (SAP HANA) 1.0 Target Audience Consultants Administrators SAP Hardware Partner Others Public Document version 1.0 – 06/27/2011
  • 2. Copyright © Copyright 2011 SAP AG. All rights reserved. No part of this publication may be reproduced or transmitted in any form or for any purpose without the express permission of SAP AG. The information contained herein may be changed without prior notice. Some software products marketed by SAP AG and its distributors contain proprietary software components of other software vendors. Microsoft, Windows, Excel, Outlook, and PowerPoint are registered trademarks of Microsoft Corporation. IBM, DB2, DB2 Universal Database, System i, System i5, System p, System p5, System x, System z, System z10, System z9, z10, z9, iSeries, pSeries, xSeries, zSeries, eServer, z/VM, z/OS, i5/OS, S/390, OS/390, OS/400, AS/400, S/390 Parallel Enterprise Server, PowerVM, Power Architecture, POWER6+, POWER6, POWER5+, POWER5, POWER, OpenPower, PowerPC, BatchPipes, BladeCenter, System Storage, GPFS, HACMP, RETAIN, DB2 Connect, RACF, Redbooks, OS/2, Parallel Sysplex, MVS/ESA, AIX, Intelligent Miner, WebSphere, Netfinity, Tivoli and Informix are trademarks or registered trademarks of IBM Corporation. Linux is the registered trademark of Linus Torvalds in the U.S. and other countries. Adobe, the Adobe logo, Acrobat, PostScript, and Reader are either trademarks or registered trademarks of Adobe Systems Incorporated in the United States and/or other countries. Oracle is a registered trademark of Oracle Corporation. UNIX, X/Open, OSF/1, and Motif are registered trademarks of the Open Group. Citrix, ICA, Program Neighborhood, MetaFrame, WinFrame, VideoFrame, and MultiWin are trademarks or registered trademarks of Citrix Systems, Inc. HTML, XML, XHTML and W3C are trademarks or registered trademarks of W3C®, World Wide Web Consortium, Massachusetts Institute of Technology. Java is a registered trademark of Sun Microsystems, Inc. JavaScript is a registered trademark of Sun Microsystems, Inc., used under license for technology invented and implemented by Netscape. SAP, R/3, SAP NetWeaver, Duet, PartnerEdge, ByDesign, SAP Business ByDesign, and other SAP products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of SAP AG in Germany and other countries. Business Objects and the Business Objects logo, BusinessObjects, Crystal Reports, Crystal Decisions, Web Intelligence, Xcelsius, and other Business Objects products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of Business Objects S.A. in the United States and in other countries. Business Objects is an SAP company. All other product and service names mentioned are the trademarks of their respective companies. Data contained in this document serves informational purposes only. National product specifications may vary. These materials are subject to change without notice. These materials are provided by SAP AG and its affiliated companies ("SAP Group") for informational purposes only, without representation or warranty of any kind, and SAP Group shall not be liable for errors or omissions with respect to the materials. The only warranties for SAP Group products and
  • 3. SAP HANA Security Guide – Trigger-Based Replication June 2011 services are those that are set forth in the express warranty statements accompanying such products and services, if any. Nothing herein should be construed as constituting an additional warranty. Icons in Body Text Icon Meaning Caution Example Note Recommendation Syntax Additional icons are used in SAP Library documentation to help you identify different types of information at a glance. For more information, see Help on Help General Information Classes and Information Classes for Business Information Warehouse on the first page of any version of SAP Library. Typographic Conventions Type Style Description Example text Words or characters quoted from the screen. These include field names, screen titles, pushbuttons labels, menu names, menu paths, and menu options. Cross-references to other documentation. Example text Emphasized words or phrases in body text, graphic titles, and table titles. EXAMPLE TEXT Technical names of system objects. These include report names, program names, transaction codes, table names, and key concepts of a programming language when they are surrounded by body text, for example, SELECT and INCLUDE. Example text Output on the screen. This includes file and directory names and their paths, messages, names of variables and parameters, source text, and names of installation, upgrade and database tools. Example text Exact user entry. These are words or characters that you enter in the system exactly as they appear in the documentation. <Example text> Variable user entry. Angle brackets indicate that you replace these words and characters with appropriate entries to make entries in the system. EXAMPLE TEXT Keys on the keyboard, for example, F2 or ENTER. SAP In-Memory Appliance (SAP HANA) 2
  • 4. SAP HANA Security Guide – Trigger-Based Replication June 2011 User Administration and Authentication .............................................................................. 6 Authorizations .................................................................................................................... 7 Network and Communication Security................................................................................ 8 Network Security ............................................................................................................ 8 Communication Destinations .......................................................................................... 8 Configuration ..................................................................................................................... 8 Configuration .................................................................................................................. 8 SAP In-Memory Appliance (SAP HANA) 3
  • 5. SAP HANA Security Guide – Trigger-Based Replication June 2011 Technical System Landscape The Trigger-Based Replication system transfers database activity from source system databases to replicate databases. The source system is typically an SAP ERP or CRM system, and the replicate database is the SAP HANA In-Memory Database. The figures below show the two possible technical system landscapes for the Trigger-Based Data Replication Using SAP LT (Landscape Transformation) Replicator. Option 1 - Separate SLT system With this option the SLT component is installed in its own SAP system consequently there are two network communication channels in use from this system. Firstly there is an RFC connection to the source system and a second connection to the SAP HANA system. Option 2 - SLT installation in Source system With this option the SLT system component is installed in the source system which means that only one external network communication channel is required to the SAP HANA system. An overview of the system landscape components is provided below. SAP In-Memory Appliance (SAP HANA) 4
  • 6. SAP HANA Security Guide – Trigger-Based Replication June 2011 Source system The source system tracks database changes via database triggers and copies relevant changes into the Logging Tables. SLT component The SLT system polls the log tables in the source system via an RFC connection on a scheduled basis. If there is replication data which should be transferred to the SAP HANA system this is transferred to via the DB connection. SAP HANA system The SAP HANA system contains the SAP In-Memory Database; this is used to store the replicated data. The connections between the SLT component and the SAP HANA system are provided by the DB connection. Topic Guide/Tool Quick Link to the SAP Service Marketplace Trigger- Installation SAP HANA 1.0 Installation Guide – Trigger Based Replication based Guide Replication SAP HANA Guides For more information about SAP HANA landscape, security, installation and administration, see the resources listed in the table below. Topic Guide/Tool Quick Link SAP HANA SAP HANA Knowledge https://service.sap.com/hana Landscape, Center on SAP Service Deployment & Marketplace SAP HANA 1.0 Master Guide Installation SAP HANA 1.0 Installation Guide SAP HANA SAP HANA Knowledge http://help.sap.com/hana Administration & Center on SAP Help Security Portal SAP HANA 1.0 Technical Operations Manual SAP HANA 1.0 Security Guide SAP In-Memory Appliance (SAP HANA) 5
  • 7. SAP HANA Security Guide – Trigger-Based Replication June 2011 User Administration and Authentication The SAP LT Replicator uses the user management and authentication mechanisms provided with the SAP NetWeaver platform, in particular the SAP NetWeaver Application Server. Therefore, the security recommendations and guidelines for user administration and authentication as described in the SAP NetWeaver Security Guide [SAP Library] Application Server ABAP Security Guide also apply to the SAP LT Replicator. This section provides information about user management, administration and authentication that specifically applies to SAP LT replicator in addition to the standard procedures. For accessing the source systems by remote function call (RFC), requires a communication user. As communication user, the access to the source system is exclusively by RFC without the ability to execute steps in dialog mode directly in a system. For more information about this user type, see the section User Types in the SAP Web AS ABAP Security Guide. The following security measures apply with regard to user management for SAP LT Replicator: Irrespective of all security measures, the users who have access to the SLT system will have (indirect) access to the production data in the source system and may be able to see information stored there. Consequently, we recommend that you limit the number of users in the SLT system to a minimum to prevent unauthorized access to production data. SAP In-Memory Appliance (SAP HANA) 6
  • 8. SAP HANA Security Guide – Trigger-Based Replication June 2011 Authorizations The SAP LT Replicator uses the authorization concept provided by the SAP NetWeaver AS ABAP. Therefore, the recommendations and guidelines for authorizations as described in the SAP NetWeaver AS Security Guide ABAP and SAP NetWeaver AS Security Guide Java also apply to the SAP LT Replicator. The SAP NetWeaver authorization concept is based on assigning authorizations to users based on roles. For role maintenance, use the profile generator (transaction PFCG) on the AS ABAP and the User Management Engine’s user administration console on the AS Java. For more information about how to create roles, see Role Administration (SAP Library) Specific authorizations apply for each system. Authorizations for source system(s) and SLT system are available in user profiles to control the actions that a user is authorized to perform. Amongst many other existing SAP NetWeaver based authorization objects, the following authorization objects are specifically important for the use of SAP LT replicator: S_DMIS Description: Authority object for SAP SLO Data migration Authorization fields Field name Heading MBT_PR_ARE MBT PCL: Scenario MBT_PR_LEV MBT PCL: Processing Role Level ACTVT Activity S_DMC_S_R Description: MWB: Reading / writing authorization in sender / receiver Authorization fields Field name Heading ACTVT Activity User Roles With SAP LT replicator, the composite role SAP_IUUC_USER is available that includes the following roles: SAP_IUUC_REMOTE SAP_DMIS_USER SAP_SLOP_USER SAP In-Memory Appliance (SAP HANA) 7
  • 9. SAP HANA Security Guide – Trigger-Based Replication June 2011 Network Security Access to source systems using SAP LT replicator takes place exclusively through RFC connections. For more information about security issues in connection with RFC, see the relevant sections in the SAP Library on SAP Help Portal. Communication Destinations SAP LT replicator does not come with fixed destinations or user names. The following destinations need to be created: Source System(s) Users in RFC destinations need to be of type Communication / CPIC – and require authorizations specified by one of the following composite roles: o SAP_LT_RFC_USER o SAP_LT_RFC_USER_700 o SAP_IUUC_USER or SAP_IUUC_REMOTE Configuration Configuration settings as defined in LT based replication schemas are be stored in SAP LT replicator control tables on the SLT system. In source system(s), there is no specific initial configuration data created, however with the initialization of the data replication, DB triggers and logging tables are created. For logging tables, it is possible to create a separate table space within the database for monitoring the size of logging tables. No specific configuration settings are required on the SAP HANA system. SAP In-Memory Appliance (SAP HANA) 8