How do you protect and defend your SAP HANA database and application development platform? This comprehensive guide details your options, including privileges, encryption, and more. Learn how to secure database objects, provision and maintain user accounts, and develop and assign roles. Then take an in-depth look at authentication and management certificate before seeing how to enable auditing and security tracing. Up to date for SAP HANA 2.0!
Privileges and Roles
Master the SAP HANA privilege types system, object, package, analytic, and application and learn to create and assign database and repository roles using SAP HANA Studio and SQLScript.
Authentication and Encryption
Learn to use Kerberos, SAML, and native authentication with step-by-step instructions and secure internal and external communication using encryption and SSL certificates.
Monitoring
Activate rules-based monitors to record SAP HANA security-related activities, enable auditing in your system, and use security tracing to keep an eye on your roles and privileges.
How do you protect and defend your SAP HANA database and application development platform? This comprehensive guide details your options, including privileges, encryption, and more. Learn how to secure database objects, provision and maintain user accounts, and develop and assign roles. Then take an in-depth look at authentication and management certificate before seeing how to enable auditing and security tracing. Up to date for SAP HANA 2.0!
Privileges and Roles
Master the SAP HANA privilege types system, object, package, analytic, and application and learn to create and assign database and repository roles using SAP HANA Studio and SQLScript.
Authentication and Encryption
Learn to use Kerberos, SAML, and native authentication with step-by-step instructions and secure internal and external communication using encryption and SSL certificates.
Monitoring
Activate rules-based monitors to record SAP HANA security-related activities, enable auditing in your system, and use security tracing to keep an eye on your roles and privileges.
Відгуки про SAP HANA Security Guide