SAP HANA 2.0 Security Guide
Your complete guide to safeguarding your SAP HANA 2.0 platform awaits! Get step-by-step instructions for configuring and maintaining each security element, from the new SAP HANA cockpit to privileges and roles. Learn how to secure database objects and provision and maintain user accounts. Then, dive into managing authentications, certificates, audits, and traces.

Highlights include:

1) SAP HANA cockpit
2) Privileges
3) Catalog objects
4) User accounts
5) Roles
6) Authentication
7) Certificate management
8) Encryption
9) Lifecycle management
10) Auditing
11) Security tracing

"1136426647"
SAP HANA 2.0 Security Guide
Your complete guide to safeguarding your SAP HANA 2.0 platform awaits! Get step-by-step instructions for configuring and maintaining each security element, from the new SAP HANA cockpit to privileges and roles. Learn how to secure database objects and provision and maintain user accounts. Then, dive into managing authentications, certificates, audits, and traces.

Highlights include:

1) SAP HANA cockpit
2) Privileges
3) Catalog objects
4) User accounts
5) Roles
6) Authentication
7) Certificate management
8) Encryption
9) Lifecycle management
10) Auditing
11) Security tracing

89.95 In Stock
SAP HANA 2.0 Security Guide

SAP HANA 2.0 Security Guide

by Jonathan Haun
SAP HANA 2.0 Security Guide

SAP HANA 2.0 Security Guide

by Jonathan Haun

Hardcover(Enlarged)

$89.95 
  • SHIP THIS ITEM
    Qualifies for Free Shipping
  • PICK UP IN STORE
    Check Availability at Nearby Stores

Related collections and offers


Overview

Your complete guide to safeguarding your SAP HANA 2.0 platform awaits! Get step-by-step instructions for configuring and maintaining each security element, from the new SAP HANA cockpit to privileges and roles. Learn how to secure database objects and provision and maintain user accounts. Then, dive into managing authentications, certificates, audits, and traces.

Highlights include:

1) SAP HANA cockpit
2) Privileges
3) Catalog objects
4) User accounts
5) Roles
6) Authentication
7) Certificate management
8) Encryption
9) Lifecycle management
10) Auditing
11) Security tracing


Product Details

ISBN-13: 9781493218967
Publisher: Rheinwerk Publishing, Inc.
Publication date: 04/23/2020
Edition description: Enlarged
Pages: 608
Product dimensions: 6.90(w) x 9.00(h) x (d)

About the Author

Jonathan Haun currently serves as the lead SAP HANA consultant and consulting manager with Decision First Technologies. Over the past two years, he has had the opportunity to help several clients implement solutions using SAP HANA. In addition to being certified in multipleSAP BusinessObjects tools, he is also a SAP Certified Application Associate and SAP Certified Technology Associate for SAP HANA 1.0. Jonathan has worked in the field of business intelligence for more than 10 years. During this time, he has gained invaluable experience while helping customers implement solutions using the tools from the SAP BusinessObjects product line. Before working as a full-time business intelligence consultant, he worked in a variety of information technology management and administrative roles. His combination of experience and wealth of technical knowledge make him an ideal source of information pertaining to business intelligence solutions powered by SAPHANA. You can follow Jonathan on Twitter at @jdh2n or visit his blog at http://bobj.sapbiblog.com.

Table of Contents

... Preface ... 19

... Purpose ... 19

... Who Should Read This Book? ... 19

... Structure of This Book ... 20

... Acknowledgments ... 25

... Introduction ... 27

... Overview of SAP HANA ... 27

... Introduction to SAP HANA Security ... 35

... Importance of Securing Your SAP HANA System ... 36

... Summary ... 37

1 ... Managing Security with the SAP HANA Cockpit ... 39

1.1 ... What Is the SAP HANA Cockpit? ... 40

1.2 ... Security Areas in SAP HANA Cockpit ... 54

1.3 ... SAP HANA Database Explorer and SQL Console ... 61

1.4 ... Summary ... 64

2 ... Introduction to SAP HANA Privileges ... 65

2.1 ... Privileges within SAP HANA ... 66

2.2 ... Privilege Validation and Assignment ... 72

2.3 ... Summary ... 76

3 ... Catalog Objects ... 77

3.1 ... What Are SAP HANA Catalog Objects? ... 77

3.2 ... Creating and Managing Native Catalog Objects ... 79

3.3 ... Creating and Managing Repository Catalog Objects ... 84

3.4 ... Deploying Repository Objects ... 90

3.5 ... Case Study ... 96

3.6 ... Summary ... 101

4 ... User Accounts ... 103

4.1 ... What Are User Accounts? ... 103

4.2 ... Creating and Managing User Accounts ... 110

4.3 ... Granting and Revoking Privileges ... 123

4.4 ... Managing User Role Assignments ... 143

4.5 ... Case Study: Provisioning Users with SQL Scripts and Stored Procedures ... 150

4.6 ... Summary ... 160

5 ... Database Roles ... 161

5.1 ... What Are Roles? ... 161

5.2 ... Creating and Managing Roles ... 165

5.3 ... Granting and Revoking Privileges ... 170

5.4 ... Managing Nested Roles ... 192

5.5 ... Mapping LDAP Groups to Roles ... 196

5.6 ... Summary ... 199

6 ... Repository Roles ... 201

6.1 ... What Are Repository Roles? ... 201

6.2 ... Managing Repository Roles with Design-Time Scripts ... 207

6.3 ... Granting and Revoking Privileges in Design-Time Scripts ... 213

6.4 ... Managing Repository Roles with the SAP HANA Web-Based Development Workbench ... 221

6.5 ... Granting Repository Roles to Users ... 232

6.6 ... Case Study: Creating Basic Repository Roles ... 234

6.7 ... Summary ... 240

7 ... System Privileges ... 241

7.1 ... What Are System Privileges? ... 241

7.2 ... Default System Privileges ... 242

7.3 ... Granting System Privileges ... 253

7.4 ... Case Study: Security Administrator System Privileges ... 262

7.5 ... Summary ... 267

8 ... Object Privileges ... 269

8.1 ... What Are Object Privileges? ... 269

8.2 ... Granting Object Privileges with SQL ... 280

8.3 ... Granting Object Privileges with the SAP HANA Cockpit ... 285

8.4 ... Granting Object Privileges with the SAP HANA Web-Based Development Workbench ... 287

8.5 ... Granting Object Privileges with Repository Roles ... 289

8.6 ... Case Study: Updating Repository Roles to Access Information Views ... 295

8.7 ... Summary ... 299

9 ... Package Privileges ... 301

9.1 ... What Is the SAP HANA Development Repository? ... 301

9.2 ... What Are Package Privileges? ... 304

9.3 ... Granting Package Privileges ... 307

9.4 ... Case Study: Preventing Content Developers from Elevating Their Privileges ... 315

9.5 ... Summary ... 319

10 ... Analytic Privileges ... 321

10.1 ... What Are SAP HANA Information Views? ... 322

10.2 ... What Are Analytic Privileges? ... 324

10.3 ... _SYS_BI_CP_ALL: A System-Generated Analytic Privilege ... 330

10.4 ... Managing Static Analytic Privileges ... 331

10.5 ... Managing Dynamic Analytic Privileges ... 336

10.6 ... Managing Dynamic Expression-Based SQL Analytic Privileges ... 346

10.7 ... Troubleshooting Effective Analytic Privileges and Filter Conditions ... 350

10.8 ... Granting Analytic Privileges ... 351

10.9 ... Summary ... 359

11 ... Application Privileges ... 361

11.1 ... What Are Application Privileges? ... 361

11.2 ... Creating Application Privileges ... 362

11.3 ... Granting Application Privileges ... 364

11.4 ... Privileges on Users ... 372

11.5 ... Summary ... 375

12 ... Authentication ... 377

12.1 ... SAP HANA Internal Authentication Mechanism ... 378

12.2 ... SAP HANA and LDAP Authentication ... 393

12.3 ... Supported Third-Party Authentication Providers ... 396

12.4 ... Case Study: Adding SAML Identity User Accounts ... 406

12.5 ... Summary ... 409

13 ... Certificate Management and Encryption ... 411

13.1 ... SSL Certificates ... 411

13.2 ... Client Encryption Settings ... 423

13.3 ... Encrypting Data ... 431

13.4 ... Summary ... 440

14 ... Security Lifecycle Management ... 441

14.1 ... Maintaining a Consistent Security Model ... 441

14.2 ... Creating Delivery Units for Security-Related Packages ... 448

14.3 ... Transporting Security Packages to Other SAP HANA Systems ... 457

14.4 ... Additional Options in SAP HANA Application Lifecycle Management ... 466

14.5 ... Summary ... 468

15 ... Auditing ... 469

15.1 ... Why Do You Need Auditing? ... 469

15.2 ... Configuring Auditing ... 471

15.3 ... Creating Audit Policies ... 479

15.4 ... Querying Audit Data ... 494

15.5 ... Case Study: Defining Audit Policies ... 496

15.6 ... Summary ... 503

16 ... Security Tracing and Troubleshooting ... 505

16.1 ... Authorization Tracing ... 505

16.2 ... Querying the System to Review Effective Privileges ... 513

16.3 ... Case Study: Identifying Deficiencies in Information View Access ... 522

16.4 ... Summary ... 524

17 ... Security Recommendations ... 525

17.1 ... Password Authentication Settings ... 525

17.2 ... Encryption Settings ... 529

17.3 ... Identifying Users with Elevated Privileges ... 529

17.4 ... Disabling the SYSTEM Account ... 539

17.5 ... Identifying Privilege Escalation Vulnerabilities ... 540

17.6 ... Handover from Hardware Vendors ... 541

17.7 ... Creating Audit Policies ... 541

17.8 ... Summary ... 542

18 ... SAP HANA XSA Security ... 543

18.1 ... Overview of SAP HANA XSA ... 543

18.2 ... Managing Space Access, Users, and Roles Collections in SAP HANA XSA ... 546

18.3 ... Working with SAP Web IDE for SAP HANA ... 556

18.4 ... HDI Containers and Security ... 559

18.5 ... Summary ... 594

... The Author ... 595

... Index ... 597


From the B&N Reads Blog

Customer Reviews