Index
606
SAP HANA smart data integration ....... 219, 245
SAP HANA Studio ...................... 39, 196, 449, 462,
464–465, 545
client encryption .............................................. 423
keystore ............................................................... 424
minimum privileges ....................................... 449
user management area ................................. 198
SAP HANA Web-Based Development
Workbench .... 80, 87, 110, 114, 122, 221, 233,
293, 312, 369, 486
analytics privileges ......................................... 354
catalog ................................................................. 154
catalog editor ....................................................... 80
editor .................. 33, 85, 97, 151, 202, 209, 221,
303, 356, 544
enable auditing ................................................ 476
granting privileges .......................................... 367
GUI ......................................................................... 292
navigation ............................. 208, 221, 236–237
object privileges ...................................... 140, 287
privileges ............................................................. 138
resources ................................................................ 81
roles ....................................................................... 148
security ................................................................ 104
security manager .................................... 115, 309
SAP HANA Web-Based Development Work-
bench editor ............................................. 207, 259
SAP HANA XS ......................................................... 544
repository objects ............................................ 184
SAP HANA XSA ................................. 29, 39, 71, 543
accessing applications ................................... 547
application roles .............................................. 552
command line ...................................................... 42
create user .......................................................... 550
credentials .......................................................... 548
framework .......................................................... 544
login ...................................................................... 549
manage users .................................................... 550
platform services ............................................. 544
privileges ............................................................. 557
role collections .................................................. 551
security ................................................................ 550
SAP HANA XSA cockpit ................... 547, 549, 553
SAP HANA, express edition ................................. 40
SAP Landscape Transformation Replication
Server .................................................................... 280
SAP NetWeaver ............................................... 65, 528
SAP NetWeaver Application Server ............... 403
SAP Web Dispatcher ......................... 402, 421, 423
PSE management ............................................. 422
SAP Web IDE for SAP HANA .......... 248, 324, 362,
547, 551, 555–556, 560, 578, 583
access .................................................................... 557
grant user access .............................................. 563
homepage ............................................................ 557
overview ............................................................... 556
synonyms ............................................................ 585
Savepoints ................................................................ 431
Schema access ........................................................ 107
Schema object privileges ..................................... 68
Schema objects ......................................................... 78
Schema prefix ......................................................... 166
Schema privileges ............................. 215, 271, 283
granting multiple ............................................. 282
revoking multiple ............................................. 282
Schema reference .................................................. 566
Schema-level access ............................................. 171
Schemas ......................................... 68, 269, 283, 561
CDS tables .............................................................. 88
create ..................................................................... 248
creation .................................................................. 80
grant/revoke privileges .................................. 281
owner-granted privileges .............................. 281
remove privileges by role .............................. 282
SQL ......................................................................... 280
Script server ............................................................... 34
Script-based repository roles ................ 258, 289,
297, 355
Secure Shell (SSH) .................................................. 434
Secure Sockets Layer (SSL) ................................. 411
access .................................................................... 452
admin .................................................................... 245
certificate ............................................................. 394
certificates ................................................. 411, 428
communications ............................................... 428
encryption ................................................. 424, 427
protocols .............................................................. 411
secured connection .......................................... 429
Secure store in the file system (SSFS) ............ 432
Secured models ...................................................... 325
Security changes .................................................... 445
scheduling ........................................................... 447
Security checklist .................................................... 59
607
Index
Security console .................................................... 476
Security lifecycle management ...................... 441
best practices ..................................................... 442
content packages ............................................. 443
multiple environments .................................. 442
role dependencies ............................................ 444
rollback plan ...................................................... 444
test and validate ............................................... 444
Security management task auditing ............ 499
Security manager .................................................. 115
Security model ...................... 36–37, 161, 315, 441
dependencies ........................................................ 91
repository roles ................................................. 206
test plans ............................................................. 446
testing changes ................................................. 444
tracking changes .............................................. 445
troubleshooting ................................................ 512
validating ............................................................ 445
Security packages ................................................. 457
Security tracing ..................................................... 505
SELECT privileges .................................................. 523
Sensitive data ............................................................ 37
Separation of duties ............................................. 262
Sequences ......................................................... 78, 276
Server-side data encryption ............................. 432
Service account user ............................................ 582
Service accounts .................................................... 528
guidelines ............................................................ 528
Service provider (SP) ............................................ 400
Simple and Protected GSSAPI Negotiation
Mechanism (SPNEGO) .................................... 397
Single sign-on (SSO) ......... 57, 109, 378, 402, 527
Software provisioning manager ........................ 82
Space auditors ........................................................ 555
Space developers ................................................... 555
Space manager ....................................................... 555
Spaces .............................................................. 546, 555
access .................................................................... 554
overview ............................................................... 546
SQL .............................................................................. 192
SQL console ................. 61, 83, 123, 173, 232, 281,
558, 564, 572
access ............................................................. 63, 108
SQL privileges ............................................................ 67
SQL statements ............................................ 123, 364
SQL-based analytic privileges .................. 70, 325,
328, 335
SQL-based dynamic analytic privileges ....... 348
create .................................................................... 348
defining ................................................................ 344
management ..................................................... 345
SQLScript ............................................... 275, 338, 373
SSFS keys .................................................................. 437
Standard roles ............................................... 144, 192
Standard user accounts ...................................... 104
application accounts ...................................... 105
individual accounts ........................................ 104
service accounts ............................................... 104
Standard users ....................................................... 525
Star join calculation views ......................... 69, 323
Static analytic privileges ........ 325, 327, 331, 336
Static filter condition .......................................... 347
Static SQL-based analytic privileges ............. 329
creation ................................................................ 335
Static XML-based analytic privileges ............ 334
creation ................................................................ 331
Stored procedure ......... 75, 79, 84, 145, 150, 173,
193, 232, 340, 347, 500, 571
configuration .................................................... 337
create .................................................................... 155
execute ................................................................. 159
script template .................................................. 343
Structured privileges ............... 128, 177, 218, 517
create ........................................................... 129, 178
creation ................................................................ 244
grant ..................................................................... 128
revoke ................................................................... 178
Subpackages .................................................. 302, 452
creation ................................................................ 303
Synonyms ................................................................... 78
SYS schema .................................................... 117, 166
Syslog ........................................................................ 472
SYSTEM account ............................................. 65, 106
disable .................................................................. 539
System auditing role ........................................... 267
System change auditing .................................... 499
System privileges ............. 66, 124, 132, 139, 173,
182, 189, 214, 223–224, 241, 261, 418, 530, 569
case study ........................................................... 262
default .................................................................. 242
definition ............................................................. 241
developer-related ............................................. 242
environment monitoring-related .............. 252
grant .................................................. 182, 253, 256
grantee ................................................................. 254