SAP Basis Hardware Sizing - SAP Stuff

Direkt zum Seiteninhalt
Hardware Sizing
JAVA
No matter whether a change of the operating system or the database used is pending or a move of the SAP system as well as a migration to SAP HANA has to be completed - we are your experts. We create a plan together with you and migrate your SAP system within the shortest possible time. Our services:

New risks in SAP HANA: In addition to the known risks, there are also new risks from the use of SAP HANA. A very good example are frequently used web applications that represent something new in the SAP area. In contrast to an SAP ERP system, HANA systems consist mainly of web applications, which were considered optional in the previous versions. These web applications can be found by various search engines on the Internet. This also applies to SAP Portal or Netweaver. There are URL schemes that help locate the system. This also applies to other SAP systems that use Web applications. This makes the new technology vulnerable to typical web attacks. SQL Injection, ABAP Code Injection, or XSS are all included. All risks known for a normal SAP system also apply to a SAP-HANA system. The data is stored unencrypted in RAM. Only then does the system gain this speed advantage. This results in risks such as a read-out by memory scraping malware. These pick up data in memory. Encryption costs performance, so it is not used by default. Especially during a migration HANA runs in a parallel system, therefore at least one new system comes to your landscape. Also note: HANA has its own tools and settings that need to be known and configured. The bottom line is that the system simply needs more attention when operating. Many settings often result in more errors. Three - points - HANA Security Plan 1) Roles and permissions In a previous SAP system, roles and permissions are certainly one of the main pillars of a secure system. Roles and permissions work differently in a HANA system. There are two types of users: 1) Default (limited): With this type of user, there are different access methods to the database. For example, the JDBC or HTTP technologies are used to give two examples.
RSMEMORY: Dynamically Set Memory Parameters
Due to the variety of tasks and the high level of complexity, I find my job extremely exciting. There are very many constellations of SAP systems and databases. Each installation, migration and update brings new aspects and challenges. It is precisely these challenges that are important to me, so that I can continue to learn and develop professionally on a daily basis.

Then go back to the Permissions tab to generate the current profile of the permission objects. Once you have completed these steps and secured the role, it has the necessary Fiori permissions to launch the OData service-related application.

For administrators, a useful product - "Shortcut for SAP Systems" - is available in the SAP basis area.

If, due to the heavy workload, one were to decide to forgo the use of the access control lists permanently, this would be a major security vulnerability.

SAP Basis is the foundation of any SAP system. You can find a lot of useful information about it on this page: www.sap-corner.de.

This person ensures the trouble-free operation of the SAP system.
SAP Stuff
Zurück zum Seiteninhalt