Share
Fr. 116.00
Martin Koch, Siegfried Zeilinger
Security and Authorizations for SAP Business Technology Platform
English · Hardback
Shipping usually within 4 to 7 working days
Description
Learn what it takes to protect SAP Business Technology Platform! Walk through the cloud security mechanisms of SAP BTP (formerly SAP Cloud Platform). See how to set up users and permissions for your unique circumstances and configure secure connection to cloud and on-premise systems. Work with SAP BTP's administration tools, including the command line interface and APIs. With information on safeguarding key cloud services, this guide will leave you confident in your cloud system's security!
In this book, you'll learn about:
a. Authorizations and Authentication
Manage authorizations using roles and user groups and set up the necessary identity providers. Walk through practical examples of authentication using two-factor authentication and Microsoft Azure Active Directory.
b. Secure Connections
From configuration destination to retrieving audit logs, see how to set up the cloud connector and secure your hybrid system landscapes and APIs.
c. Neo and Cloud Foundry
Whether your service instances are running in the Neo or Cloud Foundry environment, you'll learn all the important security configurations.
Highlights include:
1) Accounts and spaces
2) Secure communication
3) Identity provider
4) SAP Cloud Identity Services
5) SAP BTP, Neo environment
6) SAP BTP, Cloud Foundry environment
7) Cloud connector
8) Users and roles
9) APIs
10) Command line
List of contents
... Preface ... 13
... The Structure of This Book ... 14
1 ... Introduction to SAP Business Technology Platform ... 17
1.1 ... Positioning ... 18
1.2 ... Environments ... 27
1.3 ... Architecture ... 35
1.4 ... Summary ... 51
2 ... SAP Business Technology Platform Security at a Glance ... 53
2.1 ... Secure Communication ... 53
2.2 ... Authentication ... 62
2.3 ... Authorizations ... 75
2.4 ... SAP Cloud Identity Services ... 77
2.5 ... SAP Cloud Identity Access Governance ... 115
2.6 ... Checklist for General Security ... 116
2.7 ... Summary ... 117
3 ... Configuring Security and Authorizations in the Neo Environment ... 119
3.1 ... Setting Up the Command Line for SAP BTP, Neo Environment ... 120
3.2 ... User Management ... 123
3.3 ... Trust Configuration ... 129
3.4 ... Authorization Management ... 139
3.5 ... Checklist for Security and Permissions in SAP BTP, Neo Environment ... 155
3.6 ... Real-World Examples of User and Authorization Management ... 155
3.7 ... Summary ... 175
4 ... Configuring Security and Authorizations in the Cloud Foundry Environment ... 177
4.1 ... Setting Up the Command Line for SAP BTP, Cloud Foundry Environment ... 178
4.2 ... User Management ... 181
4.3 ... Trust Configuration ... 183
4.4 ... Authorization Management ... 187
4.5 ... Checklist for Security and Permissions in SAP BTP, Cloud Foundry Environment ... 199
4.6 ... Real-World Examples of User and Permission Management ... 201
4.7 ... Summary ... 218
5 ... Secure Cloud Connector Configuration ... 219
5.1 ... Architecture ... 220
5.2 ... Installing and Configuring the Cloud Connector ... 223
5.3 ... Authentication Methods ... 234
5.4 ... Cloud-to-On-Premise Connections ... 236
5.5 ... Setting Up the SAP Destination Service ... 251
5.6 ... Checklist for Cloud Connector Configuration ... 255
5.7 ... Real-World Examples of Secure Cloud Connector Configuration ... 256
5.8 ... Summary ... 269
6 ... Administration Tools ... 271
6.1 ... Administering SAP BTP, Neo Environment via the Command Line ... 271
6.2 ... Managing Global Accounts via the Command Line ... 274
6.3 ... Administration via APIs ... 276
6.4 ... Checklist for Working with the Command Line and APIs ... 298
6.5 ... Real-World Examples of Using the Command Line Securely ... 299
6.6 ... Summary ... 304
7 ... Securing Key Cloud Services ... 305
7.1 ... SAP Web IDE and SAP Business Application Studio ... 306
7.2 ... Cloud Integration ... 313
7.3 ... SAP Integration Suite in SAP BTP, Cloud Foundry Environment ... 326
7.4 ... SAP Cloud Portal Service and SAP Launchpad Service ... 330
7.5 ... SAP BTP, ABAP Environment ... 335
7.6 ... Corporate User Stores ... 338
7.7 ... Checklist for Securing Cloud Services ... 342
7.8 ... Summary ... 343
... The Authors ... 345
... Index ... 347
About the author
Martin Koch is the managing director of CloudDNA GmbH, an SAP partner in Austria. He and his team conduct training for SAP and have developed four of their own training courses on the topics of SAPUI5, SAP Fiori, cloud integration, and cloud security, which are listed in the SAP training catalog. In addition to his work as a trainer, Martin Koch works as an architect, consultant, and developer for international SAP customers of all company sizes.
Originally trained as an airline pilot and air traffic controller, he participated in a trainee program at SAP Austria in 2007. There, he initially worked on the topics of integration and SAP NetWeaver AS for Java. In 2010, his focus shifted to mobile applications in the SAP environment. After several projects on the architecture, security, and development of mobile solutions, in 2012, Martin Koch focused on SAP HANA, SAPUI5, SAP Fiori, and SAP Business Technology Platform.Siegfried Zeilinger is a freelancer and managing director of a small management consultancy. His focus is on consulting and security auditing of IT systems as well as authorization and identity management for SAP. His consulting portfolio ranges from SAP architecture to development strategies for ABAP, Java, and the cloud to SAP identity management. In 2016, he received certification as an IT auditor (CISA). Most recently, Siegfried has worked primarily in the pharmaceutical industry and the public sector.
Before becoming self-employed in 2011, he worked for SAP Austria as an SAP NetWeaver and portal consultant and carried out major international projects. Today, he regularly conducts training courses for SAP on the topics of authorizations, SAP in the cloud, and SAP NetWeaver. From 2003 to 2019, he supervised theses at the Vienna University of Technology and the University of Applied Sciences Wiener Neustadt and held various courses in the field of SAP.
Summary
Learn what it takes to protect SAP Business Technology Platform! Walk through the cloud security mechanisms of SAP BTP (formerly SAP Cloud Platform). See how to set up users and permissions for your unique circumstances and configure secure connection to cloud and on-premise systems. Work with SAP BTP’s administration tools, including the command line interface and APIs. With information on safeguarding key cloud services, this guide will leave you confident in your cloud system’s security!
In this book, you’ll learn about:
a. Authorizations and Authentication
Manage authorizations using roles and user groups and set up the necessary identity providers. Walk through practical examples of authentication using two-factor authentication and Microsoft Azure Active Directory.
b. Secure Connections
From configuration destination to retrieving audit logs, see how to set up the cloud connector and secure your hybrid system landscapes and APIs.
c. Neo and Cloud Foundry
Whether your service instances are running in the Neo or Cloud Foundry environment, you’ll learn all the important security configurations.
Highlights include:
1) Accounts and spaces
2) Secure communication
3) Identity provider
4) SAP Cloud Identity Services
5) SAP BTP, Neo environment
6) SAP BTP, Cloud Foundry environment
7) Cloud connector
8) Users and roles
9) APIs
10) Command line
Product details
Authors | Martin Koch, Siegfried Zeilinger |
Publisher | Rheinwerk Verlag |
Languages | English |
Product format | Hardback |
Released | 05.04.2023 |
EAN | 9781493223558 |
ISBN | 978-1-4932-2355-8 |
No. of pages | 355 |
Dimensions | 189 mm x 26 mm x 261 mm |
Weight | 900 g |
Series |
SAP PRESS Englisch |
Subjects |
Natural sciences, medicine, IT, technology
> IT, data processing
> Data communication, networks
SAP Cloud Platform, SAP CP, SAP HANA Cloud Platform, SAP HCP, SCP, Cloud Connector, SAP BTP, Neo environment, Secure communication, SAP BTP, Cloud Foundry environment |
Customer reviews
No reviews have been written for this item yet. Write the first review and be helpful to other users when they decide on a purchase.
Write a review
Thumbs up or thumbs down? Write your own review.