Prix bas
CHF108.00
Habituellement expédié sous 2 à 4 jours ouvrés.
Learn what it takes to protect SAP Business Technology Platform! Walk through the cloud security mechanisms of SAP BTP (formerly SAP Cloud Platform). See how to set up users and permissions for your unique circumstances and configure secure connection to cloud and on-premise systems. Work with SAP BTP's administration tools, including the command line interface and APIs. With information on safeguarding key cloud services, this guide will leave you confident in your cloud system's security!
In this book, you'll learn about:
a. Authorizations and Authentication
Manage authorizations using roles and user groups and set up the necessary identity providers. Walk through practical examples of authentication using two-factor authentication and Microsoft Azure Active Directory.
b. Secure Connections
From configuration destination to retrieving audit logs, see how to set up the cloud connector and secure your hybrid system landscapes and APIs.
c. Neo and Cloud Foundry
Whether your service instances are running in the Neo or Cloud Foundry environment, you'll learn all the important security configurations.
Highlights include:
1) Accounts and spaces
2) Secure communication
3) Identity provider
4) SAP Cloud Identity Services
5) SAP BTP, Neo environment
6) SAP BTP, Cloud Foundry environment
7) Cloud connector
8) Users and roles
9) APIs
10) Command line
Protect key cloud services like SAP Business Application Studio and SAP Integration Suite
Auteur
Siegfried Zeilinger is a freelancer and managing director of a small management consultancy. His focus is on consulting and security auditing of IT systems as well as authorization and identity management for SAP. His consulting portfolio ranges from SAP architecture to development strategies for ABAP, Java, and the cloud to SAP identity management. In 2016, he received certification as an IT auditor (CISA). Most recently, Siegfried has worked primarily in the pharmaceutical industry and the public sector. Before becoming self-employed in 2011, he worked for SAP Austria as an SAP NetWeaver and portal consultant and carried out major international projects. Today, he regularly conducts training courses for SAP on the topics of authorizations, SAP in the cloud, and SAP NetWeaver. From 2003 to 2019, he supervised theses at the Vienna University of Technology and the University of Applied Sciences Wiener Neustadt and held various courses in the field of SAP.
Contenu
... Preface ... 13
... The Structure of This Book ... 14
1 ... Introduction to SAP Business Technology Platform ... 17
1.1 ... Positioning ... 18
1.2 ... Environments ... 27
1.3 ... Architecture ... 35
1.4 ... Summary ... 51
2 ... SAP Business Technology Platform Security at a Glance ... 53
2.1 ... Secure Communication ... 53
2.2 ... Authentication ... 62
2.3 ... Authorizations ... 75
2.4 ... SAP Cloud Identity Services ... 77
2.5 ... SAP Cloud Identity Access Governance ... 115
2.6 ... Checklist for General Security ... 116
2.7 ... Summary ... 117
3 ... Configuring Security and Authorizations in the Neo Environment ... 119
3.1 ... Setting Up the Command Line for SAP BTP, Neo Environment ... 120
3.2 ... User Management ... 123
3.3 ... Trust Configuration ... 129
3.4 ... Authorization Management ... 139
3.5 ... Checklist for Security and Permissions in SAP BTP, Neo Environment ... 155
3.6 ... Real-World Examples of User and Authorization Management ... 155
3.7 ... Summary ... 175
4 ... Configuring Security and Authorizations in the Cloud Foundry Environment ... 177
4.1 ... Setting Up the Command Line for SAP BTP, Cloud Foundry Environment ... 178
4.2 ... User Management ... 181
4.3 ... Trust Configuration ... 183
4.4 ... Authorization Management ... 187
4.5 ... Checklist for Security and Permissions in SAP BTP, Cloud Foundry Environment ... 199
4.6 ... Real-World Examples of User and Permission Management ... 201
4.7 ... Summary ... 218
5 ... Secure Cloud Connector Configuration ... 219
5.1 ... Architecture ... 220
5.2 ... Installing and Configuring the Cloud Connector ... 223
5.3 ... Authentication Methods ... 234
5.4 ... Cloud-to-On-Premise Connections ... 236
5.5 ... Setting Up the SAP Destination Service ... 251
5.6 ... Checklist for Cloud Connector Configuration ... 255
5.7 ... Real-World Examples of Secure Cloud Connector Configuration ... 256
5.8 ... Summary ... 269
6 ... Administration Tools ... 271
6.1 ... Administering SAP BTP, Neo Environment via the Command Line ... 271
6.2 ... Managing Global Accounts via the Command Line ... 274
6.3 ... Administration via APIs ... 276
6.4 ... Checklist for Working with the Command Line and APIs ... 298
6.5 ... Real-World Examples of Using the Command Line Securely ... 299
6.6 ... Summary ... 304
7 ... Securing Key Cloud Services ... 305
7.1 ... SAP Web IDE and SAP Business Application Studio ... 306
7.2 ... Cloud Integration ... 313
7.3 ... SAP Integration Suite in SAP BTP, Cloud Foundry Environment ... 326
7.4 ... SAP Cloud Portal Service and SAP Launchpad Service ... 330
7.5 ... SAP BTP, ABAP Environment ... 335
7.6 ... Corporate User Stores ... 338
7.7 ... Checklist for Securing Cloud Services ... 342
7.8 ... Summary ... 343
... The Authors ... 345
... Index ... 347