0% found this document useful (0 votes)
88 views3 pages

BPC Introduction

The document provides an overview of security considerations for SAP Business Planning and Consolidation 10.1. It covers topics such as user administration, authorization concepts, network and communication security, data storage security, and other relevant security information.

Uploaded by

sheikh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
88 views3 pages

BPC Introduction

The document provides an overview of security considerations for SAP Business Planning and Consolidation 10.1. It covers topics such as user administration, authorization concepts, network and communication security, data storage security, and other relevant security information.

Uploaded by

sheikh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

1/18/2023

Security Guide for SAP Business Planning and


Consolidation 10.1, version for SAP NetWeaver
Generated on: 2023-01-18 09:23:37 GMT+0000

SAP Business Planning and Consolidation, version for SAP NetWeaver | 10.1

PUBLIC

Original content:
https://help.sap.com/docs/SAP_BUSINESS_PLANNING_AND_CONSOLIDATION,_VERSION_FOR_SAP_NETWEAVER/8314dccf627e488d9e029009a0d9e05d?
locale=en-US&state=PRODUCTION&version=10.1

Warning

This document has been generated from the SAP Help Portal and is an incomplete version of the official SAP product documentation. The information
included in custom documentation may not re ect the arrangement of topics in the SAP Help Portal, and may be missing important aspects and/or
correlations to other topics. For this reason, it is not for productive use.

For more information, please visit the https://help.sap.com/docs/disclaimer.

This is custom documentation. For more information, please visit the SAP Help Portal 1
1/18/2023

Introduction
This document is not included as part of the Installation guides, Administrator's guides, or Upgrade guides. Such guides are only relevant for a certain phase
of the software life cycle, whereas the Security guides provide information that is relevant for all life cycle phases.

In the 10.1 release, two product variations called embedded and standard are supported based on the way your installation is con gured. When information in
this guide applies to only one of the con guration types, the title of the topic contains an indicator of either (Embedded only) or (Standard only). A topic that
contains no indicator in its title applies to both the embedded and standard con guration of the application. Also, information within a single topic that
differs between the con guration types will be clearly explained within the relevant content.

 Caution
Planning and Consolidation does not store or display personal data, but does store or display items such as IP addresses and e-mail addresses. For
example, log les can contain IP addresses and the database can contain e-mail addresses. You should bear this in mind before you distribute Planning
and Consolidation log les or data to third parties.

Why is Security Necessary


With the increasing use of distributed systems and the Internet for managing business data, the demands on security are also on the rise. When using a
distributed system, you need to be sure that your data and processes support your business needs without allowing unauthorized access to critical
information. User errors, negligence, or attempted manipulation on your system should not result in loss of information or processing time. These demands
on security apply likewise to Planning and Consolidation. To assist you in securing your system, we provide this Security Guide.

Event and Noti cation (Standard only)

The event and noti cation function supports the creation of messages and their delivery as noti cations or alerts in the application framework or as e-mails.
Since messages can be sent to different users and groups and can contain hyperlinks to allow users to directly perform certain actions, security
considerations might apply, which are speci c to the scenario implemented by event and noti cation.

About This Document


The Security Guide provides an overview of the security-relevant information that applies to the system.

Overview of the Main Sections

The Security Guide comprises the following main sections:

Before You Start

This section contains references to other security guides that build the foundation for this security guide.

Technical System Landscape

This section contains a link to more information about the system landscape.

Security Overview

This section explains the initial users in the system and default authorizations. The section also provides an overview of the high-level steps needed to
establish Planning and Consolidation security.

User Administration and Authentication

This section provides an overview of the following user administration and authentication aspects:

User management

Integration into single sign-on environments

User setup (standard only)

Team setup

Authorizations

This section provides details on the authorization concept that applies to Planning and Consolidation.

Network and Communication Security

This section provides an overview of the network topology and communication protocols used by the application.

This is custom documentation. For more information, please visit the SAP Help Portal 2
1/18/2023
Data Storage Security

This section describes the security aspects involved with saving data used by the application.

Other Security-Relevant Information

This section describes other security considerations.

Dispensable Functions with Impact on Security

This section describes which functions are not absolutely necessary and how you can deactivate them.

This is custom documentation. For more information, please visit the SAP Help Portal 3

You might also like