1/18/2023
Security Guide for SAP Business Planning and
Consolidation 10.1, version for SAP NetWeaver
Generated on: 2023-01-18 09:23:37 GMT+0000
SAP Business Planning and Consolidation, version for SAP NetWeaver | 10.1
PUBLIC
Original content:
https://help.sap.com/docs/SAP_BUSINESS_PLANNING_AND_CONSOLIDATION,_VERSION_FOR_SAP_NETWEAVER/8314dccf627e488d9e029009a0d9e05d?
locale=en-US&state=PRODUCTION&version=10.1
Warning
This document has been generated from the SAP Help Portal and is an incomplete version of the official SAP product documentation. The information
included in custom documentation may not re ect the arrangement of topics in the SAP Help Portal, and may be missing important aspects and/or
correlations to other topics. For this reason, it is not for productive use.
For more information, please visit the https://help.sap.com/docs/disclaimer.
This is custom documentation. For more information, please visit the SAP Help Portal 1
1/18/2023
Introduction
This document is not included as part of the Installation guides, Administrator's guides, or Upgrade guides. Such guides are only relevant for a certain phase
of the software life cycle, whereas the Security guides provide information that is relevant for all life cycle phases.
In the 10.1 release, two product variations called embedded and standard are supported based on the way your installation is con gured. When information in
this guide applies to only one of the con guration types, the title of the topic contains an indicator of either (Embedded only) or (Standard only). A topic that
contains no indicator in its title applies to both the embedded and standard con guration of the application. Also, information within a single topic that
differs between the con guration types will be clearly explained within the relevant content.
Caution
Planning and Consolidation does not store or display personal data, but does store or display items such as IP addresses and e-mail addresses. For
example, log les can contain IP addresses and the database can contain e-mail addresses. You should bear this in mind before you distribute Planning
and Consolidation log les or data to third parties.
Why is Security Necessary
With the increasing use of distributed systems and the Internet for managing business data, the demands on security are also on the rise. When using a
distributed system, you need to be sure that your data and processes support your business needs without allowing unauthorized access to critical
information. User errors, negligence, or attempted manipulation on your system should not result in loss of information or processing time. These demands
on security apply likewise to Planning and Consolidation. To assist you in securing your system, we provide this Security Guide.
Event and Noti cation (Standard only)
The event and noti cation function supports the creation of messages and their delivery as noti cations or alerts in the application framework or as e-mails.
Since messages can be sent to different users and groups and can contain hyperlinks to allow users to directly perform certain actions, security
considerations might apply, which are speci c to the scenario implemented by event and noti cation.
About This Document
The Security Guide provides an overview of the security-relevant information that applies to the system.
Overview of the Main Sections
The Security Guide comprises the following main sections:
Before You Start
This section contains references to other security guides that build the foundation for this security guide.
Technical System Landscape
This section contains a link to more information about the system landscape.
Security Overview
This section explains the initial users in the system and default authorizations. The section also provides an overview of the high-level steps needed to
establish Planning and Consolidation security.
User Administration and Authentication
This section provides an overview of the following user administration and authentication aspects:
User management
Integration into single sign-on environments
User setup (standard only)
Team setup
Authorizations
This section provides details on the authorization concept that applies to Planning and Consolidation.
Network and Communication Security
This section provides an overview of the network topology and communication protocols used by the application.
This is custom documentation. For more information, please visit the SAP Help Portal 2
1/18/2023
Data Storage Security
This section describes the security aspects involved with saving data used by the application.
Other Security-Relevant Information
This section describes other security considerations.
Dispensable Functions with Impact on Security
This section describes which functions are not absolutely necessary and how you can deactivate them.
This is custom documentation. For more information, please visit the SAP Help Portal 3