Sap mdg guide 1 - - PUBLIC SAP Master Data Governance Security Guide CContent SAP Master Data Governance Security Guide Introduction Before You Start Technical System Landscape User Management and Authentication User Administration User Data Synchronizati
- - PUBLIC SAP Master Data Governance Security Guide CContent SAP Master Data Governance Security Guide Introduction Before You Start Technical System Landscape User Management and Authentication User Administration User Data Synchronization Integration into Single Sign-On Environments Authorizations Network and Communication Security Communication Channel Security Network Security Communication Destinations Use of Virus Scanners Data Storage Security Enterprise Services Security Security-Relevant Logs and Tracing Segregation of Duties Authorization Objects and Roles Used by SAP Master Data Governance Authorization Objects and Roles Used by SAP MDG Consolidation and Mass Processing MDCPROOT MDCPFILT MDCMASS MDCADMIN Authorization Objects and Roles Used by SAP MDG Central Governance Master Data Governance for Business Partner CA-MDG-APP-BP Master Data Governance for Supplier CA-MDG-APP-SUP Master Data Governance for Customer CA-MDG-APP-CUS Master Data Governance for Material CA-MDG-APP-MM Master Data Governance for Financials CA-MDG-APP-FIN PUBLIC SAP Master Data Governance Security Guide Content CMaster Data Governance for Custom Objects CA-MDG-COB Change Settings of Generated MDG Database Tables Appendix SAP Master Data Governance Security Guide Content PUBLIC C SAP Master Data Governance Security Guide The following guide covers the information that you require to operate SAP Master Data Governance securely To make the information more accessible it is divided into a general part containing information relevant for all components and a separate part for information speci ?c for individual components PUBLIC SAP Master Data Governance Security Guide SAP Master Data Governance Security Guide C Introduction This guide does not replace the administration or operation guides that are available for productive operations Target Audience Technology consultants Security consultants System administrators This document is not included as part of the Installation Guides Con ?guration Guides Technical Operation Manuals or Upgrade Guides Such guides are only relevant for a certain phase of the software life cycle whereas the Security Guide provides information that is relevant for all life cycle phases Why Is Security Necessary With the increasing use of distributed systems and the Internet for managing business data the demands on security are also on the rise When using a distributed system you need to be sure that your data and processes support your business needs without allowing unauthorized access to critical information User errors negligence or attempted manipulation of your system should not result in loss of information or processing time These demands on security apply likewise to Master Data Governance To assist you in securing Master Data Governance we provide this Security Guide Since Master Data Governance is based on and uses SAP NetWeaver technology it is essential that you consult the Security Guide for SAP NetWeaver See SAP Service Marketplace at http service sap com securityguide SAP NetWeaver For all Security Guides published by SAP see SAP Service Marketplace at http service sap com securityguide Overview of the Main Sections The Security Guide comprises the following main sections Before You Start page This section contains information about why security is necessary how to use this document and references to other Security Guides that build the foundation for this Security Guide Technical System Landscape
Documents similaires
-
30
-
0
-
0
Licence et utilisation
Gratuit pour un usage personnel Attribution requise- Détails
- Publié le Apv 10, 2021
- Catégorie Administration
- Langue French
- Taille du fichier 119.5kB