This title introduces the security functions of SAP systems and their workings, covering SAP R/3, mySAP.com and SAP Business Warehouse. It has particular emphasis on practical recommendations for corporate security against a background of international regulations on data privacy protection.Authentication of the user at the web browser can occur in two ways with the ITS ( see Figure 4.6): 1 standard SAP logon with user ID and password 2 X.509 client certificates. In the first method, the ITS asks the user to enter the SAP user IDanbsp;...
|Title||:||Security and Data Protection with SAP Systems|
|Author||:||Werner Hornberger, Jürgen Mathias Schneider|
|Publisher||:||Addison-Wesley Professional - 2002|