Zum Hauptinhalt springen
Dekorationsartikel gehören nicht zum Leistungsumfang.
Security and Authorizations for SAP Business Technology Platform
Buch von Martin Koch (u. a.)
Sprache: Englisch

78,90 €*

inkl. MwSt.

Versandkostenfrei per Post / DHL

auf Lager, Lieferzeit 1-2 Werktage

Kategorien:
Beschreibung

Learn what it takes to protect SAP Business Technology Platform! Walk through the cloud security mechanisms of SAP BTP (formerly SAP Cloud Platform). See how to set up users and permissions for your unique circumstances and configure secure connection to cloud and on-premise systems. Work with SAP BTP's administration tools, including the command line interface and APIs. With information on safeguarding key cloud services, this guide will leave you confident in your cloud system's security!

In this book, you'll learn about:

a. Authorizations and Authentication
Manage authorizations using roles and user groups and set up the necessary identity providers. Walk through practical examples of authentication using two-factor authentication and Microsoft Azure Active Directory.
b. Secure Connections
From configuration destination to retrieving audit logs, see how to set up the cloud connector and secure your hybrid system landscapes and APIs.
c. Neo and Cloud Foundry
Whether your service instances are running in the Neo or Cloud Foundry environment, you'll learn all the important security configurations.

Highlights include:

1) Accounts and spaces
2) Secure communication
3) Identity provider
4) SAP Cloud Identity Services
5) SAP BTP, Neo environment
6) SAP BTP, Cloud Foundry environment
7) Cloud connector
8) Users and roles
9) APIs
10) Command line

Learn what it takes to protect SAP Business Technology Platform! Walk through the cloud security mechanisms of SAP BTP (formerly SAP Cloud Platform). See how to set up users and permissions for your unique circumstances and configure secure connection to cloud and on-premise systems. Work with SAP BTP's administration tools, including the command line interface and APIs. With information on safeguarding key cloud services, this guide will leave you confident in your cloud system's security!

In this book, you'll learn about:

a. Authorizations and Authentication
Manage authorizations using roles and user groups and set up the necessary identity providers. Walk through practical examples of authentication using two-factor authentication and Microsoft Azure Active Directory.
b. Secure Connections
From configuration destination to retrieving audit logs, see how to set up the cloud connector and secure your hybrid system landscapes and APIs.
c. Neo and Cloud Foundry
Whether your service instances are running in the Neo or Cloud Foundry environment, you'll learn all the important security configurations.

Highlights include:

1) Accounts and spaces
2) Secure communication
3) Identity provider
4) SAP Cloud Identity Services
5) SAP BTP, Neo environment
6) SAP BTP, Cloud Foundry environment
7) Cloud connector
8) Users and roles
9) APIs
10) Command line

Über den Autor
Martin Koch is the managing director of CloudDNA GmbH, an SAP partner in Austria. He and his team conduct training for SAP and have developed four of their own training courses on the topics of SAPUI5, SAP Fiori, cloud integration, and cloud security, which are listed in the SAP training catalog. In addition to his work as a trainer, Martin Koch works as an architect, consultant, and developer for international SAP customers of all company sizes.

Originally trained as an airline pilot and air traffic controller, he participated in a trainee program at SAP Austria in 2007. There, he initially worked on the topics of integration and SAP NetWeaver AS for Java. In 2010, his focus shifted to mobile applications in the SAP environment. After several projects on the architecture, security, and development of mobile solutions, in 2012, Martin Koch focused on SAP HANA, SAPUI5, SAP Fiori, and SAP Business Technology Platform.
Zusammenfassung
Protect key cloud services like SAP Business Application Studio and SAP Integration Suite
Inhaltsverzeichnis
... Preface ... 13

... The Structure of This Book ... 14

1 ... Introduction to SAP Business Technology Platform ... 17

1.1 ... Positioning ... 18

1.2 ... Environments ... 27

1.3 ... Architecture ... 35

1.4 ... Summary ... 51

2 ... SAP Business Technology Platform Security at a Glance ... 53

2.1 ... Secure Communication ... 53

2.2 ... Authentication ... 62

2.3 ... Authorizations ... 75

2.4 ... SAP Cloud Identity Services ... 77

2.5 ... SAP Cloud Identity Access Governance ... 115

2.6 ... Checklist for General Security ... 116

2.7 ... Summary ... 117

3 ... Configuring Security and Authorizations in the Neo Environment ... 119

3.1 ... Setting Up the Command Line for SAP BTP, Neo Environment ... 120

3.2 ... User Management ... 123

3.3 ... Trust Configuration ... 129

3.4 ... Authorization Management ... 139

3.5 ... Checklist for Security and Permissions in SAP BTP, Neo Environment ... 155

3.6 ... Real-World Examples of User and Authorization Management ... 155

3.7 ... Summary ... 175

4 ... Configuring Security and Authorizations in the Cloud Foundry Environment ... 177

4.1 ... Setting Up the Command Line for SAP BTP, Cloud Foundry Environment ... 178

4.2 ... User Management ... 181

4.3 ... Trust Configuration ... 183

4.4 ... Authorization Management ... 187

4.5 ... Checklist for Security and Permissions in SAP BTP, Cloud Foundry Environment ... 199

4.6 ... Real-World Examples of User and Permission Management ... 201

4.7 ... Summary ... 218

5 ... Secure Cloud Connector Configuration ... 219

5.1 ... Architecture ... 220

5.2 ... Installing and Configuring the Cloud Connector ... 223

5.3 ... Authentication Methods ... 234

5.4 ... Cloud-to-On-Premise Connections ... 236

5.5 ... Setting Up the SAP Destination Service ... 251

5.6 ... Checklist for Cloud Connector Configuration ... 255

5.7 ... Real-World Examples of Secure Cloud Connector Configuration ... 256

5.8 ... Summary ... 269

6 ... Administration Tools ... 271

6.1 ... Administering SAP BTP, Neo Environment via the Command Line ... 271

6.2 ... Managing Global Accounts via the Command Line ... 274

6.3 ... Administration via APIs ... 276

6.4 ... Checklist for Working with the Command Line and APIs ... 298

6.5 ... Real-World Examples of Using the Command Line Securely ... 299

6.6 ... Summary ... 304

7 ... Securing Key Cloud Services ... 305

7.1 ... SAP Web IDE and SAP Business Application Studio ... 306

7.2 ... Cloud Integration ... 313

7.3 ... SAP Integration Suite in SAP BTP, Cloud Foundry Environment ... 326

7.4 ... SAP Cloud Portal Service and SAP Launchpad Service ... 330

7.5 ... SAP BTP, ABAP Environment ... 335

7.6 ... Corporate User Stores ... 338

7.7 ... Checklist for Securing Cloud Services ... 342

7.8 ... Summary ... 343

... The Authors ... 345

... Index ... 347
Details
Erscheinungsjahr: 2023
Fachbereich: Datenkommunikation, Netze & Mailboxen
Genre: Informatik
Rubrik: Naturwissenschaften & Technik
Medium: Buch
Reihe: SAP Press Englisch
Inhalt: 355 S.
ISBN-13: 9781493223558
ISBN-10: 1493223550
Sprache: Englisch
Herstellernummer: 459/22355
Einband: Gebunden
Autor: Koch, Martin
Zeilinger, Siegfried
Hersteller: Rheinwerk Verlag GmbH
Rheinwerk Publishing Inc.
Maße: 258 x 183 x 28 mm
Von/Mit: Martin Koch (u. a.)
Erscheinungsdatum: 07.04.2023
Gewicht: 0,902 kg
Artikel-ID: 123015564
Über den Autor
Martin Koch is the managing director of CloudDNA GmbH, an SAP partner in Austria. He and his team conduct training for SAP and have developed four of their own training courses on the topics of SAPUI5, SAP Fiori, cloud integration, and cloud security, which are listed in the SAP training catalog. In addition to his work as a trainer, Martin Koch works as an architect, consultant, and developer for international SAP customers of all company sizes.

Originally trained as an airline pilot and air traffic controller, he participated in a trainee program at SAP Austria in 2007. There, he initially worked on the topics of integration and SAP NetWeaver AS for Java. In 2010, his focus shifted to mobile applications in the SAP environment. After several projects on the architecture, security, and development of mobile solutions, in 2012, Martin Koch focused on SAP HANA, SAPUI5, SAP Fiori, and SAP Business Technology Platform.
Zusammenfassung
Protect key cloud services like SAP Business Application Studio and SAP Integration Suite
Inhaltsverzeichnis
... Preface ... 13

... The Structure of This Book ... 14

1 ... Introduction to SAP Business Technology Platform ... 17

1.1 ... Positioning ... 18

1.2 ... Environments ... 27

1.3 ... Architecture ... 35

1.4 ... Summary ... 51

2 ... SAP Business Technology Platform Security at a Glance ... 53

2.1 ... Secure Communication ... 53

2.2 ... Authentication ... 62

2.3 ... Authorizations ... 75

2.4 ... SAP Cloud Identity Services ... 77

2.5 ... SAP Cloud Identity Access Governance ... 115

2.6 ... Checklist for General Security ... 116

2.7 ... Summary ... 117

3 ... Configuring Security and Authorizations in the Neo Environment ... 119

3.1 ... Setting Up the Command Line for SAP BTP, Neo Environment ... 120

3.2 ... User Management ... 123

3.3 ... Trust Configuration ... 129

3.4 ... Authorization Management ... 139

3.5 ... Checklist for Security and Permissions in SAP BTP, Neo Environment ... 155

3.6 ... Real-World Examples of User and Authorization Management ... 155

3.7 ... Summary ... 175

4 ... Configuring Security and Authorizations in the Cloud Foundry Environment ... 177

4.1 ... Setting Up the Command Line for SAP BTP, Cloud Foundry Environment ... 178

4.2 ... User Management ... 181

4.3 ... Trust Configuration ... 183

4.4 ... Authorization Management ... 187

4.5 ... Checklist for Security and Permissions in SAP BTP, Cloud Foundry Environment ... 199

4.6 ... Real-World Examples of User and Permission Management ... 201

4.7 ... Summary ... 218

5 ... Secure Cloud Connector Configuration ... 219

5.1 ... Architecture ... 220

5.2 ... Installing and Configuring the Cloud Connector ... 223

5.3 ... Authentication Methods ... 234

5.4 ... Cloud-to-On-Premise Connections ... 236

5.5 ... Setting Up the SAP Destination Service ... 251

5.6 ... Checklist for Cloud Connector Configuration ... 255

5.7 ... Real-World Examples of Secure Cloud Connector Configuration ... 256

5.8 ... Summary ... 269

6 ... Administration Tools ... 271

6.1 ... Administering SAP BTP, Neo Environment via the Command Line ... 271

6.2 ... Managing Global Accounts via the Command Line ... 274

6.3 ... Administration via APIs ... 276

6.4 ... Checklist for Working with the Command Line and APIs ... 298

6.5 ... Real-World Examples of Using the Command Line Securely ... 299

6.6 ... Summary ... 304

7 ... Securing Key Cloud Services ... 305

7.1 ... SAP Web IDE and SAP Business Application Studio ... 306

7.2 ... Cloud Integration ... 313

7.3 ... SAP Integration Suite in SAP BTP, Cloud Foundry Environment ... 326

7.4 ... SAP Cloud Portal Service and SAP Launchpad Service ... 330

7.5 ... SAP BTP, ABAP Environment ... 335

7.6 ... Corporate User Stores ... 338

7.7 ... Checklist for Securing Cloud Services ... 342

7.8 ... Summary ... 343

... The Authors ... 345

... Index ... 347
Details
Erscheinungsjahr: 2023
Fachbereich: Datenkommunikation, Netze & Mailboxen
Genre: Informatik
Rubrik: Naturwissenschaften & Technik
Medium: Buch
Reihe: SAP Press Englisch
Inhalt: 355 S.
ISBN-13: 9781493223558
ISBN-10: 1493223550
Sprache: Englisch
Herstellernummer: 459/22355
Einband: Gebunden
Autor: Koch, Martin
Zeilinger, Siegfried
Hersteller: Rheinwerk Verlag GmbH
Rheinwerk Publishing Inc.
Maße: 258 x 183 x 28 mm
Von/Mit: Martin Koch (u. a.)
Erscheinungsdatum: 07.04.2023
Gewicht: 0,902 kg
Artikel-ID: 123015564
Warnhinweis

Ähnliche Produkte

Ähnliche Produkte