SAP Anywhere Security Guide
|
|
- Georgia Fowler
- 6 years ago
- Views:
Transcription
1 SAP Anywhere Security Guide
2 1. Document history Version Date Change Initial version for SAP Anywhere Added Personal Data Protection Information for SAP Anywhere Introduction 2.1. About this Document The Security Guide provides an overview of the security-relevant information that applies to SAP Anywhere Why is Security Necessary? With the increasing use of distributed systems and the Internet for managing business data, demands on security are also on the rise. When using a distributed system, you must ensure that your business processes do not permit unauthorized access to critical information. User errors, negligence, or attempted manipulation of your system should not result in loss of information or processing time. These security requirements apply equally to SAP Cloud solutions. To assist you in ensuring the security of your SAP Cloud solution, we provide this Security Guide Document Structure The Security Guide contains the following sections: Technical System Landscape This section describes the technical components and communication paths that are used in the solutions. User administration and Authentication This section describes the user administration tools, and the system access and authentication concept that applies to the solutions. Authorization This section describes the authorization concept of the solution. Mobile Applications This section describes mobile applications. Front-End Security This section describes the security mechanisms that apply to the front end. Security of Data Storage and Data Centers This section describes critical data that is used by the solutions, and the security mechanisms that apply. Other Security-Relevant Information This section contains information about service composition security, and internal and external audits. Security-Relevant Logging and Tracing This section describes trace and log files that contain security-relevant information, allowing you to reproduce activities if a security breach occurs.
3 3. Technical System Landscape SAP Anywhere solution is hosted in AWS US for US and UK customers, and China Telecom data center for CN customers. All data centers serving for SAP Anywhere are ANSI/TIA/EIA- 942 Tier III or Tier III+ rated facilities, and certified by ISO 9001 and ISO They provide a solid foundation to SAP Anywhere by plenty of WAN/LAN connection bandwidths and redundancies, and shield against electrical power fault, fire, natural disasters and whether shifts. They are also guarded by CCTV and access control system, ensuring unauthorized people not being able to touch computers used by SAP Anywhere. Since SAP Anywhere deal with business data from your core business processes, Sap adheres to the highest security and quality requirements, as follows: The business data is stored securely in world class data centers. Customers share physical hardware, but their data is separated into tenants. Users who require access to the business data must authenticate themselves, and their identity must be verified by user and access management. Customer data always belongs to the customers. You can access your SAP Anywhere tenant in the following ways: Desktop computer: browser-based Internet access from any network with internet access Portable computer: browser-based Internet access from any network with internet access Mobile devices: Native Apps (for details please refer to chapter 7). Industry best practices and state-of-the-art open cryptographic standards secure and protect communications between customer devices and the system landscapes of your SAP Anywhere solution in the cloud. 4. Security Aspects of Data, Data Flow and Processes 4.1 Communication Channels The table below shows the communication channels used by SAP Anywhere solutions, the protocol used for the connection, and the type of data transferred. Communication Path Web browser acting as frontend client to access the hosted SAP Anywhere system File based import and export of master data and transactional data Protocol Used HTTPS Technology Used OData & REST services Type of Data Transferred Application data HTTPS File transformation Master data, e.g. products, customers, vendors, price lists, etc. Data Requiring Special Protection User IDs, passwords Personal information on customers, vendors, etc.
4 Apple ipad applications (SAP Anywhere for ipad and SAP Anywhere Show and Sell), iphone application (SAP Anywhere Activity Stream) API based communication and application integration HTTPS OData & REST services Transactional data, e.g. sales orders, purchase orders, inventory counting, etc. Application data Business details on sales, purchase, etc. User IDs, passwords, application data SMTP, APIs SMTP server, APIs Application data Confidential data HTTPS REST services Application data Application data and API access token Note SAP Anywhere solutions use port 443 for HTTPS connectivity. 4.2 API based Communication and Application Integration API based communication and application integration refers to the exchange of businessrelated data across administrative domains. SAP Anywhere API enables you to configure the application data exchange between your tenant and a communication partner, who can be a business partner in a B2B/B2C communication scenario or an external system that is used for application integration. SAP Anywhere API provides communication scenarios for both inbound and outbound. Inbound communication defines how business documents are received from a communication partner, whereas outbound communication defines how business documents are sent to a communication partner. SAP Anywhere APIs relies on industry-standard OAuth 2.0 protocol for authentication and authorization. OAuth 2.0 focuses on client developer simplicity while providing specific authorization flows for web applications, desktop applications, mobile phone and living room devices.
5 The access token should be generated and included in the HTTP request header to access SAP Anywhere API. OAuth 2.0 access token has a validity period and expire at a defined point in time, as is 12 hours in SAP Anywhere. Note For more information about OAuth 2.0, please see Integration with Private App Private app is the integration channel, that allows you to interact with SAP Anywhere API representing your own tenant. Before using application data exchange for business process, you must create a private app for corresponding communication scenario. To authenticate with SAP Anywhere API using a private app, you need to generate the app with API key, API secret and the refresh token in Apps -> Private Apps page of the backend console, and exchange for the access token according to the guideline. The access token has a validity period of 12 hours. Before expiration, they must be renewed with above credentials. It s the customer s responsibility to protect the access token of the private app, since it reflects the specific details of their integrations scenarios and business data. Note The refresh token of the private app will expire in 3 years, which means you need to create a new app to support your business integration Integration with Public Apps Public apps are the out of the box integration applications built by 3 rd party partners, that re published to SAP Anywhere App Center. Public apps provide extensive integration scenarios to benefit customers business, interacting with SAP Anywhere API for both outbound and inbound communication. You can grant a public app to access your business data via API, by clicking the Install button upon the app to authorize; the public app will exchange for an access token with your authorization and the API key, API secret assigned to it. You can also choose to uninstall a public app in Apps -> Public Apps page, to revoke its access to your application data via API s You can use this function for communication between your system and your customers, in scenarios provided by SAP (for example, order confirmation, online shop registration). In Communication -> Predefined Templates page, you can specify which scenarios you want to use and customized the templates sent to your customers. The SMTP settings or API connection to your service should be configured in advance, in Communication -> Transactional s page. For SMTP settings, you should provide the SMTP server address, port, username and password of your service, enabling SAP Anywhere to send s from your address. You can also authorize SAP Anywhere to connect to your provider API with OAuth protocol as a more secure approach, without inputting your credentials to SAP Anywhere. If SMTP is used, try to use TLS communication protocol which is much secure than PLAIN protocol.
6 5. User Administration and Authentication 5.1 User management User management for SAP Anywhere is in the Users and Roles tab. The following table provides an overview of all activities related to user administration that you can perform as tenant administrator. View Subview Activity Roles & Create and delete roles Authorizations Define access rights in roles Setting (SAP Anywhere) Users and Roles (SAP Anywhere) Users Create and delete users Lock and unlock users Change user password Assign business roles to users Make user be and not be administrator Make user be and not be technical support user 5.2 User Type SAP Anywhere provide the following user types: User Type Description Key User The first user of a tenant, who is responsible for managing the tenant s configuration and user/role etc. Normal User A user type for normal business operation. Key user is able to create normal user as per business needs. Normal users must change their initial password during the first logon. The complexity of the password is determined by the assigned security policy. Support User A user type temporarily used by SAP Support team to access the system as part of incident processing. This kind of user can only be created from SAP Anywhere cloud operation console, and will be expired in 4 hours by default. By default support user has only readonly permission in the tenant. 5.3 User management Every user type must authenticate itself to SAP Anywhere for regular browser-based frontend access, as well as for electronic data exchange, such as Business-to-Business communication. SAP Anywhere does not support anonymous access. When a new user is created in your SAP Anywhere tenant, for example, during the hiring process of a new employee, a user ID is created. The user ID is usually the address of the new user, as SAP Anywhere will send an activation mail to the address, and new user is prompted to set logon password to SAP Anywhere.
7 5.4 Logon Using User ID and Password Users log on to SAP Anywhere with their and password. By default, users must set their initial password during the first logon. You as an tenant key user can set an initial password per the security requirements of your company. If a user has forgotten the password, he or she can request a new one by using the forgot password on the logon screen. A dialog box is displayed where the user must enter the address. Provided address has already been entered for corresponding employee in your tenant, an containing a reset password link is sent to this address. The system then allows user to reset password after clicking the link in the . The password reset link can only be used once. 6. Authorizations 6.1 Authorization Assignment Key user can assign authorizations to each normal user in same tenant of SAP Anywhere. Normal users are assigned to different roles defined by key user. The roles determine functions that the user can use. Based on these functions, business object views are proposed for the users. Some business processes require approval from employees with specific roles. If you work as a key user, you have full functions in SAP Anywhere solution. 6.2 Access Restriction key user can define whether a role has read or write access to a business object, and even create/delete new roles in role setting view. Roles have to be assigned to users in user view so that users get the authorizations. 6.3 Approval process Key user can define approval process in user and roles view. In sales order, purchase order and channel account creation process, key user can define at which stage and how to trigger approval, also who is able to approve the process of the documents. 7. Mobile Applications 7.1 General Information The following table provides information about the mobile devices on which you can run SAP Anywhere. SAP Anywhere Apps SAP Anywhere for ipad SAP Anywhere Show and Sell Device/Operating System iphone/ipad BlackBerry Android Windows Phone Y only for ipad N N N N Y only for ipad N N N Y Offline Support
8 SAP Anywhere Activity Stream Y only for iphone N N N Y Show and Sell app and Activity Stream app support offline mode on ios devices With SAP Anywhere mobile apps, you can access many of the functions that have been tailored to business on-the-run. Changes made on mobile apps are automatically updated in the system over the internet, online, and in real time. Mobile apps connect to the SAP Anywhere solutions in the same way as personal computers do. 7.2 Mobile Apps You can download the mobile apps for SAP Anywhere solutions from the itunes Store. A notification will be displayed on-device when a new version of the app is available for download. 7.3 Authorizations When you use SAP Anywhere mobile apps, you use the same backend system and logon credentials as for desktop applications. In the Settings -> Users and Roles -> Roles & Authorizations page, ensure that the permissions on relative business objects are assigned to the mobile app users, for example: Show and Sell app: Customers, Sales Orders Price Lists, Products, etc. Activity Stream app: Opportunities, Customers, Leads, Products, etc. For more information, see the Managing Roles and Authorizations in the help document center. 7.4 Secure System Access and Authentication Access from mobile devices via the native mobile apps or the device browser(html5) is enabled by connecting to the backend system using HTTPS and the same user and password authentication used for connection from a personal computer. The offline mode for Show and Sell app and Activity Stream app is enabled by default, that no extra configuration is required. You should set up a PIN (personal identification number) code of 4 digits for Show and Sell app and SAP Anywhere for ipad app, and a pattern lock for Activity Stream app after logon using your user name and password, to accelerate your access to the apps without entering your full credentials. 7.5 Change and Reset of Password, PIN Code and Pattern Lock You can only change your password from web browser. Change password: Enter your current password firstly and create a new one in Profile page. Rest password: If you forgot your password, you must reset it using your logon for verification by clicking Forgot password link in the logon page. Password expiration: Your password will expire in 180 days, and you need to create a new one as promoted during logon process.
9 Please note that in above cases, your logon credentials in the apps are deleted; you must enter the updated password and reset the PIN code/pattern lock to use SAP Anywhere mobile apps. Your user name and password will not be persisted in the mobile apps for security concern, instead a security token is generated once your credentials are verified. The security token is stored in the apps and will be valid for 4 weeks; you need to input your user name, password and set up the PIN code or pattern lock again after it s expired. 7.6 Special Considerations Unlike stationary personal computers, mobile devices are at greater risk of being lost or stolen. Therefore, we recommend that you use the security features provided by your mobile device platform. For example: Use an additional, sufficiently long, PIN (personal identification number) to lock the device. Enable remote management software that allows you to lock the device remotely, or wipe data from it. For information on how to operate your mobile device, refer to the device manufacturer s documentation. 7.7 Data Storage The mobile apps for SAP Anywhere store 3 types of data on the mobile device, as outlined below Credentials Retention When logging on to SAP Anywhere from a mobile app, the user is required to provide the user ID and system password. The mobile apps do not store this data, and instead a security token is generated from the backed once the credentials are verified, representing the user s logon session. The security token is encrypted and stored on the mobile device, using the secure storage features provided by the operating system of that device. The security token will be valid for 4 weeks, and user is required to input his user name and password again after it s expired. PIN code or pattern lock will be set up by users after logon, which are also encrypted and stored in secure storage of the mobile devices Cache Files It is sometimes possible to upload pictures and other files from the mobile device to SAP Anywhere mobile apps, for example, pictures captured on a mobile phone s camera. The pictures captured within the apps will not be stored in album of the mobile device; but the files uploaded from the album or the storage of the device are not managed through the SAP mobile apps. To protected sensitive or confidential data that such files may contain, we recommend that you take extra precautions appropriate for the specific mobile device in use. For more information, see the device manufacturer s documentation Offline Mode and Data Encryption For Show and Sell app and Activity Stream app on which offline mode is supported, data is stored on the device and encrypted using SQLCipher. Once the device is online, data is synchronized with the backend system.
10 8. Front-End Security SAP Anywhere front ends consist of Web application user interfaces based on HTML5 technology. HTML is a markup language for the Web. HTML allows you to format text, add graphics, create links, input forms, frames and tables, and save it all in a text file that any browser can read and display. The following features that HTML5 supports are used in SAP Anywhere: X-Frame-options response header to avoid clickjacking attacks Cross-site request forgery (CSRF) protection Cross-site scripting (XSS) protection during rendering For more information, see the security information for HTML5. 9. Other Security-Relevant Information 9.1 Security Management and Continuous Improvement of Security Security Management at SAP Cloud Solutions aims towards the continual improvement of the information security framework. SAP conducts several external audits to make sure that these aims are reached. Certificate/Report Interval Conducted By External penetration test Once a year Third-party security company Internal validation Quarterly SAP security validation Code Scan Daily Industry standard scanning tools PCI DSS Level 1 Once a year Accredited auditing company 10. Personal Data Protection Information 10.1 What is Personal Data? Personal data shall mean any information relating to an identified or identifiable natural person ('data subject'). An identifiable person is one who can be identified, directly or indirectly, according to an identification number or to one or more factors specific to his or her physical, physiological, mental, economic, cultural, or social identity. Personal data in the SAP Anywhere solution is configured on the Customizing Business Objects page (Settings -> Setup -> Customizing Business Objects). To categorize a field as personal data, in the CRM area, select the relevant module (Lead, Contact, or Customer) and click Fields. In the list of fields, click the relevant field, and in the Edit System Field page, indicate if the particular field contains personal data or not. Only fields with Text type can be marked as personal data. This functionality is available only to Key Users Identifying a Natural Person in the System The Search functionality can be used to identify a natural person in the system. The functionality is available to all system users. The search is performed on the following fields across all business objects: First Name
11 Last Name Remark Phone Cellphone Fax Website Created By / Updated By When searching for a natural person, additional information such as the date of the specific order and amount on the specific order can help narrow down the search. For further actions, the customer identifier that can be found in the Customers page is required Maintaining Personal Data in the CRM Menu Personal data of leads, customers, and contacts can be maintained in the CRM menu, in the following modules: Leads Contacts Customers The fields in these modules allow you to update personal data, such as the delivery address or mobile phone number, based on a customer request. Personal data can also be deleted by leaving the field blank. Documents already issued retain the personal data that was valid at the time of document creation. The association between the customer and document is maintained even after the personal data is deleted Reports on Personal Data According to the data protection initiative, a natural person should be able to obtain a report of all the personal data related to the natural person stored in the system. In SAP Anywhere, this information is provided in the Personal Data Report, which displays all personal data stored in business objects with fields marked as personal data. The report is accessible to Key Users only and can be found in Settings -> Customer Service -> Customer Personal Data Reports. Created reports can also viewed in the Personal Data Reports page. After opening the report, personal data can then be erased Personal Data Retention Period The retention period on a business object specifies how long the business objects will retain the personal data after the data is deleted from the CRM menu. If a natural person initiates the deletion of personal data, the data will be retained until the retention period for the business object expires. The retention period setting can be found in Settings > Customer Service -> Customer Personal Data Retention Rule. The feature is accessible to Key Users only. The retention period is specified in days in numeric format and the default value is 0 days for all business objects. The retention period can be set for the following business objects: Credit Memo Invoice Payment Prepayment Sales Delivery Sales Order
12 Sales Return Shipment 11. Important Disclaimers on Legal Aspects This document is for informational purposes only. Its content is subject to change without notice, and SAP does not warrant that it is error-free. SAP MAKES NO WARRANTIES, EXPRESS OR IMPLIED, OR OF MERCHANTABILITY, OR FITNESS FOR A PARTICULAR PURPOSE. Coding Samples Any software coding and/or code lines / strings ("Code") included in this documentation are only examples and are not intended to be used in a productive system environment. The Code is only intended to better explain and visualize the syntax and phrasing rules of certain coding. SAP does not warrant the correctness and completeness of the Code given herein, and SAP shall not be liable for errors or damages caused by the usage of the Code, unless damages were caused by SAP intentionally or by SAP's gross negligence. Accessibility The information contained in the SAP documentation represents SAP's current view of accessibility criteria as of the date of publication; it is in no way intended to be a binding guideline on how to ensure accessibility of software products. SAP specifically disclaims any liability with respect to this document and no contractual obligations or commitments are formed either directly or indirectly by this document. Gender-Neutral Language As far as possible, SAP documentation is gender neutral. Depending on the context, the reader is addressed directly with "you", or a gender-neutral noun (such as "sales person" or "working days") is used. If when referring to members of both sexes, however, the thirdperson singular cannot be avoided or a gender-neutral noun does not exist, SAP reserves the right to use the masculine form of the noun and pronoun. This is to ensure that the documentation remains comprehensible. Internet Hyperlinks The SAP documentation may contain hyperlinks to the Internet. These hyperlinks are intended to serve as a hint about where to find related information. SAP does not warrant the availability and correctness of this related information or the ability of this information to serve a particular purpose. SAP shall not be liable for any damages caused by the use of related information unless damages have been caused by SAP's gross negligence or willful misconduct. Regarding link classification, see: help.sap.com/disclaimer.
Afaria Document Version: Windows Phone Enterprise Client Signing
Afaria Document Version: 1-2014-04-04 Windows Phone Enterprise Client Signing Table of Contents 1 Signing Afaria Enterprise Client for Windows Phone Devices...3 1.1 Creating a Developer Account.... 4 1.2
More informationSAP Workforce Performance Builder 9.5
Security Guide Workforce Performance Builder Document Version: 1.0 2016-07-15 2016 SAP SE or an SAP affiliate company. All rights reserved. CUSTOMER Producer Table of Contents 1 Introduction... 3 2 SSL
More informationSAP Vora - AWS Marketplace Production Edition Reference Guide
SAP Vora - AWS Marketplace Production Edition Reference Guide 1. Introduction 2 1.1. SAP Vora 2 1.2. SAP Vora Production Edition in Amazon Web Services 2 1.2.1. Vora Cluster Composition 3 1.2.2. Ambari
More informationSecurity Guide SAP Supplier InfoNet
SAP Supplier InfoNet Table of Contents 1 About this document....3 2 Network and communication security....4 2.1 Network security....4 2.2 Communication channel security....4 2.3 Network resource security....4
More informationSystem Requirements and Technical Prerequisites for SAP SuccessFactors HCM Suite
System Requirements and Technical Prerequisites for SAP SuccessFactors HCM Suite SAP SuccessFactors HCM Suite is a fully web-based offering. You will need an Internet connection and a system that meets
More informationSAP Enable Now What s New. WHAT S NEW PUBLIC Version 1.0, Feature Pack SAP Enable Now What s New. Introduction PUBLIC 1
WHAT S NEW PUBLIC Version 1.0, Feature Pack 1902 20.02.2019 2019 SAP SE or an SAP affiliate company. All rights reserved. Introduction PUBLIC 1 Table of Contents Introduction... 4 Further Information...
More informationSAP Workforce Performance Builder 9.5
Upgrade Guide Workforce Performance Builder Document Version: 1.0 2016-10-15 2016 SAP SE or an SAP affiliate company. All rights reserved. CUSTOMER Table of Contents 1 Introduction... 3 2 Migrating a Workarea...
More informationCreating RFC Destinations
Configuration Guide Information Collaboration Hub for Life Sciences Document Version: 1.1 Released to Customer Date: SAP Information Collaboration Hub for Life Sciences Typographic Conventions Type Style
More informationSAP Enable Now. Desktop Components (Cloud Edition)
Installation Guide 1704 SP1 Document Version: 1.0 2017-07-15 2017 SAP SE or an SAP affiliate company. All rights reserved. CUSTOMER Desktop Components (Cloud Edition) Table of Contents 1 Introduction...
More informationATTP Settings for ATTP to ATTP Connection
Configuration Guide SAP Information Collaboration Hub for Life Sciences Document Version: 1.2 Final Date 2017-10-18 SAP Information Collaboration Hub for Life Sciences Document History Version Date Change
More informationNon-SAP Backend System Readiness Check
Configuration Guide SAP Information Collaboration Hub for Life Sciences Document Version: 1.1 Final Date: SAP Information Collaboration Hub for Life Sciences Typographic Conventions Type Style Example
More informationConfiguring Client Keystore for Web Services
Configuration Guide SAP Information Collaboration Hub for Life Sciences Document Version: 1.1 Released to Customer Date: Non-SAP Backend System on SAP Information Collaboration Hub for Life Sciences Typographic
More informationSAP IoT Application Enablement Reuse Components and Templates
User Guide Document Version: 1.25.0 2017-01-19 PUBLIC SAP IoT Application Enablement Reuse Components and Templates Content 1 Reuse Components and Templates....3 1.1 IoT Application Enablement Reuse Components....
More informationVERSION 1.0, FEATURE PACK What s New SAP Enable Now
VERSION 1.0, FEATURE PACK 1805 CUSTOMER What s New SAP Enable Now Table of Contents Introduction... 4 Further Information... 4 General Changes... 5 New Bubbles... 5 Toolbox Download... 5 Edit Tables...
More information1704 SP2 CUSTOMER. What s New SAP Enable Now
1704 SP2 CUSTOMER What s New SAP Table of Contents Introduction... 4 Further Information... 4 General Changes... 5 Create New Object Assistant... 5 Object Palettes... 5 Info Center Access... 6 Interactive
More informationSAP Workforce Performance Builder
Additional Guides Workforce Performance Builder Document Version: 1.0 2016-07-15 2016 SAP SE or an SAP affiliate company. All rights reserved. CUSTOMER SAP Help Extension ECC Table of Contents 1 Introduction...
More informationADDITIONAL GUIDES Customer SAP Enable Now System Requirements Customer
2019 SAP SE or an SAP affiliate company. All rights reserved. ADDITIONAL GUIDES Customer 1902 2019-02-01 Customer Table of Contents 1 Introduction... 3 1.1 What is the Cloud Edition?... 4 1.2 Cloud Edition
More informationMaster Guide for SAP HANA Smart Data Integration and SAP HANA Smart Data Quality
PUBLIC SAP HANA Platform SPS 12 Document Version: 1.0 2016-05-11 Master Guide for Data Integration and Content 1 Getting Started....3 1.1 Overview.... 3 1.2 About This Document.... 4 2 Use Cases....5 3
More informationConfiguring the Web Service Runtime for ATTP
Configuration Guide Document Version: 1.0 Final Date: SAP Backend Systems on the SAP Pharma Network Typographic Conventions Type Style Example Description Words or characters quoted from the screen. These
More informationPUBLIC DQM Microservices Blueprints User's Guide
SAP Data Services Document Version: 4.2 Support Package 8 (14.2.8.0) 2017-02-27 PUBLIC Content 1 Introduction.... 3 1.1 Documentation set for SAP Data Services content objects.... 3 1.2 SAP information
More informationSAP Enable Now. System Requirements
Additional Guides Enable Now Document Version: 1.0 2017-04-15 2017 SAP SE or an SAP affiliate company. All rights reserved. CUSTOMER System Requirements Table of Contents 1 Introduction... 3 2 Producer
More informationDevelopment Information Document Version: CUSTOMER. ABAP for Key Users
Development Information Document Version: 1.0 2015-11-30 Typographic Conventions Type Style Example Description Words or characters quoted from the screen. These include field names, screen titles, pushbuttons
More informationPUBLIC SAP Vora Sizing Guide
SAP Vora 2.0 Document Version: 1.1 2017-11-14 PUBLIC Content 1 Introduction to SAP Vora....3 1.1 System Architecture....5 2 Factors That Influence Performance....6 3 Sizing Fundamentals and Terminology....7
More informationCUSTOMER SAP Afaria Overview
SAP Afaria 7 SP17 Document Version: 1.0 2016-08-07 CUSTOMER Content 1 Afaria Overview....3 1.1 About Afaria....3 1.2 Afaria Access and Support....4 1.3 Finding Information....5 2 Afaria Architecture....7
More informationCUSTOMER Upgrade: SAP Mobile Platform SDK for Mac OS
SAP Mobile Platform 3.0 SP05 Document Version: 1.0-2014-09-05 CUSTOMER Upgrade: SAP Mobile Platform SDK for Mac OS Table of Contents 1.... 3 2 Upgrading SAP Mobile Platform 3.0 SDK to SP05....4 2.1 Acquiring
More informationManual 1704 Document Version: SAP SE or an SAP affiliate company. All rights reserved. PUBLIC. SAP Enable Now.
Manual 1704 Document Version: 1.0 2017-04-15 2017 SAP SE or an SAP affiliate company. All rights reserved. PUBLIC Instant Producer Table of Contents 1 Introduction... 3 2 Starting the Instant Producer...
More informationPUBLIC Rapid Deployment Guide
SAP Data Services Document Version: 4.2 Support Package 8 (14.2.8.0) 2017-01-18 PUBLIC Content 1 Introduction.... 3 1.1 Documentation set for SAP Data Services....3 2 Deployment environment requirements....
More informationHow-to Guide for Exercise Access the Demo Appliance Landscape (Week 1, Unit 6, Part 1)
How-to Guide for Exercise Access the Demo Appliance Landscape (Week 1, Unit 6, Part 1) Table of Contents Important note:... 1 Introduction to CAL... 2 Introduction to AWS... 2 Exercise overview... 2 Creating
More informationWhat's New in SAP HANA Smart Data Streaming (Release Notes)
PUBLIC SAP HANA Smart Data Streaming 2.0 SP 00 Document Version: 1.0 2016-11-30 What's New in SAP HANA Smart Data Streaming (Release Notes) Content 1 What's New in SAP HANA Smart Data Streaming 2.0 (Release
More informationSAP Workforce Performance Builder 9.5
Installation Guide Workforce Performance Builder Document Version: 1.0 2016-07-15 2016 SAP SE or an SAP affiliate company. All rights reserved. CUSTOMER Navigator Table of Contents 1 Introduction... 3
More informationSAP Enable Now. Desktop Assistant
Installation Guide 1704 SP1 Document Version: 1.0 2017-07-15 2017 SAP SE or an SAP affiliate company. All rights reserved. CUSTOMER Desktop Assistant Table of Contents 1 Introduction... 3 2 System Requirements...
More informationSAP Global Track and Trace Onboarding Guide
SAP Global Track and Trace Onboarding Guide Document Version: Cloud 2019.04a Implementation Guide PUBLIC TABLE OF CONTENTS 1 INTRODUCTION... 3 1.1 Prerequisite... 3 1.2 Overview... 3 2 SET UP AN SAP CLOUD
More informationConfiguring the SAP Cryptolibrary on the ABAP Application Server
Configuration Guide Document Version: 1.0 Final Date: Configuring the SAP Cryptolibrary on the ABAP Application Server Sap Backend Systems on the SAP Pharma Network Typographic Conventions Type Style Example
More informationAdvanced Reporting in the Online Report Designer Administration Guide
SuccessFactors HCM Suite November 2014 Release Version: 1.0 - December 5, 2014 CUSTOMER Advanced Reporting in the Online Report Designer Administration Guide Content 1 Change History....3 2 Overview....4
More informationThe SAP Concur mobile app (Android / iphone / ipad)
The SAP Concur mobile app (Android / iphone / ipad) Questions General Information and Requirements... 1 1. How is the SAP Concur mobile app useful?... 1 2. Does the mobile app offer the same functionality
More informationSalesforce1 Mobile Security White Paper. Revised: April 2014
Salesforce1 Mobile Security White Paper Revised: April 2014 Table of Contents Introduction Salesforce1 Architecture Overview Authorization and Permissions Communication Security Authentication OAuth Pairing
More informationProjectplace: A Secure Project Collaboration Solution
Solution brief Projectplace: A Secure Project Collaboration Solution The security of your information is as critical as your business is dynamic. That s why we built Projectplace on a foundation of the
More informationSIMSme Management Cockpit Documentation
Introduction SIMSme Management Cockpit Documentation Version 2.1 February 2018 Table of Contents 1 INTRODUCTION... 2 2 USERS... 3 3 LICENSES... 5 4 GROUPS... 7 5 CHANNELS... 8 6 DASHBOARD...10 7 APP SETTINGS...12
More informationSecurity Information for SAP Asset Strategy and Performance Management
Master Guide SAP Asset Strategy and Performance Management Document Version: 2.0 2018-03-09 Security Information for SAP Asset Strategy and Performance Management Typographic Conventions Type Style Example
More informationAn Oracle White Paper September Security and the Oracle Database Cloud Service
An Oracle White Paper September 2012 Security and the Oracle Database Cloud Service 1 Table of Contents Overview... 3 Security architecture... 4 User areas... 4 Accounts... 4 Identity Domains... 4 Database
More informationTwo-Factor Authentication over Mobile: Simplifying Security and Authentication
SAP Thought Leadership Paper SAP Digital Interconnect Two-Factor Authentication over Mobile: Simplifying Security and Authentication Controlling Fraud and Validating End Users Easily and Cost-Effectively
More information<Criminal Justice Agency Name> Personally Owned Device Policy. Allowed Personally Owned Device Policy
Policy Title: Effective Date: Revision Date: Approval(s): LASO: CSO: Agency Head: Allowed Personally Owned Device Policy Every 2 years or as needed Purpose: A personally owned information system or device
More informationXerox Connect App for Blackboard
Xerox Connect App for Blackboard Information Assurance Disclosure Additional information, if needed, on one or more lines Month 00, 0000 2018 Xerox Corporation. All rights reserved. Xerox,
More informationKenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data
Kenna Platform Security A technical overview of the comprehensive security measures Kenna uses to protect your data V3.0, MAY 2017 Multiple Layers of Protection Overview Password Salted-Hash Thank you
More informationedocument for Italy - SAP Cloud Platform Integration Guide
IMPLEMENTATION GUIDE PUBLIC 2018-12-14 edocument for Italy - SAP Cloud Platform Integration Guide 2018 SAP SE or an SAP affiliate company. All rights reserved. THE BEST RUN Content 1 Introduction....3
More informationVSP16. Venafi Security Professional 16 Course 04 April 2016
VSP16 Venafi Security Professional 16 Course 04 April 2016 VSP16 Prerequisites Course intended for: IT Professionals who interact with Digital Certificates Also appropriate for: Enterprise Security Officers
More informationWater ExChange Customer Manual
Water ExChange Customer Manual 1-800-383-0834 www.epcor.com Terms of Use 2016, Flowpoint Environmental Systems All rights reserved. This software and related documentation are provided under a license
More informationPartner Center: Secure application model
Partner Center: Secure application model The information provided in this document is provided "as is" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including
More informationBox Competitive Sheet January 2014
This document is a comparison of file sharing and collaboration capabilities offered by Soonr Workplace and Box. Narrative is provided when there is no direct comparison between the capabilities or when
More informationOctober J. Polycom Cloud Services Portal
October 2018 3725-42461-001J Polycom Cloud Services Portal Copyright 2018, Polycom, Inc. All rights reserved. No part of this document may be reproduced, translated into another language or format, or
More informationSAP IoT Application Enablement Best Practices Authorization Guide
SAP IoT Application Enablement Best Practices Authorization Guide TABLE OF CONTENTS 1 INITIAL TENANT SETUP... 3 1.1 Configure Trust... 3 1.1.1 Technical Background... 6 1.2 Establish Trust... 6 1.3 Set
More informationWater Exchange Customer Manual
Water Exchange Customer Manual Flowpoint Environmental Systems Toll Free: 1-877-655-5585 http://flowpointsystems.com/ Version 2.0 August 2016 Terms of Use 2016, Flowpoint Environmental Systems All rights
More informationSophos Mobile Control startup guide. Product version: 7
Sophos Mobile Control startup guide Product version: 7 Contents 1 About this guide...4 2 About Sophos Mobile Control...5 3 Sophos Mobile Control licenses...7 3.1 Trial licenses...7 3.2 Upgrade trial licenses
More informationedocument for Hungary Invoice Registration - SAP Cloud Platform Integration Guide (SAP S/ 4HANA Cloud)
PUBLIC 2018-10-24 edocument for Hungary Invoice Registration - SAP Cloud Platform Integration Guide (SAP S/ 2018 SAP SE or an SAP affiliate company. All rights reserved. THE BEST RUN Content 1 Introduciton....3
More informationThis paper introduces the security policies, practices, and procedures of Lucidchart.
Lucidchart Security Abstract This paper introduces the security policies, practices, and procedures of Lucidchart. The paper lays out the architecture security of this software-as-a-service product. It
More informationAnchor User Guide. Presented by: Last Revised: August 07, 2017
Anchor User Guide Presented by: Last Revised: August 07, 2017 TABLE OF CONTENTS GETTING STARTED... 1 How to Log In to the Web Portal... 1 How to Manage Account Settings... 2 How to Configure Two-Step Authentication...
More informationDSS User Guide. End User Guide. - i -
DSS User Guide End User Guide - i - DSS User Guide Table of Contents End User Guide... 1 Table of Contents... 2 Part 1: Getting Started... 1 How to Log in to the Web Portal... 1 How to Manage Account Settings...
More informationWHITE PAPER Cloud FastPath: A Highly Secure Data Transfer Solution
WHITE PAPER Cloud FastPath: A Highly Secure Data Transfer Solution Tervela helps companies move large volumes of sensitive data safely and securely over network distances great and small. We have been
More informationSAP Single Sign-On 2.0 Overview Presentation
SAP Single Sign-On 2.0 Overview Presentation June 2014 Public Legal disclaimer This presentation is not subject to your license agreement or any other agreement with SAP. SAP has no obligation to pursue
More informationSecure Login for SAP Single Sign-On Sizing Guide
PUBLIC SAP Single Sign-On Document Version: 1.1 2018-07-31 Secure Login for SAP Single Sign-On 3.0 - Sizing Guide 2018 SAP SE or an SAP affiliate company. All rights reserved. THE BEST RUN Content 1 Introduction....3
More informationMozy. Administrator Guide
Mozy Administrator Guide Preface 2017 Mozy, Inc. All rights reserved. Information in this document is subject to change without notice. The software described in this document is furnished under a license
More informationSECURITY & PRIVACY DOCUMENTATION
Okta s Commitment to Security & Privacy SECURITY & PRIVACY DOCUMENTATION (last updated September 15, 2017) Okta is committed to achieving and preserving the trust of our customers, by providing a comprehensive
More informationEnsuring Desktop Central Compliance to Payment Card Industry (PCI) Data Security Standard
Ensuring Desktop Central Compliance to Payment Card Industry (PCI) Data Security Standard Introduction Manage Engine Desktop Central is part of ManageEngine family that represents entire IT infrastructure
More informationSophos Mobile Control Administrator guide. Product version: 5.1
Sophos Mobile Control Administrator guide Product version: 5.1 Document date: June 2015 Contents 1 About Sophos Mobile Control...5 1.1 Sophos Mobile Control on premise and as a Service...5 1.2 About this
More informationINCREASE APPLICATION SECURITY FOR PCI DSS VERSION 3.1 SUCCESS AKAMAI SOLUTIONS BRIEF INCREASE APPLICATION SECURITY FOR PCI DSS VERSION 3.
INCREASE APPLICATION SECURITY FOR PCI DSS VERSION 3.1 SUCCESS Protect Critical Enterprise Applications and Cardholder Information with Enterprise Application Access Scope and Audience This guide is for
More informationSync User Guide. Powered by Axient Anchor
Sync Powered by Axient Anchor TABLE OF CONTENTS End... Error! Bookmark not defined. Last Revised: Wednesday, October 10, 2018... Error! Bookmark not defined. Table of Contents... 2 Getting Started... 7
More informationSophos Mobile. startup guide. Product Version: 8.1
Sophos Mobile startup guide Product Version: 8.1 Contents About this guide... 1 Sophos Mobile licenses... 2 Trial licenses...2 Upgrade trial licenses to full licenses... 2 Update licenses... 2 What are
More informationOracle Mobile Application Framework
Oracle Mobile Application Framework Oracle Mobile Application Framework (Oracle MAF) is a hybrid-mobile development framework that enables development teams to rapidly develop single-source applications
More informationColligo Briefcase. for Good Technology. Administrator Guide
for Good Technology Administrator Guide Contents Introduction... 2 Target Audience... 2 Overview... 2 Key Features... 2 Platforms Supported... 2 SharePoint Security & Privileges... 3 for Good Technology...
More informationDreamFactory Security Guide
DreamFactory Security Guide This white paper is designed to provide security information about DreamFactory. The sections below discuss the inherently secure characteristics of the platform and the explicit
More informationMobile ios Configuration Guide
Mobile ios Configuration Guide Version 23 SP-WX-MBLIOS-CG-201807--R023.00 Sage 2018. All rights reserved. This document contains information proprietary to Sage and may not be reproduced, disclosed, or
More informationMobile ios Configuration Guide
Mobile ios Configuration Guide Version 21 SP-WX-MBLIOS-CG-201801--R021.00 Sage 2018. All rights reserved. This document contains information proprietary to Sage and may not be reproduced, disclosed, or
More informationEnd User Manual. December 2014 V1.0
End User Manual December 2014 V1.0 Contents Getting Started... 4 How to Log into the Web Portal... 5 How to Manage Account Settings... 6 The Web Portal... 8 How to Upload Files in the Web Portal... 9 How
More informationDocument Cloud (including Adobe Sign) Additional Terms of Use. Last updated June 5, Replaces all prior versions.
Document Cloud (including Adobe Sign) Additional Terms of Use Last updated June 5, 2018. Replaces all prior versions. These Additional Terms govern your use of Document Cloud (including Adobe Sign) and
More informationIAM. Shopping Cart. IAM Description PM OM CM IF. CE SC USM Common Web CMS Reporting. Review & Share. Omnichannel Frontend...
PM OM CM IF IAM CE SC USM Common Web CMS Reporting IAM Description The identity & access management (IAM) provides functions such as account information management, role permission management, access control
More informationNotifyMDM Device Application User Guide Installation and Configuration for Android
NotifyMDM Device Application User Guide Installation and Configuration for Android NotifyMDM for Android, Version 3.x NotifyMDM for Android 1 Table of Contents NotifyMDM for Android 3 Installation Instructions
More informationSecurity Specification
Security Specification Security Specification Table of contents 1. Overview 2. Zero-knowledge cryptosystem a. The master password b. Secure user authentication c. Host-proof hosting d. Two-factor authentication
More informationAdministrator Guide. Find out how to set up and use MyKerio to centralize and unify your Kerio software administration.
Administrator Guide Find out how to set up and use MyKerio to centralize and unify your Kerio software administration. The information and content in this document is provided for informational purposes
More informationSystem Administrator s Guide Login. Updated: May 2018 Version: 2.4
System Administrator s Guide Login Updated: May 2018 Version: 2.4 Contents CONTENTS... 2 WHAT S NEW IN THIS VERSION 2018R1 RELEASE... 4 Password Retrieval via Email (GDPR Alignment)... 4 Self-Registration
More informationPA-DSS Implementation Guide for Sage MAS 90 and 200 ERP. and Sage MAS 90 and 200 Extended Enterprise Suite
for Sage MAS 90 and 200 ERP Versions 4.30.0.18 and 4.40.0.1 and Sage MAS 90 and 200 Extended Enterprise Suite Versions 1.3 with Sage MAS 90 and 200 ERP 4.30.0.18 and 1.4 with Sage MAS 90 and 200 ERP 4.40.0.1
More informationAwareness Technologies Systems Security. PHONE: (888)
Awareness Technologies Systems Security Physical Facility Specifications At Awareness Technologies, the security of our customers data is paramount. The following information from our provider Amazon Web
More informationBeam Technologies Inc. Privacy Policy
Beam Technologies Inc. Privacy Policy Introduction Beam Technologies Inc., Beam Dental Insurance Services LLC, Beam Insurance Administrators LLC, Beam Perks LLC, and Beam Insurance Services LLC, (collectively,
More informationSAP Security in a Hybrid World. Kiran Kola
SAP Security in a Hybrid World Kiran Kola Agenda Cybersecurity SAP Cloud Platform Identity Provisioning service SAP Cloud Platform Identity Authentication service SAP Cloud Connector & how to achieve Principal
More informationGmail Integration for Salesforce and Dynamics 365
Gmail Integration for Salesforce and Dynamics 365 PRIVACY POLICY LAST MODIFIED: MARCH 12, 2019 2019 Introduction Welcome to Gmail Integration for Salesforce and Dynamics 365, a service provided by Akvelon,
More informationA company built on security
Security How we handle security at Flywheel Flywheel was founded in 2012 on a mission to create an exceptional platform to help creatives do their best work. As the leading WordPress hosting provider for
More informationGoogle Cloud Platform: Customer Responsibility Matrix. December 2018
Google Cloud Platform: Customer Responsibility Matrix December 2018 Introduction 3 Definitions 4 PCI DSS Responsibility Matrix 5 Requirement 1 : Install and Maintain a Firewall Configuration to Protect
More informationBechtel Partner Access User Guide
Bechtel Partner Access User Guide IMPORTANT: For help with this process, please contact the IS&T Service Center or your local IS&T support group: IS&T Service Center Phone: +1-571-392-6767 US Only +1 (800)
More informationOracle Taleo Cloud for Midsize (Taleo Business Edition)
Oracle Taleo Cloud for Midsize (Taleo Business Edition) Release 18B What s New TABLE OF CONTENTS REVISION HISTORY... 3 OVERVIEW... 4 RELEASE FEATURE SUMMARY... 4 PLATFORM ENHANCEMENTS... 5 Password Settings...
More informationOne Identity Manager 8.0. Administration Guide for Connecting to a Universal Cloud Interface
One Identity Manager 8.0 Administration Guide for Connecting to a Copyright 2017 One Identity LLC. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software
More informationLiveEngage Secure Form. Document Version: 1.2 June 2018
Document Version: 1.2 June 2018 Contents Introduction... 3 Secure Form Benefits... 3 European Security Standards... 3 When to Use the LiveEngage Secure Form...4 PCI-DSS Compliance... 4 How it Works...
More informationI, J, K. Lightweight directory access protocol (LDAP), 162
Index A Access Control, 183 Administration console, 17 home page, 17 managing instances, 19 managing requests, 18 managing workspaces, 19 monitoring activity, 19 Advanced security option (ASO), 58, 262
More informationSalesforce Classic Guide for iphone
Salesforce Classic Guide for iphone Version 35.0, Winter 16 @salesforcedocs Last updated: October 27, 2015 Copyright 2000 2015 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark
More informationCloud Operations for Oracle Cloud Machine ORACLE WHITE PAPER MARCH 2017
Cloud Operations for Oracle Cloud Machine ORACLE WHITE PAPER MARCH 2017 Disclaimer The following is intended to outline our general product direction. It is intended for information purposes only, and
More information1.1. HOW TO START? 1.2. ACCESS THE APP
Table of Contents 1. Get Started 1.1. How to start? 1.2. Access the app 1.3. Username and password 2. Mobile Banking features 3. Security 4. Accounts and inquiries 5. Transfers and beneficiaries 6. Charges
More informationLiveEngage Messaging Platform: Security Overview Document Version: 2.0 July 2017
LiveEngage Messaging Platform: Security Overview Document Version: 2.0 July 2017 Contents Introduction... 3 Supported Platforms... 3 Protecting Data in Transit... 3 Protecting Data at Rest... 3 Encryption...
More informationSAP Jam Communities What's New 1808 THE BEST RUN. PUBLIC Document Version: August
PUBLIC Document Version: August 2018 2018-10-26 2018 SAP SE or an SAP affiliate company. All rights reserved. THE BEST RUN Content 1 Release Highlights....3 1.1 Anonymous access to public communities....4
More informationWebSphere Puts Business In Motion. Put People In Motion With Mobile Apps
WebSphere Puts Business In Motion Put People In Motion With Mobile Apps Use Mobile Apps To Create New Revenue Opportunities A clothing store increases sales through personalized offers Customers can scan
More informationCreating Application Definitions in Hana Cloud Platform Mobile Services
SAP Hana Cloud Platform Mobile Services How-To Guide Provided by SAP s Technology RIG Creating Application Definitions in Hana Cloud Platform Mobile Services Applicable Releases: Platform Mobile Services
More informationGRS Enterprise Synchronization Tool
GRS Enterprise Synchronization Tool Last Revised: Thursday, April 05, 2018 Page i TABLE OF CONTENTS Anchor End User Guide... Error! Bookmark not defined. Last Revised: Monday, March 12, 2018... 1 Table
More informationBring Your Own Device
Bring Your Own Device Individual Liable User Contents Introduction 3 Policy Document Objectives & Legal Disclaimer 3 Eligibility Considerations 4 Reimbursement Considerations 4 Security Considerations
More information