SAP HANA Offers a Vast Range of Security Related Features
The security related features that SAP HANA offers are listed below:
- User and Role Management
- SAP HANA Authentication Mechanisms
- Encryption of data in Persistence Layer
- Encryption of data communication in Network
When talking about authorization, it is performed when a user attempts to link to HANA database and do certain database actions. Via JDBC and ODBC or through HTTP, if a user connects to HANA database, the system performs the authorization on its own. Privileges are granted to the user either directly or indirectly through roles. When all mandatory privileges are established, system discontinues this authorization check and provides the wished admission.
Listed below are the various sorts of privileges that are utilized in SAP HANA:
They regulate general system activities and are primarily used for administrative purposes, such as creating and changing users and roles, creating schemas, performing data backups, and managing licenses. It targets administrators and developers and is applicable to system and database.
In SAP HANA information models they are utilized to let read access to data depending on definite values or combinations of values and are evaluated during query processing. It targets end users and is applicable to analytic views.
They are utilized to authorize user and client access to their application and are granted directly to the users or roles in SAP HANA Studio. They usually target application end users and technical users and are applicable to SAP HANA XS classic applications.
They are utilized to grant access to SAP HANA database. They grant users in a specific database authorize admission to and the capability to work in packages in the source of that database simply. They target Application and content developers working in the classic SAP HANA repository and applicable to packages in the classic repository of the SAP HANA database.
They allow admission to and modification of database objects, such as tables and views. They target users like end users and technical users and are applicable to database objects.
SAP HANA authorization relates only to administrative and technical database users managed in the database. In SAP HANA, as in maximum SAP software, authorizations are collected into roles. A role is a group of authorization objects, with their related privileges which allows creators to define independent components of authorization. Thus, authorization is an integral security related feature of SAP HANA.