SAP HANA Database Authorization Concept and Check

The user groups using the SAP HANA database often changes. Many more user groups (particularly developers) are operating in SAP HANA databases. What is new in SAP S/4HANA is that the need for access to the SAP HANA database is mostly limited to developers (for example, for mixed, complex modeling in BW), as users use analytical Fiori apps.

We are available to discuss these access requirements with you in workshops meant to clarify security relevant aspects of your overall user role system depending on the application scenario. We support you in mapping security relevant aspects in a role concept and in creating an effective control environment in SAP HANA. If you’re already using SAP HANA, we will help you assess your situation, identify optimization potential, and establish best practice approaches.

Your Contact

Erik Trouillet
SAP HANA
[email protected]

Are you interested in our HANA services?

Contact us for a non-binding offer!

SAP HANA Services in Detail

Your Challenge

If your answer is “yes” to one or more of the following questions, the SAP HANA Services developed by Xiting can be of great value:

We help you to analyze these questions in order to gain a better understanding of the concepts above – regardless of whether you use SAP HANA for an ERP 6.0 or SAP S/4HANA.

Our Solution

With the aid of SAP HANA Services developed by Xiting, we clearly explain the different tools for administration and management. We present the advantages and disadvantages of SAP HANA Cockpit, Web IDE and SAP HANA Studio, and show you which authorizations are required. We explain what role the SAP HANA Extended Application Services (XS Classic/XS Advanced) play, and how to deal with them from an authorization and compliance point of view. We support you in setting up and implementing the authorization roles in your SAP
HANA database, or if it already exists, in assessing the quality of your SAP HANA authorization concept.

Authorization administrators must be able to create roles, manage password rules and user (groups), and track down authorization problems. Our services provide you with the necessary know-how and help you master these challenges.

We help you to be optimally prepared for emergency situations, as well as to meet the recommendations of SAP to block critical users, such as SYSTEM. We will show you what contribution the XAMS can have when it comes to quality assurance of the role concept, emergency user management and risk analysis.

SAP HANA Services

Best Practice Workshop

Authorization Concept

Security Check

Ruleset

Contact

Get in touch with us!

Do you have questions about our products?

+41 43 422 8803
[email protected]
+49 7656 8999 002
[email protected]
+1 855 594 84 64
[email protected]
+44 1454 838 785
[email protected]
Contact
Webinars

Attend our live webinars and learn more from our experts about SAP authorizations, XAMS, SAP IDM and many other topics in the context of SAP security.

Register now