Security Guide ALE (ALE Applications)
Application Link Enabling (ALE) business processes are integrated processes across distributed systems. ALE uses IDocs (intermediate documents) or BAPIs (Business Application Programming Interface) as data transfer format between the systems.
Security Guide for Connectivity with the J2EE Engine
The J2EE Connector Architecture (JCA) enables connectivity to back-end systems such as Enterprise Information Systems (EIS), using resource adapters. The adapters are modules that are deployed on a J2EE compatible application server and provide unified access to the resource system for any application components that are also installed on the server.
Web Services Security
Security is one of the main prerequisites when using Web services in an enterprise. Security measures generally concern both the protection of individual servers through authentication, authorization, and encryption as well as the sealing off of an internal infrastructure using firewalls.
Security Guide Communication Interfaces
This section provides information on the security aspects of the Structure linkIntegrated Communication Interface (ICI), specifically the relevant security settings required for the Business Communication Broker (BCB) which is part of the ICI.
SAP System Security Under UNIX/LINUX
In the following topics, we cover the aspects pertaining to security under the UNIX or LINUX operating systems. When appropriate, we include our recommendations and any measures that you need to take.
SAP System Security Under Windows
Windows manages administration tasks and provides access protection over its domain concept. A domain is a group of several computers that share a common user and security database. Within each domain, you define and administer your users and groups.
Oracle Under UNIX
It describe the measures that you need to take on UNIX when your database is Oracle.
Oracle Under Windows
It provides an overview of the sections that describe the measures to take on Windows when your database is Oracle.
Microsoft SQL Server Under Windows
This provides an overview of the sections that describe the security measures to take for Microsoft SQL Server under Windows, as well as additional information:
IBM DB2 UDB for UNIX and Windows under UNIX
The following list provides an overview of the sections that describe the measures you take on UNIX when your database is IBM DB2 Universal Database for UNIX and Windows:
RFC/ICF Security Guide - Free eBook RFC/ICF Security Guide - Download ebook RFC/ICF Security Guide free