O'Reilly logo

SAP R/3 Handbook, Third Edition, 3rd Edition by Jim Keogh, Jose Hernandez, Franklin Martinez

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

SAP Security Infrastructure

As indicated previously, SAP systems security often is only seen as the implementation of the authorization/role concept. However, SAP solutions based on open, multitiered client/server and Web-based architecture include many components that can exchange or are used for exchanging data and information with other components, applications, or systems. Each of the elements needed for the communication and exchange of information is a layer of the SAP security infrastructure also known as a security service.

Security must be addressed at all these layers. Here is an introduction to each of them; these will be further covered in following sections:

  • The presentation level is represented by all forms of front ends used for ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required