Chapter 6. Back End
UNIX/OracleSolutions in this chapter
Introduction
When we speak of SAP security the topics are generally specific to the SAP application and infrequently venture into the database and operating system. In this chapter we will cover some of these other security considerations specific to the underlying database and operating systems. The topic of operating system and database security is very detailed and lengthy so we'll focus specifically on concepts as opposed to product-specific security implementation. Since there are many databases and operating systems supported by SAP, we will focus our examples specifically to the Oracle ...
Get SAP Security Configuration and Deployment now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.