1.2    Security Areas in SAP HANA Cockpit

Up to this point in the chapter, we’ve discussed the architecture of the SAP HANA cockpit, including deployment options. We’ve explored the SAP HANA cockpit manager and described the high-level steps required to set up users, resource groups, and registered systems. Finally, we provided high-level information about how you can access a registered system in the SAP HANA cockpit and then access a registered system’s System Overview page. On the System Overview page, you can filter the various options available using the Filter by Area dropdown list. For the purposes of managing security, we’ll find most options in this area.

The security area provides tiles and links to the Data Encryption, Auditing, Authentication, Security Related Links, User & Role Management, and Anonymization Report areas. In the next section, we’ll provide a high-level overview of each area and describe how you’ll use these areas to manage an SAP HANA security model.

1.2.1    User & Role Management Area

The User & Role Management area provides several links, such as the Manage Users, Assign roles to users, Assign privileges to users, Manage roles, Manage user groups, and View database object dependencies links, as shown in Figure 1.11.

The User & Role Management Tile in SAP HANA Cockpit

Figure 1.11    The User & Role Management Tile in SAP HANA Cockpit

The following list outlines what each link in this tile is used for. In subsequent chapters, we’ll demonstrate these items in more detail. However, in this chapter, we’ll only provide a basic overview of each link. Let’s briefly look at each link:

In the next section, we’ll explore the Data Encryption tile and its links.

1.2.2    Data Encryption

You’ll use the Data Encryption tile and its links to manage data encryption options for data at rest. The tile itself contains slider buttons where you can quickly enable or disable (ON or OFF) Data Volume Encryption, Redo Log Encryption, and Backup Encryption, as shown in Figure 1.12.

Data Encryption Tile and Links in SAP HANA Cockpit

Figure 1.12    Data Encryption Tile and Links in SAP HANA Cockpit

In addition to using the sliders, each item can be clicked, including the tile’s title, to navigate to additional options for each item in the Data Encryption configuration interface. We’ll discuss this interface and these options in more detail in Chapter 13. You should now have a basic understanding of how to access the Data Encryption tile and of the options it offers for managing an SAP HANA security model. In the next section, we’ll explore the Authentication tile and links.

1.2.3    Authentication

You’ll use the Authentication tile and its links to manage password policies, single sign-on (SSO), and the SYSTEM user’s password. The links in this tile (Password Policy, Single Sign-On, and SYSTEM User Password) can be clicked to manage each specific area, as shown in Figure 1.13.

Authentication Tile and Links in SAP HANA Cockpit

Figure 1.13    Authentication Tile and Links in SAP HANA Cockpit

In Chapter 12, we’ll discuss these link options in more detail. You should now have a basic understanding of how to access the Authentication tile and the options available when managing an SAP HANA security model. In the next section, we’ll explore the Security Related Links tile and its links.

1.2.4    Security Related Links

You’ll use the Security Related Links tile and its links to manage several security-related items SAP HANA database, as shown in Figure 1.14.

Security Related Links Tile and Links in SAP HANA Cockpit

Figure 1.14    Security Related Links Tile and Links in SAP HANA Cockpit

Let’s explore the purpose and intended use of each link in more detail:

You should now have a basic understanding of how to access the Security Related Links tile and the options it offers when managing an SAP HANA Security model. In the next section, we’ll explore the Anonymization Report tile and its links.

1.2.5    Anonymization Report

Starting with SAP HANA 2.0 SPS 04, you can define SQL views for anonymizing data when the data is queried based on a variety of parameters and methods. Views protected with the functionality are called anonymization views. You can use Anonymization Report tile and link to access the View Available Anonymization Views link navigating you to the Anonymization Report interface. On the Anonymization Report interface, you’ll see a list of catalog views where this feature is enabled. You can click on each listed view to view read-only information about the Anonymization Parameters and method that have been applied to the view.

Note that you can apply this feature to a view using SQL statements or when developing a calculation view with SAP Web IDE for SAP HANA. You cannot create these views using the SAP HANA cockpit at this time.

You should now have a basic understanding of how to access the Anonymization Report tile and the options it offers when managing an SAP HANA security model. In the next section, we’ll explore the Auditing tile and its links.

1.2.6    Auditing

The Auditing tile and its links can be used to access audit settings and to configure audit policies within the SAP HANA database. Audit polices, as discussed further in Chapter 15, are used to track specific actions within the SAP HANA database. All the links in this tile can be clicked, including the Auditing header, which navigates you to the Auditing configuration interface, as shown in Figure 1.15.

Auditing Tile and Links in SAP HANA Cockpit

Figure 1.15    Auditing Tile and Links in SAP HANA Cockpit

The Status link; the Audit Trail Target link; the Enabled Audit Policies link, which includes a summary of the enabled polices; and the Disabled Audit Policies link, which also includes a summary, can be clicked to take you directly to the corresponding setting in the Auditing configuration interface. At the bottom of the tiles is Turn on Auditing link, which will enable the auditing mechanism.

You should now have a basic understanding of how to access the Auditing configuration interface using the Auditing tile and the links options it provides. We’ve concluded our high-level overview of the tiles and links that the SAP HANA cockpit provides for managing security. Subsequent chapters will provide additional information on how to use each tile and their links to manage your SAP HANA security mode.

In the next section, we’ll explore the SAP HANA database explorer and the SQL console, both important tool sets within the SAP HANA cockpit. As you’ll discover, you’ll need to use these tools to explore the database and to execute SQL statements, all of which are necessary to manage an SAP HANA security model.