Summary

We started by looking at when to use SAP HANA security and when to use an application’s security. We then went into the details of creating users and roles and assigning privileges. Along the way, we went into more details on analytic privileges, which these are particularly applicable to our modeling knowledge.

In the next chapter, we will explain how to get data from various outside sources into SAP HANA for use with your information models.