<span>What is SAP Business Technology Platform, and what does it offer your organization? Answer these questions and more with this introduction! See how SAP BTP serves as your complete technical foundation and learn about its capabilities for data management, analytics, application development, int
Security and Authorizations for SAP Business Technology Platform (SAP PRESS)
β Scribed by Martin Koch, Siegfried Zeilinger
- Publisher
- SAP Press
- Tongue
- English
- Leaves
- 355
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Synopsis
Learn what it takes to protect SAP Business Technology Platform! Walk through the cloud security mechanisms of SAP BTP (formerly SAP Cloud Platform). See how to set up users and permissions for your unique circumstances and configure secure connection to cloud and on-premise systems. Work with SAP BTPβs administration tools, including the command line interface and APIs. With information on safeguarding key cloud services, this guide will leave you confident in your cloud systemβs security!
- Configure security for the Neo and Cloud Foundry environments
- Set up secure connections with the cloud connector
- Protect key cloud services like SAP Business Application Studio and SAP Integration Suite
Authorizations and Authentication
Manage authorizations using roles and user groups and set up the necessary identity providers. Walk through practical examples of authentication using two-factor authentication and Microsoft Azure Active Directory.
Secure Connections
From configuration destination to retrieving audit logs, see how to set up the cloud connector and secure your hybrid system landscapes and APIs.
Neo and Cloud Foundry
Whether your service instances are running in the Neo or Cloud Foundry environment, youβll learn all the important security configurations.
- Accounts and spaces
- Secure communication
- Identity provider
- SAP Cloud Identity Services
- SAP BTP, Neo environment
- SAP BTP, Cloud Foundry environment
- Cloud connector
- Users and roles
- APIs
- Command line
π SIMILAR VOLUMES
<span>Develop cloud applications customized for your business needs! Master the basics of SAP Business Technology Platform (SAP BTP) and its development environments; then get step-by-step instructions for developing and operating your own applications. Build your backend with Java, Node.js, or ABAP
SAP has a wide range of built-in functionality to meet various security requirements, including network protection, data protection, and SAP authorizations. This book will focus on the application of SAP authorizations and how user access can be limited by transaction codes, organizational levels, f
Work smarter with authorizations! Have you ever had an unauthorized user access something in your system that you could have sworn was off limits? Here you go: SAP PRESS equips you with Β«100 ThingsΒ» that unlock the secrets of managing your security and authorizations in SAP.
<span>Start programming your SAP applications in Visual Studio Code! This hands-on guide begins with an overview of how VS Code works and how it connects to your SAP systems. Then learn how to manage version control by integrating VS Code with Git. Follow step-by-step instructions to develop SAPUI5