The following sql command will show details for all sap hana users with. How to create Distribution List via SAP Business Workplace?
SAP HANA Security is protecting important data from unauthorized access and ensures that the standards and compliance meet as security standard adopted by the company.
SAP HANA provides a facility i.e. Multitenant database, in which multiple databases can be created on single SAP HANA System. It is known as multitenant database container. So SAP HANA provide all security related feature for all multitenant database container.
SAP HANA Provide following security-related feature –
SAP HANA User and Role
SAP HANA User and Role management configuration depend on the architecture as below –
SAP HANA can be used as a relational database in a 3-Tier Architecture.
In this architecture, security features (authorization, authentication, encryption, and auditing) are installed on application server layers.
SAP application (ERP, BW, etc.) connects to database only with the help of a technical user or database administrator (Basis Person). The end-user cannot directly access to database or database server.
SAP HANA Extended Application Services (SAP HANA XS) is based on 2 –Tier Architecture, in which Application server, Web Server and Development Environment are embedded in a single system.
Database user identifies who is accessing the SAP HANA Database. It is verified through a process Named 'Authentication.' SAP HANA support many authentication methods. Single Sign-on (SSO) are used to integrate several Authentication method.
SAP HANA supports following authentication method -
Photoshop cc lite portable. When the user enters their database username and password, then SAP HANA Database authenticate the user.
SAML can be used to authenticate SAP HANA User, who is accessing SAP HANA Database directly through ODBC/JDBC. It is a process of mapping external user identity to the internal database user, so user can login in sap database with the external user id.
The user can be authenticated by Logon or Assertion Tickets, which is configured and issued to the user for creating a ticket.
When SAP HANA XS Access by HTTP, Client certificates signed by a trusted Certification authority (CA) can be used to authenticate the user.
SAP HANA Authorization is required when a user using client interface (JDBC, ODBC, or HTTP) to access the SAP HANA database.
Depending on the authorization provided to the user, it can perform database operations on the database object. This authorization is called, 'privileges.'
The Privileges can be granted to the user directly or indirectly (through roles). All Privileges assign to users are combined as a single unit.
When a user tries to access any SAP HANA Database object, HANA System performs authorization check on the user through user roles and directly grants the privileges.
When requested Privileges found, HANA system skips further checks and grant access to request database objects.
In SAP HANA following privileges are their -Privileges Types | Description |
System Privileges | It controls normal system activity. System Privileges are mainly used for –
|
Object Privileges | Object Privileges are SQL privileges that are used to give authorization to read and modify database objects. To access database objects user needs object privileges on database objects or on the schema in which database object exists. Object privileges can be granted to catalog objects (table, view, etc.) or non-catalog objects (development objects). Object Privileges are as below –
|
Analytic Privileges | Analytic Privileges are used to allow read access on data of SAP HANA Information model (attribute view, Analytic View, calculation View).
|
Package Privileges | Package Privileges are used to provide authorization for actions on individual packages in SAP HANA Repository. |
Application Privileges | Application Privileges are required in In SAP HANA Extended Application Services (SAP HANA XS) for access application. Application privileges are granted and revoked through the proceduresGRANT_APPLICATION_PRIVILEGE and REVOKE_APPLICATION_PRIVILEGE procedure in the _SYS_REPO schema. |
Privileges on User | It is an SQL Privileges, which can grant by the user on own user. ATTACH DEBUGGER is the only privilege that can be granted to a user. |
To Access SAP HANA Database, users are required. Depending on the different security policy there are two types of user in SAP HANA as below –
These users are created for an administrative task such as creating an object and granting privileges on database object or on the application.
SAP HANA Database system provides following user by default as standard user–
There are two types of Database user as below –
User Type | Description | Role assigned |
Standard User | This user can create objects in an own schema and reads data in system views. Standard User created with 'CREATE USER' statement. | PUBLIC role is assigned for read system views. |
Restricted User | Restricted User has no full SQL Access via an SQL Console and created with 'CREATE RESTRICTED USER' statement. If Privileges required for use of any application, then they are provided through the role.
| RESTRICTED_USER_ODBC_ACCESS or RESTRICTED_USER_JDBC_ACCESS role required to user for Full Access of ODBC/JDBC functionality |
SAP HANA User Administrator have access to the following activity –
Step 1) To create new user in SAP HANA Studio go to security tab as shown below and follow the following steps;
Step 2) A user creation screen appear.
By Clicking on the deploy Button user will be created.
2. Define and Create Role
A role is a collection of privileges that can be granted to other users or role. The role includes privileges for database object & application and depending on the nature of the job.
It is a standard mechanism to grant privileges. Privileges can be directly granted to the user. There are many standard roles (e.g. MODELLING, MONITORING, etc.) available in SAP HANA database.
We can use the standard role as a template for creating a custom role.
A role can contain following privileges –
Role Creation
Step 1) In this step,
Step 2) A role creation screen is displayed.
STEP 3) In this step,
Tick option 'Grantable to other users and roles', if you want to assign this role to other user and role.
3. Grant Role to User
STEP 1) In this step, we will Assign Role 'MODELLING_VIEW' to another user 'ABHI_TEST'.
STEP 2) In this step, role 'MODELLING_VIEW' will be added under Role.
STEP 3) In this step,
4. Resetting User Password
If user password needs to reset, then go to User sub-node under Security node and double click it. User window will show.
STEP 1) In this step,
STEP 2) In this step,
5. Re-Activate/De-activate User
Go to User sub-node under Security node and double click it. User window will show.
There is De-Activate User icon. Click on it
A confirmation message 'Popup' will appear. Click on 'Yes' Button.
A message 'User 'ABHI_TEST' deactivated' will be displayed. The De-Activate icon changes with name 'Activate user'. Now we can activate user from the same icon.
The license key is required to use SAP HANA Database. A license key can be installed and deleted using SAP HANA Studio, SAP HANA HDBSQL Command Line tool, and HANA SQL Query editor.
SAP HANA database support two types of license key –
Authorization of License Management
'LICENSE ADMIN' privilegesare required for License Management.
SAP HANA Auditing features allow you to monitor and record action which is performed in SAP HANA System. This features should be activated for the system before creating audit policy.
Authorization for SAP HANA Auditing
'AUDIT ADMIN' SystemPrivileges required for SAP HANA Auditing.
Summary:
In this tutorial, we have learned following topic -