SAP 4.7 Encryption questions

Dear SAP on i5 community,
We are running SAP 4.7 and i5 OS 5.3.0 and have the following questions about how encryption works;
Encryption questions
1. How do we determine precisely what encryption algorithm is used to encrypt credit card data in our R/3 system?
2. How are the encryption keys for this algorithm generated or provided?
3. How and where are encryption keys for this algorithm are managed?
4. Is there a way to change the encryption keys?
We look forward to your replies...Thank you!
TMM

Hello Tim,
You could take a look at the following blog and the Notes refered.
Enable Credit Card Encryption
If I am not mistaken...
1. Decided by SAP already
2. You generate the keys through SAP transactions (details in Notes and blog)
3. Keys are saved in a file on the OS level (make sure it is safe)
4. Yes, you can. But all the previous credit cards will be lost.
Hope it helps.
Best regards,
Victor

Similar Messages

  • SAP PM Direct Certification Question model.

    Hi Experts,
    Could you please provide me SAP PM Direct Certification Question model.
    Thanks in advance.
    Chandru.

    See [here|http://www.sap.com/services/education/certification/certificationrole.epx?context=%5b%5bROLE_TPLM30_05_CER%5d%5d%7c]

  • SAP ABAP Certification Sample Questions

    Hi
    Can anyone help me in SAP ABAP certification sample questions?
    Before giving the exam i wanted to just check mu knowlegde..
    Do not ask for sample question on SDN.
    Read and respect forum rules.
    Edited by: Zubin Shah on Jun 1, 2010 6:08 PM

    Hi
    If can answer most of these then you will have no problem with the cert exam: Security interview questions - some fun to tickle your brain.

  • SAP Netweaver Certification model questions

    Please can any one post SAP Netweaver Certification model questions.
    Thanks
    VK
    Message was edited by: Venu Kanjarla

    HI tadm10_1 and tadm10_2 and tadm12_1 and tadm12_2 and tadm 51 i have this pdf if u want mail me [email protected] (for cost)

  • Credit Card Encryption Question

    Question from my customer (on EBS 11i):
    I have a question about the Visa VCF 4 Transaction Loader. We are working
    on automating this process and have installed a secured storage area to
    hold the file. It is my understanding that the bank is going to send us an
    encrypted file.
    Is the Visa VCF 4 Transaction Loader can process a PGP encrypted file?
    Your help is appreciated - thanks!

    The answer is that you do not store the ciphertext in the card number field. You create a reference number which is 25 bytes long that substitutes for the card number, and is stored in the card number field. The reference number, in turn, is also stored in a custom table with the ciphertext. The reference number is a unique key to that table.
    You then create translation routines to encrypt/decrypt the ciphertext based on the reference number that you stored. These routines would be passed the card number field, which contains the reference number. The input parameter list for these routines are standard. The routines that do the encryption/decryption are configured to be called at the appropriate times.
    - Brendan

  • SAP-XI Real time questions

    could you please provide me some real time questions on sap-xi,
    thank you

    1.  What are the Three types of XI Cache?  How are they used?
    2.  Where would you look to find Logical System in the SLD.
    ANS Business system wizard
    3.  What 2 Data Types are automatically created when the Namespace is saved in the Integration Repository?
    ANS. ExchangeFaultdata and Exchange log data.
    4   Which Development Object in SAP XI forms the "ROOT NODE" of an XML document when an XI message is generated?
    ANS MESSAGE TYPE
    5.  Describe the setting to "Permit Importing of SAP IDOCs or BAPI/ RFCs".  Where is this configured?
    ANS.
    6.  What are the valid types of Message Mappings?  Which is configured with the Graphical User Interface and requires no coding?
    ANS. MESSAGE MAPPING, XSLT MAPPING, ABAP MAPPING AND JAVA MAPPING, MESSAGE MAPPING REQUIRES no coding
    7.  What actions should you take if your Business System does not show when attempting to "Transfer from the SLD"?
    8. What is the relationship between Product, Product Version, Software Component and Software Component Version?  Give an example.
    ANS. PRODUCT: Represents a collection of all versions of a product . In SAP environment , a product corresponds to an SAP technical Component, eg 4.6c,4.6d,4.7
    COMPONENT: Represents a collection of all versions of a software components Examples of Software components are SAP_APPL,SAP_ABA,SAP_HR Software
    9.  Describe the Design Repository (DR) objects you created to configure a scenario.
    10.  What are the different design time components used by XI?
    11. What monitoring service does the integration server provide?
    12.  Describe the alert functionality of the runtime workbench.
    ANS Message alerting allows to set conditions for triggering Alerts. This allows notification of the correct parties for a specific classes of  errors.
    13.  In BPM, if you have async-sync bridge, does the QOS change?
    14.  What is logging/ trace? List 4 ways to enable logging/ trace?
    15.  Properties of an async message?
    16   Inbound XI message has problem, where do you look for solution?
    17.  Describe XI message format.
    18.  Describe end-to-end monitoring.  What is it?  How is it configured?  What are the different   views?
    ANS  It is a tool for monitoring end to end technical processes involving multiple components.
    to configure end to end monitoring :1. On initial screen of runtime work bench ,select configuration tab page.
    2.enter the logon data for the monitoring server.
    3.choose display.
    4.system displays the components of the correct domain and the integration server is selected as default.
    5.select the other components that you want to use and configure them as sender or receiver ,or both  depending on the component type.
    6.we can select monitorin level that we want to use for each of the selected component.
    7.Choose save configuration .
              Processes overview and the instance view are the two different views
    19. Different steps to make a Sender IDOC adapter work?
    20. JMS adapter can talk with what type of systems?  Give some examples...
    ANS Messaging systems to the integration engine
    21.What format can JDBC adapter communicate in?  Should you use native SQL?
    ANS. JDBC adapter converts data base content to XML messages and the other way around.
    22.If communications with JDBC using XML format, what are 4 actions you could do?
    ANS. SELECT, INSER, DELETE , UPDATE.
    23.  How does PCK and adapter framework engine differ?
    ANS.
    24.  Can JDBC adapter query DB tables?  Can it insert?
    ANS. Yes
    25.  JMS adapter scenario messaging system provider needs to submit what?
    26.  List some properties of receiving IDOC adapter.
    27.  JDBC/ JMS required certain steps before they can work?
    ANS vender specific JMS driver must be deployed on to the J2EE engine using SDM
            Appropriate JDBC driver must be deployed on the system
    28.  What is ALEAUDIT with respect to IDOCS?  When will they use it?
    29.  Properties of the HTTP adapter, does it use or need a sender or receiver communications channel or agreement?
    30.  What does a RFC adapter support?
    ANS sRFCs and tRFCs
    31.  Is EOIO supported by RFC?
    ANS No
    32.  What are the advantages of using a decentralized adapter engine?
    ANS.
    33.  What are the different monitoring statuses?  Where do you find them?
    ANS  Different monitoring statuses are Message Monitoring, Component monitoring , performance  Analysis and Alerting and we find this in Runtime Workbench.
    34.  What adapters are not in adapter engine? code you can type in,
    ANS HTTP and IDOC adapters are not in adapterengine and we can type code in  IDOC
    A.  Which ABAP proxy, in or outbound has Which one used classes with regards to Sync/ Async what is the method call?
    36.  With an optional node what would be the cardinality?  How do you make sure the subordinate fields get mapped?
    37.  WSDL what is it?  Where do you find it in Repository?  Is it used in Java or ABAP proxy?
    38.  XI 3.0, what are the supported mapping types?
    ANS Message mapping, ABAP mapping, JAVA mapping and XSLT mapping
    39.  What are the prerequisites for importing customer defined IDOC?
    ANS
    40.  What are the three IDOC transactions in XI?
    ANS  SM59, IDX1and IDX2.
    41.  Context object replace what?
    ANS  Xpath
    42.  Two things can make up a collaboration agreement, what are they?
    ANS Sender agreement and receiver agreement
    43.  What is a logical system, with respect to SLD?  Where would you assign it?
    ANS
    44.  What is the sender communications channel?
    ANS specify the potential senders of messages and the technical communication path
    45.  If error during inbound or outbound binding, where do you look to solve?
    46.  URI, URL and URN what are they and what are their differences?
    47.  To perform content based (logical) routing, two places it can be done.  What are the two places?
    48.  What is an integration process?  Where is it executed?  What stake?
    49.  In a message mapping you have advanced user defined function, can you test for context changes, if yes how?
    50.  What is multi-mapping?  Where is it used?  What are the advantages?
    ANS Multimappping is any mapping that involves N messages either or source or target side   Multimapping can be used in ccBPM
             1.used to map abstract interfaces
             2. Development is same as message mappings.
             3.n:1 transformation
             4.1:n transformation
             5. n:m transformation
    51.  What are the two XSLT tags, previously that could not be used in XI?
    ANS
    52.  Using a simple user defined function how can you send trace information to be monitored?
    53.  What is function "exists" in message mapping?
    ANS We can handle the error by checking whet her the source tag exists and if it does not we can pass an empty value, which generates the required target field.
    54.  What Jar file is required to perform Java Mapping?
    ANS
    55.  What is context in message mapping and how is it used?
    56.  What is remove context and splitby value?
    ANS to remove parent context of an element and spliby value is counterpart of remove context.
    57.  Where can you use user defined function?  What is its scope?
    58.  If you are building Java mapping class which class interface must it implement?
    59.  What is the scope of mapping template?
    60.  How does a Boolean function work in message mappings?
    61.  Source message occurs 3 times, target only once, what is wrong?
    62.  In simple mapping - one source results in 4 identical target messages, with regarding cardinality what is the problem?
    63.  What is a prerequisite to do ABAP mapping for a comple transformation?
    64.  What step can be inserted into an exception branch?
    ANS
    65.  How do you get an error condition to generated an alert?
    ANS
    66.  What actions can you perform in SXI_CACHE?
    67.  What is a wait step and why is it used?
    ANS It is a process flow control relavent and is used toset start time for next step
    68.  What is a block step and why is it used?
    ANS
    69.  Could multiple instances of an integration process be running at the same time?  If so, how does a message find its way to the correct instance?
    70.  Which XI objects can be used in an integration process?  Which ones from Repository?
    71.  Send message within an integration process to 8 receivers at the same time, how can you do this?
    72. What is a correlation?  What is a local correlation?
    73. What is the relationship between an integration process and business workflow?

  • SAP BW Bookmarks - Metadata question

    Hi,
    Our users save query views as bookmarks on the portal. Now , If we change the query defination , we would like to know following:
    1. Bookmarks created against  queries
        ( I found tables RSWR_DATA_XREF and RSWR_DATA  . These tables give me list of bookmarks agains BI query . These bookmarks have a unique SAP internal ID number. How to match SAP internal ID number with Portal bookmark ? )
    2. Filters used in Bookmarks
    3. Un used bookmarks - Users keep on creating bookmarks and we would like to have a report which can tell us , when was the last time that particular view was executed.

    I have a BW 7 system i have searched and in didn´t find the CSV files.....i review the 610236 OSS note....and i have another question.......
    I have activated all the objects of SAP Demo but there´s no Infopackages in Business Content objects....
    But In OSS note mention a RFC for load data from CSV to infocube ....
    Do i have to create them????
    Maybe Is not necesary to create the infopackages and only use the RFC??
    Which is the right procedure?
    Regards
    Message was edited by:
            Oscar Díaz

  • SAP Adapter Best Practice Question for Migration of Channels

    I have a best practice question on the SAP adapter when migrating an OSB project from one environment (DEV) to another (QA).
    If my project includes an adapter channel that (e.g., Inbound SAP Proxy listening on a channel), how do I migrate that project to another environment if the channel in the target environment is different.
    I tried using the search and replace mechanism in the sbconsole, but it doesn't find the channel name in the jca and wsdl files.
    What is the recommended way to migrate from one environment to the other when the channel name changes?

    I have a best practice question on the SAP adapter when migrating an OSB project from one environment (DEV) to another (QA).
    If my project includes an adapter channel that (e.g., Inbound SAP Proxy listening on a channel), how do I migrate that project to another environment if the channel in the target environment is different.
    I tried using the search and replace mechanism in the sbconsole, but it doesn't find the channel name in the jca and wsdl files.
    What is the recommended way to migrate from one environment to the other when the channel name changes?

  • Urgent - CUCM Encryption questions

    I have gone through the CUCM Security guide and a few more docs. I have not been able to find the answers to all the questions anywhere. I need you help find answers to the questions colored green.
    Scenario - At this moment VoIP is not encrypted. (CUCM 6.1 with around 1000 devices). The customer is going to setup a Windows-PKI and they want already to know what specifications Cisco is demanding from such a PKI (so that they later easily can integrate their Cisco VoIP solution in their 'new' network) What encryption length are supported (2048 or 4096 bit ?)
    - Based on CUCM security docs it appears to be 512, 1024 or 2048
    [My Answer] This answer is correct. Here’s the information from the CUCM 7.x Security Guide:
    (Page 84) Key Size - For this setting that is used for CAPF, choose the key size for the certificate from the drop-down list box. The default setting equals 1024. Other options include 512 and 2048.
    What Hash-algorithms are supported (SHA-1, SHA-256, SHA-512, ...) ? -
    - Based on the CUCM Admin guide I was only able to find SHA-1 and MD-5
    [My Answer] This is also true. MD5 is used as a Hash function which is used with encryption. SHA-1 hashed password and PIN in credential table for end users. 1024-bit RSA Public Keys, digital signatures use SHA-1 with RSA.
    Need answer to these 4 questions:
    How long can the certificate chain be (how many different levels are supported) ?
    How can you get certificates on end devices which aren't part of an Active Directory ?
    How to you 'connect' a Cisco Telephony system to a Windows-PKI ?
    Is there a checklist in which the points which should be considered are specified?
    Please share your opinions. Any help would be appreciated.
    Thanks & Regards,
    PJ
    Technology Solutions Network

    Take a look here and see how many of your questions are answered:
    http://www.cisco.com/en/US/docs/voice_ip_comm/cucm/security/7_0_1/secugd/secuview.html
    Hailey
    Please rate helpful posts!

  • NonSAP client- SOAP- PI- ABAP Proxy- SAP Business System EOIO Question

    Hey all... wondering how and if the following can be accomplished
    I have a nonSAP client that is sending SOAP message pairs to PI 7.11 SP06.  PI is then sending these messages via ABAP Proxy to our SAP business system.  By pairs I mean for each event in the client it's going to send 2 messages to PI and then to SAP business system.  These messages have to be processed by PI and SAP in the exact order the client sends them.
    My goal is to have the client somehow specify the queueID and quality of services as EOIO when it calls PI via the SOAP message.  The reason is when the client sends 1 set of messages we don't want it to block subsequent message pairs if something goes wrong with the first.  We're going to have an "ID" as part of the queueID that will be unique by pair.
    My question: is it possible to specify this queueID (and the qos=EOIO) in the SOAP message that is sent to PI so this queueID carries through PI and into the SAP business system?

    hi,
    you can do that :
    a) in standard with http adapter :
    http://help.sap.com/saphelp_nw04/helpdata/en/43/64db4daf9f30b4e10000000a11466f/content.htm
    with &queueid=<queueid>
    b) not in standard with SOAP adapter
    Regards,
    Michal Krawczyk

  • SAP IDM 7.2 Questions

    Hi,
    I just recently started with SAP IDM and have a few Questions, maybe someone has the time to explain, thanks in advance!
    - What for is VDS (Virtual Directory Server)? I can write directly into AD? why another target system?
    - If I create a Role in Identity Center for testing its available on the idm portal http://localhost:50000/idm but not in /useradmin or Umeadmin?
    - Repository, does it matter in which repository I upload (CSV Import) users? I have multiple repositories and didn't understand the exact purpose of a repository?
    - Org Units? how can I create Org Units and assign roles for inheritance? is this only available on a Netweaver AS ABAP installation? (I installed AS JAVA) According this link: Indirect Role Assignment Using Organizational Management (OM) - Identity Management - SAP Library
    Thanks, Patrick

    Hi Patrick,
    here is some answers:
    Main purpose of VDS is to be an interface INTO IdM. It is an LDAP interface into the data stored in IdM database. It allows you for example to search, read, write and authenticate to IdM data via LDAP interface.
    IdM has its own UI (http:host:port/idm). You are not supposed to see business roles in useradmin of the J2EE. It is objects known to IdM, not to the J2EE.
    Repositories are objects representing mostly a source or target system. For example AD could be a source system where you get users from. An ABAP client can be a target system where you provision users to. Uploading users is just a way of creating users that you cannot get from some other source system like HCM, AD or ABAP. It depends on your scenarios and user life cycle where you get your user information from (source system) and where you provision to (target system).
    The link you shared regarding the org units is not really related to IdM as a product. If you do some automatic assignments in ABAP directly, you might need to reconcile with IdM. IdM is supposed to be a central user administration tool. If you have information about org units in IdM and want to use it to automatically assign authorizations you can do that for example by using dynamic groups.
    IdM is a very powerful tool opening a lot of possibilities as you can basically implement every requirement if you only have the required information available somewhere. It might be helpful for you to have someone to answer all your questions and help you solving your requirements in best way in the beginning, enabling you to use it in the most efficient way.
    Regards
    Norman

  • SAP CS 8.0 - question to parallel tasks in one job chain

    Dear all,
    I have a question about job chains in SAP CPS/Redwood
    We have a job chain like this:
    Job 1
         Job 1.1
                   Job 1.1.1
                   Job 1.1.2
         Job 1.2
                    Job 1.2.1
    The Jobs 1.1.1 and 1.1.2 should start  when the Job 1.1 is compled and don't have to wait until Job 1.2 is complete.
    How could I release it in Redwood in one job chain? Should I use a precondition in the job definition of 1.1 and 1.2?
    Thank you for your help.
    Best regards,
    Hans

    Assumptions :
    Job 1.1.1 and Job 1.1.2 are running in parallel.
    Job 1.1, job 1.2 are also running in parallel.
    Chain A -
    Step 1 - Job 1.1
    Step 2 - Job 1.1.1, Job 1.1.2 (these both will start as soon as Job 1.1 completes)
    Chain B -
    Step 1 - Job 1.2
    Step 2 - Job 1.2.1
    Chain C
    Step 1 - Job 1
    Step 2 - Chain A, Chain B (Chain A and Chain B will start as soon as Job 1 completes).
    Submit Chain C.
    Preconditions are usually  used to check the timewindow, for example , if you want to execute a step in a job chain, only if it is a Friday.
    thanks
    Nanda

  • SAP NetWeaver Developer Studio Question

    Hi All,
    My question is that which java library does SAP NetWeaver Developer Studio use consume SAP WSDL file?
    Appreciate your advice.
    Cheers,

    1. Type https://nwds.sap.com/swdc/downloads/updates/netweaver/nwds/ce/ into your browser
    2. Enter your sap marketplace user and password in the popup
    3. Click on "Download latest NWDS_platform.zip release" and the download will start
    4. Unzip and install... done.
    Here, the Installation Guide:
    SAP NetWeaver Developer Studio 7.1 Overview

  • Encryption questions

    Hi,
    I have confidential material on my laptop, a T61 i bought 2 years ago. Can I set the computer so that it is suspended when I close the top, yet I still need to put in my personal password to resume? I'd hate to have to reboot every time just to protect against the danger to the data.
    And a related question:  I have read about FDE (full disk encryption), but I can't really tell if the Hitachi 250 gig drive I ordered from Lenovo 2 years ago has it.  Tech support was no help, and Hitachi web site didn't mention it (Hitachi hts5425k9sa00), but I gather that Lenovo does have FDE on all its drives for some time.  So what does the password do to protect your data if it is not an FDE drive? Anyone go an idea?
    Thanks,
    woody
    Solved!
    Go to Solution.

    i think the major difference is that the FDE method is implementated at hardware level, and the other is done through software level. Apparently the seagate FDE does not suffer any performance hits, while i would imagine the software level encryption would cause a slight difference in speed. (But i am not 100% sure on this). 
    http://en.wikipedia.org/wiki/Full_disk_encryption
    have a read of this article. 
    Regards,
    Jin Li
    May this year, be the year of 'DO'!
    I am a volunteer, and not a paid staff of Lenovo or Microsoft

  • Airport Extreme: Native Firewall/Encryption question

    The Airport Exteme offers a built-in firewall and supports industry-standard encryption technologies including WPA/WPA2 and 128-bit WEP.  I plan to install a NAS device onto my home network (hard wired to my AE) for the purposes of RAID 0, mirrored backups of the multiple computers on my personal network.
    Question:  Given the native fireway/encryption built into the AE, would I still need to encrypt my backups to my NAS?  Can I consider this technology 'safe' enough from any outside hacker?  Please advise. 
    Thanks!

    Question:  Given the native fireway/encryption built into the AE, would I still need to encrypt my backups to my NAS?  Can I consider this technology 'safe' enough from any outside hacker?
    As far as unwanted access over wireless, the AirPort offers similar levels of protection as most consumer or commercial routers. Using WPA2 with a strong encryption key and changing that key every 60-90 days would be the best that you can expect for current technology.
    As far as access via the AirPort's WAN port that is somewhat a different matter. The Apple routers offer only a basic NAT-type firewall. Effective, but not the most secure method that can be had today. If you are concerned about potential unwanted access from the Internet, you may want to consider routers that offer multiple firewall options, like stateful packet inspection, or provides additional "layers of protection," like an Intrusion Protection System. Note; however, implementing most of these additional methods can significantly reduce the WAN-to-LAN throughput as each packet of data is inspected multiple times before it can pass through.

Maybe you are looking for

  • Re-buillt and bookmarks aren't "working"

    Alas my machine recently died, and I have to re-build it. I am still not really 100% happy with the way I have done things to get Firefox working again, but that isn't the problem. The bookmarks menu. Luckily I have a laptop and its bookmarks are pre

  • How do I fade out audio in Premiere Elements 13?

    HOW DO I FADE OUT AUDIO IN PREMIERE ELEMENTS 13?

  • Dbms_xslprocessor ignore xsl:output

    If I use the xslprocessor.processXsl the output is correct HTML If I use dbms_xslprocessor.processXsl , in the output will be " replaced with quot; ... it looks so that dbms_xslprocessor ignore tag <xsl:output method = "html"/>, or should I set outpu

  • Reducing the length of a feild

    Hi, I've matnr as CHAR of 18 length in the LINV table ..... Is there any way I can reduce the length into 10 ...... Thanks

  • Error when doing checkin of content item programatically

    Hi, I am using CHECKIN_NEW and CHECKIN_SEL services for creating or updating a content item programatically. Called these services via executeServiceSimple("CHECKIN_NEW") or executeServiceSimple("CHECKIN_SEL") api calls from my service, based on whet