Security guide for PI 7.1
Hi all,
Can anybody tell me if there is a security guide available for PI 7.1 ?
regards,
Loveena .
Here it is
http://help.sap.com/saphelp_nwpi71/helpdata/en/8c/2ec59131d7f84ea514a67d628925a9/frameset.htm
Regards,
Prateek
Similar Messages
-
Security Guide for Enhancement Pack 4 for ECC 6.0
Hello,
I am trying to analyse the impact of applying Enhancement pack 4 for ECC 6.0, Can someone help me find any security guides for it.
It is an existing system and few additional modules are being implemented.
Kind Regards.Hello,
We have applied EHP4 on an exisiting(running) ECC 6.0 System. Can someone help me find answers to below queries
a) What is the SAP standard process to start with Security bit.
b) Do we need to run SU25 steps. If yes, which one of them.
c) Since the purpose of applying EHP4 was to activate few set of new business functionalities, we intend to affect the existing security design at the minimal. What is the best approach for this.
Kind Regards,
Abdul -
SEM-BCS authorization or Security Guide
Hello,
Last year We went Live with SEM-BCS Project.Now We need to restrict all the t-Code's in SEM-BCS. During the Go-Live We have provided Full authorization's to everyone.Now Auditor's are bugging us to restrict the access in the SEM-BCS system.If Possible anyone can provide authorization or Security Guide for BCS Project
VijayHello Again,
Guide Contain's Only Authorization Object's & Default SAP Defined Roles. But Here it a different Scenario. SEM-BCS team has provided me 30 T-Codes & I am supposed to Pick all the Default Values for all the T-Codes.
I am doing it from T-Code: SU24 & Updating it in Excel. My Question's are
1. How to get more Knowledge on the Tcodes
2. How it will Function
3. In what way we can restrict the Feild values & Activities for the T-codes.
My functional team Have no Knowledge on this Objects & what activities should be there.
Now i need to explain them each & every T-Code & what does each feild & Activity Do. If there is any Go-Live document for this it will be really helpful for me.
For All 30 T-codes I need to create Custom Roles & Audit need's No Astrick for new custom Roles.
Vijay -
Best study-guide for CCNA Security
Hi..fellows !!
Wts the Best study-guide for CCNA Security..?? Guys I need it including Authors also...
Best Regards
NuwanHi ,
I Recently Completed My CCNA-Security Exam & I Followed MW&KW. It is Good. It Covers ALL required for the Exam!!! -
Any docs or guide for OpenSSO secure Ldap with Opends
Any docs or guide for OpenSSO secure Ldap with Opends
Cheers
BlacknasaHi,
it seems to be a JRE Problem. When I use the Kerberos implementation from "Vintela Single Sign-On for Java" I can establish a "aes256" secured LDAP connection to the AD Server.
This LDAP connection allows to change the passwords of the users stored in the AD.
The problem is that "Vintela Single Sign-On for Java" is not free, so it would be nice to have a solution which works with the Kerberos implementation of the JRE.
The error is the same for "aes128" and "aes256" encryption.
And with Wireshark I can not see any differences in the packets send to the AD and received from the AD. -
Secure Configuration Guide for Lion?
Is Apple going to release a secure configuration guide for Apple, as it has for its past OS X operating systems? It doesn't yet exist on the Secure Configuration Guide page on Apple's site.
i'm also interested in reading this document.
i posted the same question before reading your post.
https://discussions.apple.com/message/19256352#19256352 -
Security Hardening guide for ESXi 5
Hi, I'm looking for a Security Hardening guide for ESXi 5, alternatively, can someone help me in understanding any new security enhancements in v5 over v4or v3 that would help in updating previous hardening guide?
Many thanks, Jon.Hello and Welcome to the Forums!
The vSphere5 Security Hardening guide is not yet available. With that said, the vSphere 4.1 Hardening Guide is still very relevant and useful.
As for what's new, the below document could be useful
http://www.vmware.com/files/pdf/products/vsphere/vmware-what-is-new-vsphere5.pdf -
About "kernel.exec-shield" and "because they will bring security issue" for linux ASE
In " ASE Quick Installation Guide for Linux", "kernel.exec-shield=0" and “kernel.randomaize-va-space=0” should be set.
But SuSE engineers say that “kernel.exec-shield=0”and “kernel.randomaize-va-space=0” will bring the OS security issue.
Customer want to know why ASE need the above parameters ?
Has anybody the idea for customer's question?If the parameters are not set as documented, attempts to start additional engines beyond the first one will fail, generating stack traces.
ASE acts in many ways like it's own operating system, scheduling individual user connections (spids) to actively run (note that ASE was developed well before native threading was commonly available). Each spid has it's own stack information that gets swapped in when it is set to "running" state on the engine and swapped out when it yields the engine. The mechanics of this is not that different from the buffer overrun exploits described in the Red Hat document linked to by the
install guide, http://www.redhat.com/f/pdf/rhel/WHP0006US_Execshield.pdf
and the exec-shield mechanics definatately interfere ASE's operations when ASE is using multiple dataserver processes (engines) that swap spids around.
-bret -
System exception running Configuration Wizard after installing several security updates for SP
Greetings,
Have a 2 server farm, SharePoint 2013 SP1, SQL and SharePoint. Windows Update has 15 updates downloaded and ready to install, 2 Server 2012 updates and 2 SharePoint updates, 11 Security Updates for SharePoint. So, I said yeah, go ahead and install them late
last night when I figured it wouldn't interrupt folks. (dumb move)
Windows Update took awhile, but no errors during the install. Rebooted the server as required. Once the server was back, jumped onto the server console and ran the Configuration Wizard to apply the updates to SharePoint. No problem, progressed through the
screens saying it was going to update, farm and sql information, etc. Config Wizard was going through the steps, then failed with the message: "Failed to register SharePoint services." and here's a link to the configuration log so have a jolly time
tracking it down, thank you very much.
I found the error in the log (down about 10,000 lines):
04/10/2015 03:00:02 12 ERR Task services has failed with an unknown exception
04/10/2015 03:00:02 12 ERR Exception: Microsoft.SharePoint.SPException ---> System.Runtime.InteropServices.COMException: <nativehr>0x80131904</nativehr><nativestack></nativestack>
at Microsoft.SharePoint.Library.SPRequestInternalClass.GetListsWithCallback(String bstrUrl, Guid foreignWebId, String bstrListInternalName, Int32 dwBaseType, Int32 dwBaseTypeAlt, Int32 dwServerTemplate, UInt32 dwGetListFlags, UInt32 dwListFilterFlags, Boolean bPrefetchMetaData, Boolean bSecurityTrimmed, Boolean bGetSecurityData, Boolean bPrefetchRelatedFields, ISP2DSafeArrayWriter p2DWriter, Int32& plRecycleBinCount)
at Microsoft.SharePoint.Library.SPRequest.GetListsWithCallback(String bstrUrl, Guid foreignWebId, String bstrListInternalName, Int32 dwBaseType, Int32 dwBaseTypeAlt, Int32 dwServerTemplate, UInt32 dwGetListFlags, UInt32 dwListFilterFlags, Boolean bPrefetchMetaData, Boolean bSecurityTrimmed, Boolean bGetSecurityData, Boolean bPrefetchRelatedFields, ISP2DSafeArrayWriter p2DWriter, Int32& plRecycleBinCount)
--- End of inner exception stack trace ---
at Microsoft.SharePoint.SPGlobal.HandleComException(COMException comEx)
at Microsoft.SharePoint.Library.SPRequest.GetListsWithCallback(String bstrUrl, Guid foreignWebId, String bstrListInternalName, Int32 dwBaseType, Int32 dwBaseTypeAlt, Int32 dwServerTemplate, UInt32 dwGetListFlags, UInt32 dwListFilterFlags, Boolean bPrefetchMetaData, Boolean bSecurityTrimmed, Boolean bGetSecurityData, Boolean bPrefetchRelatedFields, ISP2DSafeArrayWriter p2DWriter, Int32& plRecycleBinCount)
at Microsoft.SharePoint.SPListCollection.EnsureListsData(Guid webId, String strListName)
at Microsoft.SharePoint.SPListCollection.get_Count()
at Microsoft.SharePoint.Administration.SPAdministrationWebApplication.get_HealthRules()
at Microsoft.SharePoint.Administration.Health.SPHealthAnalyzer.RegisterRules(Assembly assembly)
at Microsoft.Office.InfoPath.Server.Util.HealthAnalyzerRegistration.RegisterHealthRules()
at Microsoft.Office.InfoPath.Server.Administration.FormsService.Update()
at Microsoft.SharePoint.PostSetupConfiguration.ServicesTask.InstallServiceInConfigDB(Boolean provisionTheServiceToo, String serviceRegistryKeyName)
at Microsoft.SharePoint.PostSetupConfiguration.ServicesTask.InstallServices(Boolean provisionTheServicesToo)
at Microsoft.SharePoint.PostSetupConfiguration.ServicesTask.Run()
at Microsoft.SharePoint.PostSetupConfiguration.TaskThread.ExecuteTask()
So I've been searching around trying to find a clue about this. I tried using PSConfig as well, no dice. I tried using my admin account, the farm account, and the initial setup account, no dice. So I gave in about 3:00 AM and took a break, rather than have
my head hit the keyboard. Left IIS down and SP down. Had some help this morning when someone started things back up for me. sigh. So the users have been in on the sites and doing all sorts of important and critical things, so rolling back to the last
backup is the last, last resort. (Fortunately, I did do a manual backup using a PowerShell script before starting all this.)
Help. Please.
The actual sites are up and seem to be working fine. Central Admin is down though, get a 500 Internal Server Error in the browser, so things aren't correct. Duh. The config wizard didn't finish.
Thanks much,
Steven0x80131904 translates to COR_E_SqlException. Typically this will be an MDF/LDF file out of space, or the volume that those files reside on being out of space. Check that first, then also check the SQLERROR log file for any issues.
Trevor Seward
Follow or contact me at...
  
This post is my own opinion and does not necessarily reflect the opinion or view of Microsoft, its employees, or other MVPs. -
Setting security constraint for web App
Hai all!
I am new to bea and i am trying to set up security constraints for my webaplication..
I want user to be authenticated before he access any of the pages in browser..
All i did was adding following entries to web.xml
<security-constraint>
<web-resource-collection>
<web-resource-name>
webresources
</web-resource-name>
<url-pattern>
</url-pattern>
</web-resource-collection>
<login-config>
<auth-method>
BASIC
</auth-method>
</login-config>
</security-constraint>
But no such thing is happening,,
I know i am doing wrong but donno where exactly i am wrong..
Pls guide me in sequnece of steps regarding what to do to accomplish what i want..
Thanks and Regards
ManoharI guess you need to set the role that is allowed to log into your application.
try this in web.xml:
<security-constraint>
<display-name>Whatever</display-name>
<web-resource-collection>
<web-resource-name>resource</web-resource-name>
<description>Desc</description>
<url-pattern>/*</url-pattern>
<http-method>GET</http-method>
<http-method>POST</http-method>
</web-resource-collection>
<auth-constraint>
<description>desc</description>
<role-name>MyRole</role-name>
</auth-constraint>
<user-data-constraint>
<transport-guarantee>NONE</transport-guarantee>
</user-data-constraint>
</security-constraint>
<login-config>
<auth-method>BASIC</auth-method>
</login-config>
<security-role>
<description>desc</description>
<role-name>MyRole</role-name>
</security-role>
and map the role with a group/user in weblogic.xml:
<security-role-assignment>
<role-name>MyRole</role-name>
<principal-name>MyGroupOfUsers</principal-name>
</security-role-assignment>
Hope this helps.
Xavi
"Manohar" <[email protected]> wrote:
>
Hai all!
I am new to bea and i am trying to set up security constraints for my
webaplication..
I want user to be authenticated before he access any of the pages in
browser..
All i did was adding following entries to web.xml
<security-constraint>
<web-resource-collection>
<web-resource-name>
webresources
</web-resource-name>
<url-pattern>
</url-pattern>
</web-resource-collection>
<login-config>
<auth-method>
BASIC
</auth-method>
</login-config>
</security-constraint>
But no such thing is happening,,
I know i am doing wrong but donno where exactly i am wrong..
Pls guide me in sequnece of steps regarding what to do to accomplish
what i want..
Thanks and Regards
Manohar -
Using OID 9.0.4.x as security provider for OC4J 10.1.3
If you upgrade OC4J to release 10.1.3 (needed for new releases of Jdeveloper)
and you your Metadata respository is based on 9.0.4.x, you can use Oracle® Containers for J2EE Security Guide 10g Release 3 (10.1.3) B14429-01 Chapter 6 for the steps needed.
The section Considerations for 9.0.4.x Infrastructure: Access Control List Settings describes that some content in OID needs to be replace to cater for 10.1.3 and ldap ldif file structure is given with instruction on how to run it
We tried it exactly as instructed (Show below)
ID management realm (for example, dc=PALCO,dc=com), then execute the steps that follow.
dn: cn=JAZNContext,cn=Products,cn=OracleContext,%s_MgmtRealmDN%
changetype: modify
replace: orclaci
orclaci: access to entry
by group= "cn=JAZNAdminGroup,cn=Groups,cn=JAZNContext,cn=Products,cn=OracleContext"
(browse, add, delete)
by group= "cn=IASAdmins,cn=Groups,cn=OracleContext,%s_MgmtRealmDN%
added_object_constraint=(objectclass=orclApplicationEntity) (add, delete, browse)
by * (none)
orclaci: access to attr=(*)
by group= "cn=JAZNAdminGroup,cn=Groups,cn=JAZNContext,cn=Products,cn=OracleContext"
(search, read, write, compare)
by group= "cn=IASAdmins,cn=Groups,cn=OracleContext,%s_MgmtRealmDN%"
(read, search, write, compare)
by * (none)
and then running the ldapmodify program
ldapmodify -c -a -p 389 -h localhost -D cn=orcladmi -w xxxxxx \
-f int_ammar.ldif
produces errors
ldap_modify: additional info: INVALID ACI is access to entry by group
There has to be something error with the syntax error is providing in the Doc
Ammar Sajdi, Oracle consultant
www.e-ammar.com
oraclejo.blogspot.com
www.palco-me.com
AmmanFinally, i found out what the problem is
First of all , make sure that no new line exists between LDAP LDIF directives, additionally, make sure that you close the double quotation for CN where even it appears as the script provided does not close all of them when appropriate
you can fine an already modified file in my website shortly
http://www.e-ammar.com/Oracle.htm
This will hopefully save you time
Regards
Ammar Sajdi -
Question about IDS Self Study Guide for IDS
Hello,
i'm searching for a self study guide for the ips (ASA-SSM-10/20) where i can see how to configure signatures and deployment.
Thanks in advance for your help
regards
KlausThe signature configuration for the SSM module is identical to any of the other IPS sensors. The root of all IPS documentation is here:
http://cisco.com/en/US/products/hw/vpndevc/ps4077/tsd_products_support_series_home.html
Here is the ASA 7.1 doc on how to move traffic to the SSM
http://cisco.com/en/US/docs/security/asa/asa71/configuration/guide/ssm.html -
Hi,
Where do I find the Hyperion System 9 Security Guide refered to in the Planning admin guide?
Is it a PDF located somewhere.
Thanks
CDHi,
All documents are at :- http://download.oracle.com/docs/cd/E10530_01/welcome.html
For the Security Guide, click the Installation & Backup tab and it is under common installation.
Cheers
John -
Hi,
Can anyone send me the config guide for SNC.
Thanks,
ManuDear Manu,
if you are thinking under SNC at Supply Network Collaboration then please read the following link for config: http://help.sap.com/saphelp_scm2007/helpdata/en/0d/3f809d9a58474eb689443d76415d8a/frameset.htm
if you are thinking under SNC at Secure Network Communications then please read the following link for config:
http://help.sap.com/saphelp_scm2007/helpdata/en/0d/3f809d9a58474eb689443d76415d8a/frameset.htm
Hope this helps.
Regards,
Tibor -
Hello everyone:
Im administrating a demo SAP Web App Server Java/ABAP and I'd like to know about security but in specific about roles needed for main tasks, for instance, what permissions are needed for an ABAP Developer, XI user, Portal admin, etc, I don't want to give SAP_ALL to everyone.
Is there any guide / place where I can check this out? not really a guide to Fully Secure SAP Applications, but just about roles needed for each use.
Thanks!
AlejandroThanks Sri:
I actually meant if there's a guide for a WebAs administrator, let's say, besides the predefined roles and their permissions, what happens when I want to create new roles, based on technical/functional decisions, which roles should I pick for them.
Let's say, I want a developer Java + ABAP user, so he needs permissions / roles A, B and C
Is there anything like that available?
Thanks!
Alejandro
Maybe you are looking for
-
Ipod touch 1st Gen, no volume control after update to 3.1.2
So i just upgraded my ipod touch to 3.1.2 which cost about $6, and the volume control is missing( even with the headphones plugged in). How can i fix this? i dont want to do a restore and not have the firmware i just paid for.
-
CS4 hang after using Nik Sharpener - on Snow Leopard
Hello everyone, coming from Windows to MAC - to avoid trouble - I see it is not trouble free ... ?? While using the Nik Complete collection filters, all filters work fine with CS4 - except Nik Sharpener. It looks to me that the Filter works OK, o
-
Best way to connect mac clients through Lion Server to AD?
Ok, so here's what we are trying to set up for our school network. We currently have a 2003 server system hosting our PCs. Authentication - through 2003 server AD When client logs in: Mac Client -------sends info to --------> Lion Server ----passed d
-
Hi, I have four plant under one company code. Recently, one more created under the same company code. The Storage loacations are same in SAP across the five plants. While defining MRP area for the new plant Receiving storage location is used what i
-
I've been given three "heads" to connect to my MagSafe adapter and one of them doesn't fit tightly with the adapter. However, it still works. Is it okay if I continue to use it? Sorry for my English by the way.